CVE-2024-0436
Severity:
HIGH
Type:
Unavailable / Other
Publication date:
26/02/2024
Last modified:
26/02/2024
Description
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.<br />
<br />
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH