Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:44082
HistoryNov 01, 2023 - 4:14 a.m.

Timing Attack

2023-11-0104:14:08
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7
timing attack
generator-jhipster
insecure comparison
_tokenprovider.java
guess tokens
timing observations

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

31.3%

generator-jhipster is vulnerable to a Timing Attack. The vulnerability exists because the _TokenProvider.java uses String.equals(str) to compare the given token-signature. This comparison method does not effectively validate the token because it stops as soon as it encounters the first character that differs. This behavior opens up a vulnerability that allows an attacker to guess tokens through brute-force attacks, attempting one character at a time and using timing observations to discern the correct character.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

31.3%