Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmj6-p2j9-68cp

Опубликовано: 13 янв. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.4

Описание

Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator

wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.

Пакеты

Наименование

org.wildfly.security:wildfly-elytron

maven
Затронутые версииВерсия исправления

< 1.15.15.Final

1.15.15.Final

Наименование

org.wildfly.security:wildfly-elytron

maven
Затронутые версииВерсия исправления

>= 1.16.0.CR1, < 1.20.3.Final

1.20.3.Final

EPSS

Процентиль: 65%
0.00499
Низкий

7.4 High

CVSS3

Дефекты

CWE-203
CWE-208

Связанные уязвимости

CVSS3: 7.4
redhat
больше 3 лет назад

wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.

CVSS3: 7.4
nvd
около 3 лет назад

wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.

EPSS

Процентиль: 65%
0.00499
Низкий

7.4 High

CVSS3

Дефекты

CWE-203
CWE-208