Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.
The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
References
Configurations
History
27 Mar 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
First Time |
Mintplexlabs anythingllm
Mintplexlabs |
|
References | () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 - Patch | |
References | () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 - Third Party Advisory | |
CPE | cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:* | |
Summary | (en) Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0 - | |
References | () https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268 - | |
Summary |
|
26 Feb 2024, 16:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-26 16:27
Updated : 2025-03-27 11:15
NVD link : CVE-2024-0436
Mitre link : CVE-2024-0436
CVE.ORG link : CVE-2024-0436
JSON object : View
Products Affected
mintplexlabs
- anythingllm
CWE
CWE-203
Observable Discrepancy