Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-21484

Summary
Assigner-snyk
Assigner Org ID-bae035ff-b466-4ff4-94d0-fc9efd9e1730
Published At-22 Jan, 2024 | 05:00
Updated At-21 Oct, 2024 | 10:56
Rejected At-
Credits

Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:snyk
Assigner Org ID:bae035ff-b466-4ff4-94d0-fc9efd9e1730
Published At:22 Jan, 2024 | 05:00
Updated At:21 Oct, 2024 | 10:56
Rejected At:
▼CVE Numbering Authority (CNA)

Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.

Affected Products
Vendor
n/a
Product
jsrsasign
Versions
Affected
  • From 0 before 11.0.0 (semver)
Vendor
n/a
Product
org.webjars.npm:jsrsasign
Versions
Affected
  • From 0 before * (semver)
Vendor
n/a
Product
org.webjars.bowergithub.kjur:jsrsasign
Versions
Affected
  • From 0 before * (semver)
Vendor
n/a
Product
org.webjars.bower:jsrsasign
Versions
Affected
  • From 0 before * (semver)
Problem Types
TypeCWE IDDescription
N/AN/AObservable Discrepancy
Type: N/A
CWE ID: N/A
Description: Observable Discrepancy
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L/E:P
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L/E:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Hubert Kario
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
N/A
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
N/A
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
N/A
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
N/A
https://github.com/kjur/jsrsasign/issues/598
N/A
https://github.com/kjur/jsrsasign/releases/tag/11.0.0
N/A
https://people.redhat.com/~hkario/marvin/
N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
Resource: N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
Resource: N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
Resource: N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
Resource: N/A
Hyperlink: https://github.com/kjur/jsrsasign/issues/598
Resource: N/A
Hyperlink: https://github.com/kjur/jsrsasign/releases/tag/11.0.0
Resource: N/A
Hyperlink: https://people.redhat.com/~hkario/marvin/
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
x_transferred
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
x_transferred
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
x_transferred
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
x_transferred
https://github.com/kjur/jsrsasign/issues/598
x_transferred
https://github.com/kjur/jsrsasign/releases/tag/11.0.0
x_transferred
https://people.redhat.com/~hkario/marvin/
x_transferred
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
Resource:
x_transferred
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
Resource:
x_transferred
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
Resource:
x_transferred
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
Resource:
x_transferred
Hyperlink: https://github.com/kjur/jsrsasign/issues/598
Resource:
x_transferred
Hyperlink: https://github.com/kjur/jsrsasign/releases/tag/11.0.0
Resource:
x_transferred
Hyperlink: https://people.redhat.com/~hkario/marvin/
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:report@snyk.io
Published At:22 Jan, 2024 | 05:15
Updated At:06 Mar, 2024 | 14:15

Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key. Workaround The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L
Type: Primary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L
CPE Matches

jsrsasign_project
jsrsasign_project
>>jsrsasign>>Versions before 11.0.0(exclusive)
cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-203Secondaryreport@snyk.io
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-203
Type: Secondary
Source: report@snyk.io
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/kjur/jsrsasign/issues/598report@snyk.io
Exploit
Issue Tracking
Vendor Advisory
https://github.com/kjur/jsrsasign/releases/tag/11.0.0report@snyk.io
Patch
Release Notes
https://people.redhat.com/~hkario/marvin/report@snyk.io
N/A
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734report@snyk.io
Patch
Third Party Advisory
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733report@snyk.io
Patch
Third Party Advisory
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732report@snyk.io
Patch
Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731report@snyk.io
Patch
Third Party Advisory
Hyperlink: https://github.com/kjur/jsrsasign/issues/598
Source: report@snyk.io
Resource:
Exploit
Issue Tracking
Vendor Advisory
Hyperlink: https://github.com/kjur/jsrsasign/releases/tag/11.0.0
Source: report@snyk.io
Resource:
Patch
Release Notes
Hyperlink: https://people.redhat.com/~hkario/marvin/
Source: report@snyk.io
Resource: N/A
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
Source: report@snyk.io
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
Source: report@snyk.io
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
Source: report@snyk.io
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
Source: report@snyk.io
Resource:
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2020-14002
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.81% / 73.25%
||
7 Day CHG~0.00%
Published-29 Jun, 2020 | 00:00
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PuTTY 0.68 through 0.73 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).

Action-Not Available
Vendor-puttyn/aNetApp, Inc.Fedora Project
Product-oncommand_unified_manager_core_packagefedoraputtyn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-7010
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.08%
||
7 Day CHG+0.02%
Published-29 Oct, 2024 | 12:48
Updated-14 Nov, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing Attack in mudler/localai

mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.

Action-Not Available
Vendor-mudlermudlermudler
Product-localaimudler/localailocalai
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-33880
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.19% / 41.33%
||
7 Day CHG~0.00%
Published-06 Jun, 2021 | 14:05
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack.

Action-Not Available
Vendor-websockets_projectn/aOracle Corporation
Product-communications_cloud_native_core_service_communication_proxycommunications_cloud_native_core_security_edge_protection_proxycommunications_cloud_native_core_unified_data_repositorywebsocketscommunications_cloud_native_core_policyn/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-1926
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-5.9||MEDIUM
EPSS-0.26% / 49.21%
||
7 Day CHG~0.00%
Published-16 Mar, 2021 | 13:00
Updated-13 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Timing attack in Cookie signature verification

Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8

Action-Not Available
Vendor-The Apache Software Foundation
Product-hiveApache Hive
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-5929
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.67% / 70.37%
||
7 Day CHG~0.00%
Published-25 Sep, 2020 | 13:22
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle. Similar error messages when PMS starts with 0 byte coupled with very precise timing measurement observation may also expose this vulnerability.

Action-Not Available
Vendor-n/aF5, Inc.
Product-big-ip_application_acceleration_managerbig-ip_advanced_web_application_firewallbig-ip_link_controllerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_servicebig-ip_global_traffic_managerbig-ip_analyticsbig-ip_access_policy_managerbig-ip_domain_name_systembig-ip_local_traffic_managerbig-ip_advanced_firewall_managerssl_orchestratorbig-ip_application_security_managerbig-ip_ddos_hybrid_defenderBIG-IP
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-2408
Matching Score-4
Assigner-PHP Group
ShareView Details
Matching Score-4
Assigner-PHP Group
CVSS Score-5.9||MEDIUM
EPSS-0.13% / 33.25%
||
7 Day CHG~0.00%
Published-09 Jun, 2024 | 19:55
Updated-21 Mar, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PHP is vulnerable to the Marvin Attack

The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. PHP Windows builds for the versions 8.1.29, 8.2.20 and 8.3.8 and above include OpenSSL patches that fix the vulnerability.

Action-Not Available
Vendor-phpThe PHP GroupFedora Project
Product-phpfedoraPHPphpfedora
CWE ID-CWE-203
Observable Discrepancy
  • Previous
  • 1
  • 2
  • Next
Details not found