Timing Attack Affecting org.neo4j:neo4j-security package, versions [,3.0.12)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Timing Attack vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGNEO4J-31600
  • published29 Nov 2017
  • disclosed26 Sept 2017
  • creditUnknown

Introduced: 26 Sep 2017

CVE NOT AVAILABLE CWE-310  (opens in a new tab)

How to fix?

Upgrade neo4j-security to version 3.0.12 or higher.

Overview

org.neo4j:neo4j-security is the world’s leading Graph Database. It is a high performance graph store with all the features expected of a mature and robust database, like a friendly query language and ACID transactions.

Affected versions of the package are vulnerable to Timing Attack due to using the Arrays.equals to validate the password, which is vulnerable to a brute force attacks by malicious users.

CVSS Scores

version 3.1