Timing Attack Affecting twilio package, versions [3.0.0,3.5.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-TWILIO-40494
  • published20 May 2013
  • disclosed20 May 2013
  • creditZachary Voase

Introduced: 20 May 2013

CVE NOT AVAILABLE CWE-208  (opens in a new tab)

Overview

twilio is a Twilio API client and TwiML generator.

Affected versions of this package are vulnerable to Timing Attacks. twilio.util.RequestValidator uses == to compare signatures, and this operation is designed to return a value as quickly as possible, meaning the signature check will take a variable amount of time based on how "correct" the submitted signature is. An attacker can use this timing information to determine the correct signature, one character at a time.

CVSS Base Scores

version 3.1