Skip to content

Login timing attack in ibexa/core

Critical severity GitHub Reviewed Published May 31, 2022 in ibexa/core • Updated Jan 11, 2023

Package

composer ibexa/core (Composer)

Affected versions

>= 4.0.0, < 4.0.7
>= 4.1.0, < 4.1.4

Patched versions

4.0.7
4.1.4

Description

Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant time functionality, configured in the new security.yml parameter 'ibexa.security.authentication.constant_auth_time'. It will log a warning if the constant time is exceeded. If this happens the setting should be increased.

References

@glye glye published to ibexa/core May 31, 2022
Published to the GitHub Advisory Database Jun 2, 2022
Reviewed Jun 2, 2022
Last updated Jan 11, 2023

Severity

Critical

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-2x4v-g8cx-jxrq

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.