Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:04:49.780Z
Reserved: 2024-01-11T18:58:30.511Z
Link: CVE-2024-0436

Updated: 2024-08-01T18:04:49.780Z

Status : Awaiting Analysis
Published: 2024-02-26T16:27:50.283
Modified: 2024-11-21T08:46:35.243
Link: CVE-2024-0436

No data.