First published: Tue Jan 25 2022(Updated: )
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
Credit: reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | <5.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2021-43298.
The severity of CVE-2021-43298 is critical with a CVSS score of 9.8.
Embedthis GoAhead version up to 5.1.4 is affected by CVE-2021-43298.
An unauthenticated network attacker can brute-force the HTTP basic password by recording the webserver's response time.
Yes, upgrading to a version beyond 5.1.4 of Embedthis GoAhead is recommended to fix CVE-2021-43298.