Логотип exploitDog
bind:CVE-2020-15237
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15237

Количество 2

Количество 2

nvd логотип

CVE-2020-15237

больше 5 лет назад

In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-5jjv-x4fq-qjwp

больше 5 лет назад

Possible timing attack in derivation_endpoint

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15237

In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

CVSS3: 5.9
0%
Низкий
больше 5 лет назад
github логотип
GHSA-5jjv-x4fq-qjwp

Possible timing attack in derivation_endpoint

CVSS3: 5.9
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу