Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
References
Configurations
History
No history.
Information
Published : 2024-02-26 16:27
Updated : 2025-03-27 11:15
NVD link : CVE-2024-0436
Mitre link : CVE-2024-0436
CVE.ORG link : CVE-2024-0436
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
CWE-203
Observable Discrepancy
