Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cg5m-p8pg-93cg

Опубликовано: 26 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.1

Описание

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the !== used for comparison.

The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the !== used for comparison.

The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute

EPSS

Процентиль: 51%
0.00279
Низкий

7.1 High

CVSS3

Дефекты

CWE-203
CWE-764

Связанные уязвимости

CVSS3: 5.9
nvd
почти 2 года назад

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute

EPSS

Процентиль: 51%
0.00279
Низкий

7.1 High

CVSS3

Дефекты

CWE-203
CWE-764