Описание
express-basic-auth Timing Attack due to native string comparison instead of constant time string comparison
Versions of express-basic-auth prior to 1.1.7 are vulnerable to Timing Attacks. The package uses native string comparison instead of a constant time string comparison, which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets.
Recommendation
Upgrade to version 1.1.7 or later.
Ссылки
- https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263
- https://github.com/LionC/express-basic-auth/pull/20
- https://github.com/LionC/express-basic-auth/pull/21
- https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f
- https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345
- https://www.npmjs.com/advisories/827
Пакеты
Наименование
express-basic-auth
npm
Затронутые версииВерсия исправления
< 1.1.7
1.1.7
3.1 Low
CVSS3
Дефекты
CWE-208
3.1 Low
CVSS3
Дефекты
CWE-208