Timing Attack Affecting actionpack package, versions < 5.0.0.beta1.1, >= 4.3< 4.2.5.1, >= 4.2< 4.1.14.1, >= 3.2.23< 3.2.22.1


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
1.34% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-ACTIONPACK-20258
  • published24 Jan 2016
  • disclosed24 Jan 2016
  • creditDaniel Waterworth

Introduced: 24 Jan 2016

CVE-2015-7576  (opens in a new tab)
CWE-208  (opens in a new tab)

Overview

actionpack is a web app builder and tester on Rails.

Affected versions of this Gem are vulnerable to a Timing Attack, via the basic authentication support in Action Controller. This can allow an attacker to determine basic authentication usernames and passwords.

Details

Due to the way that Action Controller compares user names and passwords in basic authentication authorization code, it is possible for an attacker to analyze the time taken by a response and guess the password.

For example, the string comparison "foo" == "far" is possibly faster than the comparison "foo" == "for", as "far" has fewer characters in common with "foo". Attackers can use this information to attempt to guess the username and password used in the basic authentication system, one character at a time.

You can tell your application is vulnerable to this attack by looking for http_basic_authenticate_with method calls in your application.

You can read more about timing attacks (using Node.js as an example) on the Snyk blog: https://snyk.io/blog/node-js-timing-attack-ccc-ctf/

CVSS Scores

version 3.1