Description
The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.
Published: 2017-01-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-7921 The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.
History

Tue, 18 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Emarref
Emarref jwt
CPEs cpe:2.3:a:jwt_project:jwt:*:*:*:*:*:*:*:* cpe:2.3:a:emarref:jwt:*:*:*:*:*:*:*:*
Vendors & Products Jwt Project
Jwt Project jwt
Emarref
Emarref jwt

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T01:50:46.876Z

Reserved: 2016-08-23T00:00:00.000Z

Link: CVE-2016-7037

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-01-23T21:59:02.487

Modified: 2026-05-13T00:24:29.033

Link: CVE-2016-7037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses