CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-0436: Prevent timing attack for single-user password check

7.1 CVSS

Description

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.

The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute

Classification

CVE ID: CVE-2024-0436

CVSS Base Severity: HIGH

CVSS Base Score: 7.1

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem Types

CWE-203 Observable Discrepancy

Affected Products

Vendor: mintplex-labs

Product: mintplex-labs/anything-llm

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.16% (probability of being exploited)

EPSS Percentile: 37.6% (scored less or equal to compared to others)

EPSS Date: 2025-04-25 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-0436
https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268
https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0

Timeline