Advertisement






Apache Tapestry 5.3.6 HMAC Timing Attack

CVE Category Price Severity
CVE-2019-10071 CWE-430 $5000 High
Author Risk Exploitation Type Date
Unknown High Remote 2019-08-27
CPE
cpe:cpe:/a:apache:tapestry:5.3.6
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N 0.03013 0.58994

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019080140

Below is a copy:

Apache Tapestry 5.3.6 HMAC Timing Attack
CVE-2019-10071: Timing Attack in HMAC Verification in Apache Tapestry

Affected versions:
- Apache Tapestry 5.3.6 through current releases.

Description:
Apache Tapestry uses HMACs to verify the integrity of objects stored on the
client side.  This was added to address the Java deserialization
vulnerability
disclosed in CVE-2014-1972.  In the fix for the previous vulnerability, the
HMACs were compared by string comparison, which is known to be vulnerable to
timing attacks.

Mitigation:
No new release of Tapestry has occurred since the issue was reported.
Affected
organizations may want to consider locally applying commit
d3928ad44714b949d247af2652c84dae3c27e1b1.

Timeline:
- 2019-03-12: Issue discovered.
- 2019-03-13: Issue reported to [email protected].
- 2019-03-29: Pinged thread to ask for update.
- 2019-04-19: Fix committed.
- 2019-04-23: Asked about release timeline, response "in the upcoming
months"
- 2019-05-28: Pinging again about release.
- 2019-06-24: Asked again, asked for CVE number assigned.  No update on
  timeline.
- 2019-08-22: Disclosure posted.

This vulnerability was discovered by David Tomaschik of the Google Security
Team.

-- 
David Tomaschik
Security Engineer
ISA Assessments


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum