blob: c0c758157fe50002d6c4897b0de111767c801068 [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2020-0023",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2015-10004",
"GHSA-5vw4-v588-pgv8"
],
"summary": "Timing side-channel in github.com/robbert229/jwt",
"details": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.",
"affected": [
{
"package": {
"name": "github.com/robbert229/jwt",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20170426191122-ca1404ee6e83"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/robbert229/jwt",
"symbols": [
"Algorithm.Validate",
"Algorithm.validateSignature"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654"
},
{
"type": "WEB",
"url": "https://github.com/robbert229/jwt/issues/12"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0023",
"review_status": "REVIEWED"
}
}