Описание
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
Ссылки
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- PatchVendor Advisory
- PatchThird Party Advisory
- Issue TrackingThird Party Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:json_web_token_project:json_web_token:-:*:*:*:*:go:*:*
EPSS
Процентиль: 55%
0.00323
Низкий
7.5 High
CVSS3
Дефекты
CWE-668
Связанные уязвимости
CVSS3: 7.5
github
около 3 лет назад
robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison
EPSS
Процентиль: 55%
0.00323
Низкий
7.5 High
CVSS3
Дефекты
CWE-668