blob: a4be45fec107edbbed3086b6bff25086f4e66147 [file] [log] [blame]
modules:
- module: github.com/robbert229/jwt
versions:
- fixed: 0.0.0-20170426191122-ca1404ee6e83
packages:
- package: github.com/robbert229/jwt
symbols:
- Algorithm.validateSignature
description: |
Token validation methods are susceptible to a timing side-channel
during HMAC comparison. With a large enough number of requests
over a low latency connection, an attacker may use this to determine
the expected HMAC.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-5vw4-v588-pgv8
references:
- fix: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654
- web: https://github.com/robbert229/jwt/issues/12
cve_metadata:
id: CVE-2015-10004
cwe: 'CWE 208: Information Exposure Through Timing Discrepancy'