Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. jsrsasign
  4. ›
  5. GMS-2020-741

GMS-2020-741: ECDSA signature vulnerability of Minerva timing attack in jsrsasign

June 30, 2020 (updated September 22, 2021)

Impact

ECDSA side-channel attack named Minerava have been found and it was found that it affects to jsrsasign.

Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue.

  • Minerva is one of timing attack or side channel attack for EC.
  • If you don’t use ECDSA class, you are not affected the vulnerability.
  • The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing.
  • The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value.
  • After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory.

Patches

Users using ECDSA signature generation should upgrade to 8.0.13 or later.

Workarounds

There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library.

ACKNOWLEDGEMENT

Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability.

References

https://minerva.crocs.fi.muni.cz/ https://www.npmjs.com/advisories/1505 https://github.com/kjur/jsrsasign/issues/411

References

  • github.com/advisories/GHSA-g753-jx37-7xwh
  • github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73
  • github.com/kjur/jsrsasign/issues/411
  • github.com/kjur/jsrsasign/releases/tag/8.0.13
  • github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh
  • minerva.crocs.fi.muni.cz/
  • snyk.io/vuln/SNYK-JS-JSRSASIGN-561755
  • www.npmjs.com/advisories/1505

Code Behaviors & Features

Detect and mitigate GMS-2020-741 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0 before 8.0.13

Fixed versions

  • 8.0.13

Solution

Upgrade to version 8.0.13 or above.

Source file

npm/jsrsasign/GMS-2020-741.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:38 +0000.