jose-php before 2.2.1 does not use constant-time operations for HMAC comparison, which makes it easier for remote attackers to obtain sensitive information via a timing attack, related to JWE.php and JWS.php.
References
Configurations
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/92743 - Third Party Advisory, VDB Entry | |
References | () https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b#diff-2a982d82ef0f673fd0ba2beba0e18420R138 - Patch | |
References | () https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R287 - Patch |
Information
Published : 2016-09-03 20:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5429
Mitre link : CVE-2016-5429
CVE.ORG link : CVE-2016-5429
JSON object : View
Products Affected
jose-php_project
- jose-php
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor