| { |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0", |
| "cveMetadata": { |
| "cveId": "CVE-2015-10004" |
| }, |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| }, |
| "title": "Timing side-channel in github.com/robbert229/jwt", |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC." |
| } |
| ], |
| "affected": [ |
| { |
| "vendor": "github.com/robbert229/jwt", |
| "product": "github.com/robbert229/jwt", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "github.com/robbert229/jwt", |
| "versions": [ |
| { |
| "version": "0", |
| "lessThan": "0.0.0-20170426191122-ca1404ee6e83", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ], |
| "programRoutines": [ |
| { |
| "name": "Algorithm.validateSignature" |
| }, |
| { |
| "name": "Algorithm.Validate" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "lang": "en", |
| "description": "CWE 208: Information Exposure Through Timing Discrepancy" |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654" |
| }, |
| { |
| "url": "https://github.com/robbert229/jwt/issues/12" |
| }, |
| { |
| "url": "https://pkg.go.dev/vuln/GO-2020-0023" |
| } |
| ] |
| } |
| } |
| } |