Loading HuntDB...

CVE-2016-10535

UNKNOWN
Published 2018-05-31T20:00:00Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2016-10535. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Timing Attack in csrf-lite

GHSA-hjhr-r3gq-qvp6

Advisory Details

Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present. ## Recommendation Update to version 0.1.2 or later.

Affected Packages

npm csrf-lite
ECOSYSTEM: ≥0 <0.1.2

CVSS Scoring

CVSS Score

7.5

Advisory provided by GitHub Security Advisory Database. Published: February 18, 2019, Modified: August 31, 2020

References

Published: 2018-05-31T20:00:00Z
Last Modified: 2024-09-17T01:30:58.704Z
Copied to clipboard!