robbert229/jwt's token validation methods vulnerable to a timing side-channel during HMAC comparison
High severity
GitHub Reviewed
Published
Dec 28, 2022
to the GitHub Advisory Database
•
Updated May 20, 2024
Package
Affected versions
< 0.0.0-20170426191122-ca1404ee6e83
Patched versions
0.0.0-20170426191122-ca1404ee6e83
Description
Published by the National Vulnerability Database
Dec 27, 2022
Published to the GitHub Advisory Database
Dec 28, 2022
Reviewed
Dec 30, 2022
Last updated
May 20, 2024
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
References