Timing Attack Affecting yiisoft/yii2-authclient package, versions <2.2.15


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.16% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-YIISOFTYII2AUTHCLIENT-6131611
  • published19 Dec 2023
  • disclosed18 Dec 2023
  • creditrhertogh

Introduced: 18 Dec 2023

CVE-2023-50708  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade yiisoft/yii2-authclient to version 2.2.15 or higher.

Overview

Affected versions of this package are vulnerable to Timing Attack due to the use of regular string comparison for the state and nonce parameters. An attacker can potentially measure the time it takes for the comparison to occur and use this information to infer the correct value by performing a timing attack.

CVSS Scores

version 3.1