Timing Attack Affecting django-basic-auth-ip-whitelist package, versions [,0.3.4)
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-DJANGOBASICAUTHIPWHITELIST-573160
- published 24 Jun 2020
- disclosed 24 Jun 2020
- credit Thibaud Colas
Introduced: 24 Jun 2020
CVE-2020-4071 Open this link in a new tabHow to fix?
Upgrade django-basic-auth-ip-whitelist
to version 0.3.4 or higher.
Overview
django-basic-auth-ip-whitelist is a Hide your Django site behind basic authentication mechanism with IP whitelisting support.
Affected versions of this package are vulnerable to Timing Attack. Potential timing attack exists on websites where the basic authentication is used or configured, i.e. BASIC_AUTH_LOGIN
and BASIC_AUTH_PASSWORD
is set. Currently the string comparison between configured credentials and the ones provided by users is performed through a character-by-character string comparison. This enables a possibility that attacker may time the time it takes the server to validate different usernames and password, and use this knowledge to work out the valid credentials.