Skip to content

express-basic-auth Timing Attack due to native string comparison instead of constant time string comparison

Low severity GitHub Reviewed Published Jun 6, 2019 to the GitHub Advisory Database • Updated Jan 11, 2023

Package

npm express-basic-auth (npm)

Affected versions

< 1.1.7

Patched versions

1.1.7

Description

Versions of express-basic-auth prior to 1.1.7 are vulnerable to Timing Attacks. The package uses native string comparison instead of a constant time string comparison, which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets.

Recommendation

Upgrade to version 1.1.7 or later.

References

Reviewed Jun 6, 2019
Published to the GitHub Advisory Database Jun 6, 2019
Last updated Jan 11, 2023

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Adjacent
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-c35v-qwqg-87jc
Checking history
See something to contribute? Suggest improvements for this vulnerability.