The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsactionpack
is a web app builder and tester on Rails.
Affected versions of this Gem are vulnerable to a Timing Attack, via the basic authentication support in Action Controller. This can allow an attacker to determine basic authentication usernames and passwords.
Due to the way that Action Controller compares user names and passwords in basic authentication authorization code, it is possible for an attacker to analyze the time taken by a response and guess the password.
For example, the string comparison "foo" == "far"
is possibly faster than the comparison "foo" == "for"
, as "far"
has fewer characters in common with "foo"
.
Attackers can use this information to attempt to guess the username and password used in the basic authentication system, one character at a time.
You can tell your application is vulnerable to this attack by looking for http_basic_authenticate_with
method calls in your application.
You can read more about timing attacks (using Node.js as an example) on the Snyk blog: https://snyk.io/blog/node-js-timing-attack-ccc-ctf/