{ "schema_version": "1.4.0", "id": "GHSA-jmj6-p2j9-68cp", "modified": "2023-01-25T21:37:25Z", "published": "2023-01-13T06:30:22Z", "aliases": [ "CVE-2022-3143" ], "summary": "Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator", "details": "wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows an attacker to access secure information or impersonate an authed user.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "affected": [ { "package": { "ecosystem": "Maven", "name": "org.wildfly.security:wildfly-elytron" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.15.15.Final" } ] } ] }, { "package": { "ecosystem": "Maven", "name": "org.wildfly.security:wildfly-elytron" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.16.0.CR1" }, { "fixed": "1.20.3.Final" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3143" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2022-3143" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124682" }, { "type": "PACKAGE", "url": "https://github.com/wildfly-security/wildfly-elytron" } ], "database_specific": { "cwe_ids": [ "CWE-203", "CWE-208" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-01-13T21:32:28Z", "nvd_published_at": "2023-01-13T06:15:00Z" } }