Lucene search

K
githubGitHub Advisory DatabaseGHSA-4GPM-R23H-GPRW
HistoryOct 31, 2023 - 3:31 a.m.

generator-jhipster allows a timing attack against validateToken due to a string comparison that stops at the first character

2023-10-3103:31:22
CWE-208
CWE-307
GitHub Advisory Database
github.com
11
jhipster
generator-jhipster
timing attack
validatetoken
string comparison
vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

31.3%

JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.

Affected configurations

Vulners
Node
jhipstergenerator-jhipster-kotlinRange<2.23.0
VendorProductVersionCPE
jhipstergenerator-jhipster-kotlin*cpe:2.3:a:jhipster:generator-jhipster-kotlin:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

31.3%