CVE-2024-0436

Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Configurations

Configuration 1 (hide)

cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*

History

27 Mar 2025, 11:15

Type Values Removed Values Added
CWE CWE-764 CWE-203
First Time Mintplexlabs anythingllm
Mintplexlabs
References () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 - () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 - Patch
References () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 - () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 - Third Party Advisory
CPE cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*
Summary (en) Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute (en) Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 5.9

21 Nov 2024, 08:46

Type Values Removed Values Added
References () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 - () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 -
References () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 - () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 -
Summary
  • (es) En teoría, sería posible que un atacante aplicara fuerza bruta a la contraseña de una instancia en modo de protección de contraseña de usuario único mediante un ataque de sincronización dada la naturaleza lineal del `!==` usado para la comparación. El riesgo se minimiza por la sobrecarga adicional de la solicitud, que varía de forma no constante, lo que hace que el ataque sea menos confiable de ejecutar.

26 Feb 2024, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2025-03-27 11:15


NVD link : CVE-2024-0436

Mitre link : CVE-2024-0436

CVE.ORG link : CVE-2024-0436


JSON object : View

Products Affected

mintplexlabs

  • anythingllm
CWE
CWE-203

Observable Discrepancy