JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.

Project Subscriptions

Vendors Products
Jhipster Subscribe
Jhipster Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2645 JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.
Github GHSA Github GHSA GHSA-4gpm-r23h-gprw generator-jhipster allows a timing attack against validateToken due to a string comparison that stops at the first character
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-06T18:28:17.077Z

Reserved: 2023-10-31T00:00:00.000Z

Link: CVE-2015-20110

cve-icon Vulnrichment

Updated: 2024-08-06T08:58:26.495Z

cve-icon NVD

Status : Modified

Published: 2023-10-31T03:15:07.613

Modified: 2024-11-21T02:26:34.023

Link: CVE-2015-20110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses