Description
The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-7921 | The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack. |
References
History
Tue, 18 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Emarref
Emarref jwt |
|
| CPEs | cpe:2.3:a:emarref:jwt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jwt Project
Jwt Project jwt |
Emarref
Emarref jwt |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:50:46.876Z
Reserved: 2016-08-23T00:00:00.000Z
Link: CVE-2016-7037
No data.
Status : Modified
Published: 2017-01-23T21:59:02.487
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-7037
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD