Bump node-forge and react-scripts in /src/ContosoTraders.Ui.Website
Open
Number: #6
Type: Pull Request
State: Open
Type: Pull Request
State: Open
Author:
dependabot[bot]
Association: None
Comments: 0
Association: None
Comments: 0
Created:
June 18, 2025 at 07:26 AM UTC
(5 months ago)
(5 months ago)
Updated:
June 18, 2025 at 07:26 AM UTC
(5 months ago)
(5 months ago)
Labels:
dependencies javascript
dependencies javascript
Description:
Bumps node-forge to 1.3.1 and updates ancestor dependency react-scripts. These dependencies need to be updated together.
Updates node-forge from 0.10.0 to 1.3.1
Changelog
Sourced from node-forge's changelog.
1.3.1 - 2022-03-29
Fixes
- RFC 3447 and RFC 8017 allow for optional
DigestAlgorithmNULLparameters forsha*algorithms and requireNULLparamters formd2andmd5algorithms.1.3.0 - 2022-03-17
Security
- Three RSA PKCS#1 v1.5 signature verification issues were reported by Moosa Yahyazadeh (moosa-yahyazadeh@uiowa.edu).
- HIGH: Leniency in checking
digestAlgorithmstructure can lead to signature forgery.
- The code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.
- CVE ID: CVE-2022-24771
- GHSA ID: GHSA-cfm4-qjh2-4765
- HIGH: Failing to check tailing garbage bytes can lead to signature forgery.
- The code does not check for tailing garbage bytes after decoding a
DigestInfoASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. For more information, please see "Bleichenbacher's RSA signature forgery based on implementation error" by Hal Finney.- CVE ID: CVE-2022-24772
- GHSA ID: GHSA-x4jg-mjrx-434g
- MEDIUM: Leniency in checking type octet.
DigestInfois not properly checked for proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.- CVE ID: CVE-2022-24773
- GHSA ID: GHSA-2r2c-g63r-vccr
Fixed
- [asn1] Add fallback to pretty print invalid UTF8 data.
- [asn1]
fromDeris now more strict and will default to ensuring all input bytes are parsed or throw an error. A new optionparseAllBytescan disable this behavior.
- NOTE: The previous behavior is being changed since it can lead to security issues with crafted inputs. It is possible that code doing custom DER parsing may need to adapt to this new behavior and optional flag.
- [rsa] Add and use a validator to check for proper structure of parsed ASN.1
... (truncated)
Commits
a0a4a42Release 1.3.1.a33830fUpdate changelog.740954dAllow optional DigestAlgorithm parameters.56f4316Allow DigestInfo.DigestAlgorith.parameters to be optionalcbf0bd5Start 1.3.1-0.6c5b901Release 1.3.0.0f3972aUpdate changelog.dc77b39Fix error checking.bb822c0Add advisory links.d4395feUpdate changelog.- Additional commits viewable in compare view
Updates react-scripts from 3.4.4 to 5.0.1
Commits
19fa58dPublish9802941fix: webpack noise printed only if error or warning (#12245)2eef1d0Update templates to use React 18createRoot(#12220)221e511Publish5614c87Add support for Tailwind (#11717)20edab4fix(webpackDevServer): disable overlay for warnings (#11413)3afbbc0Update all dependencies (#11624)f5467d5feat(eslint-config-react-app): support ESLint 8.x (#11375)c7627ceUpdate webpack and dev server (#11646)544befeUpdate package.json (#11597)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Pull Request Statistics
Commits:
1
1
Files Changed:
2
2
Additions:
+17857
+17857
Deletions:
-19544
-19544
Package Dependencies
Package:
react-scripts
Ecosystem:
npm
npm
Version Change:
3.4.4 → 5.0.1
Update Type:
Major
Major
Path:
/src/ContosoTraders.Ui.Website
Package:
node-forge
Ecosystem:
npm
npm
Version Change:
0.10.0 → 1.3.1
Update Type:
Major
Major
Path:
/src/ContosoTraders.Ui.Website
Security Advisories
Improper Verification of Cryptographic Signature in node-forge
GHSA-x4jg-mjrx-434g
CVE-2022-24772
HIGH
### Impact
RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbag...
Improper Verification of Cryptographic Signature in node-forge
GHSA-cfm4-qjh2-4765
CVE-2022-24771
HIGH
### Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portio...
Improper Verification of Cryptographic Signature in `node-forge`
GHSA-2r2c-g63r-vccr
CVE-2022-24773
MODERATE
### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain inv...
Technical Details
| ID: | 1841767 |
| UUID: | 2600790522 |
| Node ID: | PR_kwDOO9kCV86bBOn6 |
| Host: | GitHub |
| Repository: | github-cloudlabsuser-676/aiw-devops-with-github-lab-files |
| Merge State: | Unknown |