Vulnerability Description
php-jwt 1.0.0 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zihanggao | Php-Jwt | 1.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/P3ngu1nW/CVE_Request/blob/main/cdoco%3Aphp-jwt.mdExploitThird Party Advisory
- https://github.com/P3ngu1nW/CVE_Request/blob/main/cdoco%3Aphp-jwt.mdExploitThird Party Advisory
FAQ
What is CVE-2024-25191?
CVE-2024-25191 is a vulnerability with a CVSS score of 9.8 (CRITICAL). php-jwt 1.0.0 uses strcmp (which is not constant time) to verify authentication, which makes it easier to bypass authentication via a timing side channel.
How severe is CVE-2024-25191?
CVE-2024-25191 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-25191?
Check the references section above for vendor advisories and patch information. Affected products include: Zihanggao Php-Jwt.