CVE-2021-43298Observable Timing Discrepancy in Goahead

Severity
9.8CRITICALNVD
EPSS
0.4%
top 40.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 25
Latest updateJan 26

Description

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5embedthis/goaheadunspecified5.1.4
NVDembedthis/goahead< 5.1.4

🔴Vulnerability Details

2
GHSA
GHSA-cfh2-3f5r-4vf9: The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting2022-01-26
CVEList
CVE-2021-43298: The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting2022-01-25
CVE-2021-43298 — Observable Timing Discrepancy | cvebase