The code that performs password matching when using ...
Critical severity
Unreviewed
Published
Jan 26, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jan 25, 2022
Published to the GitHub Advisory Database
Jan 26, 2022
Last updated
Feb 3, 2023
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
References