Lucene search

K
osvGoogleOSV:GHSA-92VM-WFM5-MXVV
HistoryJan 06, 2020 - 6:44 p.m.

cookie-signature Timing Attack

2020-01-0618:44:10
Google
osv.dev
6

0.002 Low

EPSS

Percentile

62.1%

Affected versions of cookie-signature are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.

Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.

Under favorable network conditions, an attacker can exploit this to guess the secret in no more than charset*length guesses, instead of charset^length guesses required were the timing attack not present.

Recommendation

Update to 1.0.4 or later.

CPENameOperatorVersion
cookie-signaturelt1.0.4

0.002 Low

EPSS

Percentile

62.1%