Lucene search

K
githubGitHub Advisory DatabaseGHSA-5VW4-V588-PGV8
HistoryDec 28, 2022 - 12:30 a.m.

robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison

2022-12-2800:30:23
CWE-668
GitHub Advisory Database
github.com
18
token validation
side-channel
hmac
comparison
vulnerable
software

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

44.9%

Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.

Affected configurations

Vulners
Node
github.com\/natsio\/jwtRange<0.0.0-20170426191122-ca1404ee6e83

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

44.9%

Related for GHSA-5VW4-V588-PGV8