Skip to content

cookie-signature Timing Attack

Moderate severity GitHub Reviewed Published Jan 6, 2020 to the GitHub Advisory Database • Updated Jan 11, 2023

Package

npm cookie-signature (npm)

Affected versions

< 1.0.4

Patched versions

1.0.4

Description

Affected versions of cookie-signature are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.

Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.

Under favorable network conditions, an attacker can exploit this to guess the secret in no more than charset*length guesses, instead of charset^length guesses required were the timing attack not present.

Recommendation

Update to 1.0.4 or later.

References

Reviewed Dec 27, 2019
Published to the GitHub Advisory Database Jan 6, 2020
Last updated Jan 11, 2023

Severity

Moderate
4.4
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

Weaknesses

CVE ID

CVE-2016-1000236

GHSA ID

GHSA-92vm-wfm5-mxvv
Checking history
See something to contribute? Suggest improvements for this vulnerability.