l8w8jwt 2.2.1 uses memcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.
References
Link | Resource |
---|---|
https://github.com/P3ngu1nW/CVE_Request/blob/main/GlitchedPolygons%3Al8w8jwt.md | Exploit Third Party Advisory |
https://github.com/P3ngu1nW/CVE_Request/blob/main/GlitchedPolygons%3Al8w8jwt.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-08 17:15
Updated : 2024-11-21 09:00
NVD link : CVE-2024-25190
Mitre link : CVE-2024-25190
CVE.ORG link : CVE-2024-25190
JSON object : View
Products Affected
glitchedpolygons
- l8w8jwt
CWE
CWE-203
Observable Discrepancy