logo

CVE-2022-29185 totp-rs

Package

Manager: cargo
Name: totp-rs
Vulnerable Version: >=0 <1.1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00342 pctl0.56174

Details

Observable Timing Discrepancy in totp-rs ### Impact Token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless. ### Patches Library now used constant-time comparison. ### Workarounds No. ### For more information If you have any questions or comments about this advisory: * Open an issue in [totp-rs](https://github.com/constantoine/totp-rs) * Email us at [cleo.rebert@gmail.com](mailto:cleo.rebert@gmail.com)

Metadata

Created: 2022-05-24T21:33:15Z
Modified: 2022-05-24T21:33:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8vxv-2g8p-2249/GHSA-8vxv-2g8p-2249.json
CWE IDs: ["CWE-203", "CWE-208"]
Alternative ID: GHSA-8vxv-2g8p-2249
Finding: F026
Auto approve: 1