Miggo Logo

GHSA-g753-jx37-7xwh: ECDSA signature vulnerability of Minerva timing attack in jsrsasign

5.9

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
6/30/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
jsrsasignnpm>= 4.0.0, < 8.0.138.0.13

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the ECPointFp.multiply method's timing dependency on scalar bit values. The commit diff shows significant changes to this function in ext/ec.js, adding dummy operations to create constant-time execution. The vulnerability documentation specifically mentions point multiplication timing as the root cause, and the patch directly modifies this function to mitigate the Minerva attack by introducing complementary scalar processing to eliminate timing variations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t ***S* si**-***nn*l *tt**k n*m** [Min*r*v*](*ttps://min*rv*.*ro*s.*i.muni.*z/) **v* ***n *oun* *n* it w*s *oun* t**t it *****ts to jsrs*si*n. *x**ution tim* o* t*ous*n*s si*n*tur* **n*r*tion **v* ***n o*s*rv** t**n ** priv*t* k*y w*i** is

Reasoning

T** vuln*r**ility st*ms *rom t** `**Point*p.multiply` m*t*o*'s timin* **p*n**n*y on s**l*r *it v*lu*s. T** *ommit *i** s*ows si*ni*i**nt ***n**s to t*is *un*tion in `*xt/**.js`, ***in* *ummy op*r*tions to *r**t* *onst*nt-tim* *x**ution. T** vuln*r**i