Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cfh2-3f5r-4vf9

Опубликовано: 26 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.

EPSS

Процентиль: 59%
0.00378
Низкий

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 9.8
nvd
около 4 лет назад

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.

EPSS

Процентиль: 59%
0.00378
Низкий

Дефекты

CWE-307