logo

CVE-2016-10535 csrf-lite

Package

Manager: npm
Name: csrf-lite
Vulnerable Version: >=0 <0.1.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00316 pctl0.54083

Details

Timing Attack in csrf-lite Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present. ## Recommendation Update to version 0.1.2 or later.

Metadata

Created: 2019-02-18T23:39:44Z
Modified: 2020-08-31T18:10:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-hjhr-r3gq-qvp6/GHSA-hjhr-r3gq-qvp6.json
CWE IDs: ["CWE-208"]
Alternative ID: GHSA-hjhr-r3gq-qvp6
Finding: F063
Auto approve: 1