Lucene search

K
githubGitHub Advisory DatabaseGHSA-5VW4-V588-PGV8
HistoryDec 28, 2022 - 12:30 a.m.

robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison

2022-12-2800:30:23
CWE-668
GitHub Advisory Database
github.com
23
token validation
side-channel
hmac
comparison
vulnerable
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.5%

Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.

Affected configurations

Vulners
Node
robbert229jwtRange<0.0.0-20170426191122-ca1404ee6e83
VendorProductVersionCPE
robbert229jwt*cpe:2.3:a:robbert229:jwt:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

45.5%

Related for GHSA-5VW4-V588-PGV8