@csrf-armor/core is vulnerable to Observable Timing Discrepancy
27
Low Risk
Affected versions of this package contain CSRF token validation logic vulnerable to timing side-channel attacks due to non-constant time comparisons and weak secret generation. An attacker could exploit subtle response timing differences when comparing CSRF tokens to iteratively infer valid token values, enabling CSRF bypass or unauthorized state-changing requests. Additionally, low-entropy, improperly encoded secrets reduce brute-force resistance, compounding the risk when combined with timing analysis.
You are affected if you are using a version that falls within the vulnerable range.
@csrf-armor/core is vulnerable to Observable Timing Discrepancy in versions 0.0.1 - 1.2.0.
Upgrade the @csrf-armor/core library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant