logo

CVE-2022-3143 org.wildfly.security:wildfly-elytron

Package

Manager: maven
Name: org.wildfly.security:wildfly-elytron
Vulnerable Version: >=0 <1.15.15.final || >=1.16.0.cr1 <1.20.3.final

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00229 pctl0.4556

Details

Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows an attacker to access secure information or impersonate an authed user.

Metadata

Created: 2023-01-13T06:30:22Z
Modified: 2023-01-25T21:37:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-jmj6-p2j9-68cp/GHSA-jmj6-p2j9-68cp.json
CWE IDs: ["CWE-203", "CWE-208"]
Alternative ID: GHSA-jmj6-p2j9-68cp
Finding: F063
Auto approve: 1