Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hjhr-r3gq-qvp6

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью

Описание

Timing Attack in csrf-lite

Affected versions of csrf-lite are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison.

Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.

Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.

Recommendation

Update to version 0.1.2 or later.

Пакеты

Наименование

csrf-lite

npm
Затронутые версииВерсия исправления

< 0.1.2

0.1.2

EPSS

Процентиль: 53%
0.003
Низкий

Дефекты

CWE-208

Связанные уязвимости

CVSS3: 5.9
nvd
больше 7 лет назад

csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.

EPSS

Процентиль: 53%
0.003
Низкий

Дефекты

CWE-208