cookie-signature Timing Attack
Moderate severity
GitHub Reviewed
Published
Jan 6, 2020
to the GitHub Advisory Database
•
Updated Jan 11, 2023
Description
Reviewed
Dec 27, 2019
Published to the GitHub Advisory Database
Jan 6, 2020
Last updated
Jan 11, 2023
Affected versions of
cookie-signature
are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.
Under favorable network conditions, an attacker can exploit this to guess the secret in no more than
charset*length
guesses, instead ofcharset^length
guesses required were the timing attack not present.Recommendation
Update to 1.0.4 or later.
References