Description
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-30241 | The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response. |
References
| Link | Providers |
|---|---|
| https://github.com/embedthis/goahead/issues/304 |
|
History
No history.
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-08-04T03:55:28.938Z
Reserved: 2021-11-03T00:00:00.000Z
Link: CVE-2021-43298
No data.
Status : Modified
Published: 2022-01-25T20:15:08.510
Modified: 2024-11-21T06:29:01.873
Link: CVE-2021-43298
No data.
OpenCVE Enrichment
No data.
EUVD