Vulnerabilities > CVE-2024-0436 - Unspecified vulnerability in Mintplexlabs Anythingllm 0.0.1/0.1.0
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison. The risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
References
- https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0
- https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0
- https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268
- https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268