Description
JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2645 | JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters. |
Github GHSA |
GHSA-4gpm-r23h-gprw | generator-jhipster allows a timing attack against validateToken due to a string comparison that stops at the first character |
References
History
Wed, 18 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-06T18:28:17.077Z
Reserved: 2023-10-31T00:00:00.000Z
Link: CVE-2015-20110
Updated: 2024-08-06T08:58:26.495Z
Status : Modified
Published: 2023-10-31T03:15:07.613
Modified: 2024-11-21T02:26:34.023
Link: CVE-2015-20110
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA