CVE-2022-29185 – totp-rs
Package
Manager: cargo
Name: totp-rs
Vulnerable Version: >=0 <1.1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00342 pctl0.56174
Details
Observable Timing Discrepancy in totp-rs ### Impact Token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless. ### Patches Library now used constant-time comparison. ### Workarounds No. ### For more information If you have any questions or comments about this advisory: * Open an issue in [totp-rs](https://github.com/constantoine/totp-rs) * Email us at [cleo.rebert@gmail.com](mailto:cleo.rebert@gmail.com)
Metadata
Created: 2022-05-24T21:33:15Z
Modified: 2022-05-24T21:33:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8vxv-2g8p-2249/GHSA-8vxv-2g8p-2249.json
CWE IDs: ["CWE-203", "CWE-208"]
Alternative ID: GHSA-8vxv-2g8p-2249
Finding: F026
Auto approve: 1