Lucene search

K
githubGitHub Advisory DatabaseGHSA-66M4-GC8H-HPJX
HistoryMar 12, 2023 - 6:30 a.m.

Timing attack in eZ Platform Ibexa

2023-03-1206:30:21
CWE-362
GitHub Advisory Database
github.com
10
ibexa dxp
timing attack
user accounts
privacy
security configuration
constant time
warning log
software

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

34.5%

Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter ‘ibexa.security.authentication.constant_auth_time’. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.

Affected configurations

Vulners
Node
ezsystemsezpublish-kernelRange<7.5.29
OR
ezsystemsezplatform-kernelRange<1.3.19

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

34.5%

Related for GHSA-66M4-GC8H-HPJX