Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-92vm-wfm5-mxvv

Опубликовано: 06 янв. 2020
Источник: github
Github: Прошло ревью
CVSS3: 4.4

Описание

cookie-signature Timing Attack

Affected versions of cookie-signature are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.

Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.

Under favorable network conditions, an attacker can exploit this to guess the secret in no more than charset*length guesses, instead of charset^length guesses required were the timing attack not present.

Recommendation

Update to 1.0.4 or later.

Пакеты

Наименование

cookie-signature

npm
Затронутые версииВерсия исправления

< 1.0.4

1.0.4

EPSS

Процентиль: 67%
0.00539
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 6 лет назад

Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.

CVSS3: 5.4
redhat
больше 11 лет назад

Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.

CVSS3: 4.4
nvd
около 6 лет назад

Node-cookie-signature before 1.0.6 is affected by a timing attack due to the type of comparison used.

CVSS3: 4.4
debian
около 6 лет назад

Node-cookie-signature before 1.0.6 is affected by a timing attack due ...

EPSS

Процентиль: 67%
0.00539
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-362