Vulnerabilities > CVE-2023-32691 - Information Exposure Through Discrepancy vulnerability in GO Simple Tunnel Project GO Simple Tunnel

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
high complexity
go-simple-tunnel-project
CWE-203

Summary

gost (GO Simple Tunnel) is a simple tunnel written in golang. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparison function. Untrusted input, sourced from a HTTP header, is compared directly with a secret. Since this comparison is not secure, an attacker can mount a side-channel timing attack to guess the password. As a workaround, this can be easily fixed using a constant time comparing function such as `crypto/subtle`'s `ConstantTimeCompare`.

Vulnerable Configurations

Part Description Count
Application
Go_Simple_Tunnel_Project
47

Common Weakness Enumeration (CWE)