<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jsrsasign — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/jsrsasign/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 06:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/jsrsasign/feed.xml" rel="self" type="application/rss+xml"/><item><title>Jsrsasign &lt; 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)</title><link>https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-vuln/</link><pubDate>Mon, 23 Mar 2026 06:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-vuln/</guid><description>Jsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.</description><content:encoded>&lt;p>Jsrsasign is a free open source cryptography library for JavaScript. Versions before 11.1.1 contain an incorrect conversion between numeric types due to improper handling of negative exponents in the &lt;code>ext/jsbn2.js&lt;/code> file. This vulnerability, identified as CVE-2026-4602, allows an attacker to force the computation of incorrect modular inverses, leading to the potential breakage of signature verification. The vulnerability was reported and patched in March 2026. This could allow an attacker to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>jsrsasign</category><category>vulnerability</category><category>signature-bypass</category></item><item><title>Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)</title><link>https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-infinite-loop/</link><pubDate>Mon, 23 Mar 2026 06:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-infinite-loop/</guid><description>Jsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.</description><content:encoded><![CDATA[<p>The jsrsasign library, a popular JavaScript library for implementing cryptography standards, is susceptible to a denial-of-service vulnerability. Specifically, versions prior to 11.1.1 are vulnerable to CVE-2026-4598, where the <code>bnModInverse</code> function within <code>ext/jsbn2.js</code> can enter an infinite loop when processing zero or negative inputs to the <code>BigInteger.modInverse</code> function. An attacker can exploit this by providing maliciously crafted values (e.g., <code>modInverse(0, m)</code> or `modInverse(-1…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>javascript</category><category>node.js</category><category>jsrsasign</category><category>vulnerability</category></item><item><title>jsrsasign DSA Signing Vulnerability (CVE-2026-4601)</title><link>https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-dsa/</link><pubDate>Mon, 23 Mar 2026 06:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jsrsasign-dsa/</guid><description>jsrsasign versions before 11.1.1 are vulnerable to a missing cryptographic step in the DSA signing implementation, allowing an attacker to recover the private key by manipulating the signature generation process.</description><content:encoded><![CDATA[<p>A vulnerability exists in jsrsasign versions prior to 11.1.1, specifically within the <code>KJUR.crypto.DSA.signWithMessageHash</code> function used for DSA signing. This flaw, identified as CVE-2026-4601, stems from a missing cryptographic step during signature generation. An attacker can exploit this by manipulating the process to force either the &lsquo;r&rsquo; or &rsquo;s&rsquo; component of the signature to be zero. When this occurs, the library generates an invalid signature without retry, which then allows the attacker…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>jsrsasign</category><category>dsa</category><category>missing-cryptographic-step</category><category>CVE-2026-4601</category></item></channel></rss>