H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections.
This issue is fixed in version 2.0.1-rc.9.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 9
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
H3 H3
cpe:2.3:a:h3:h3:2.0.0:*:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc1:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc2:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc3:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc4:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc5:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc6:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc7:*:*:*:node.js:*:*
|
— | — |
|
H3 H3
cpe:2.3:a:h3:h3:2.0.1:rc8:*:*:*:node.js:*:*
|
— | — |