l8w8jwt 2.2.1 uses memcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.
References
Link | Resource |
---|---|
https://github.com/P3ngu1nW/CVE_Request/blob/main/GlitchedPolygons%3Al8w8jwt.md | Exploit Third Party Advisory |
Configurations
History
15 Feb 2024, 05:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:glitchedpolygons:l8w8jwt:2.2.1:*:*:*:*:*:*:* | |
References | () https://github.com/P3ngu1nW/CVE_Request/blob/main/GlitchedPolygons%3Al8w8jwt.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-203 | |
First Time |
Glitchedpolygons l8w8jwt
Glitchedpolygons |
08 Feb 2024, 18:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-08 17:15
Updated : 2024-08-19 20:35
NVD link : CVE-2024-25190
Mitre link : CVE-2024-25190
CVE.ORG link : CVE-2024-25190
JSON object : View
Products Affected
glitchedpolygons
- l8w8jwt
CWE
CWE-203
Observable Discrepancy