Vulnerability Details : CVE-2022-40482
The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.
Exploit prediction scoring system (EPSS) score for CVE-2022-40482
Probability of exploitation activity in the next 30 days: 0.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 30 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-40482
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2022-40482
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-40482
-
https://github.com/laravel/framework/releases/tag/v9.32.0
Release v9.32.0 · laravel/framework · GitHubRelease Notes
-
https://github.com/laravel/framework/pull/44069
[8.x] Patch for timeless timing attack vulnerability in user login by JensJI · Pull Request #44069 · laravel/framework · GitHubPatch;Vendor Advisory
-
https://ephort.dk/blog/laravel-timing-attack-vulnerability/
Laravel timing attack vulnerabilityExploit;Technical Description;Third Party Advisory
-
https://github.com/ephort/laravel-user-enumeration-demo
GitHub - ephort/laravel-user-enumeration-demo: This repo contains demo code that was used to exploit user enumeration vulnerability in LaravelExploit;Third Party Advisory
Products affected by CVE-2022-40482
- cpe:2.3:a:laravel:framework:*:*:*:*:*:*:*:*