CVE-2024-0436
MEDIUMMintplexlabs Anythingllm < 1.0.0 - Information Disclosure
Title source: ruleDescription
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Scores
CVSS v3
5.9
EPSS
0.0021
EPSS Percentile
43.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-203
Status
published
Products (1)
mintplexlabs/anythingllm
< 1.0.0
Published
Feb 26, 2024
Tracked Since
Feb 18, 2026