Vulnerability Description
jose-php before 2.2.1 does not use constant-time operations for HMAC comparison, which makes it easier for remote attackers to obtain sensitive information via a timing attack, related to JWE.php and JWS.php.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jose-Php Project | Jose-Php | <= 2.2.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/92743Third Party AdvisoryVDB Entry
- https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b#Patch
- https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#Patch
- http://www.securityfocus.com/bid/92743Third Party AdvisoryVDB Entry
- https://github.com/nov/jose-php/commit/1cce55e27adf0274193eb1cd74b927a398a3df4b#Patch
- https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#Patch
FAQ
What is CVE-2016-5429?
CVE-2016-5429 is a vulnerability with a CVSS score of 3.7 (LOW). jose-php before 2.2.1 does not use constant-time operations for HMAC comparison, which makes it easier for remote attackers to obtain sensitive information via a timing attack, related to JWE.php and ...
How severe is CVE-2016-5429?
CVE-2016-5429 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5429?
Check the references section above for vendor advisories and patch information. Affected products include: Jose-Php Project Jose-Php.