Miggo Logo

CVE-2021-4294: OpenShift OSIN vulnerable to Observable Timing Discrepancy

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.32387%
Published
12/28/2022
Updated
3/1/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/openshift/osingo< 1.0.2-0.20210113124101-8612686d6dda1.0.2-0.20210113124101-8612686d6dda

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using insecure string comparisons in authentication checks. Both functions originally used direct equality checks (==) which have variable execution times depending on input matches. The patch replaced these with crypto/subtle.ConstantTimeCompare to ensure constant-time comparisons. The commit diff clearly shows these functions were modified to address timing vulnerabilities, and the CWE-208 classification directly matches this type of weakness.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in Op*nS*i*t OSIN. It **s ***n *l*ssi*i** *s pro*l*m*ti*. T*is *****ts t** *un*tion `*li*ntS**r*tM*t***s/****k*li*ntS**r*t`. T** m*nipul*tion o* t** *r*um*nt s**r*t l***s to o*s*rv**l* timin* *is*r*p*n*y. T** n*m* o* t** p*t

Reasoning

T** vuln*r**ility st*ms *rom usin* ins**ur* strin* *omp*risons in *ut**nti**tion ****ks. *ot* *un*tions ori*in*lly us** *ir**t *qu*lity ****ks (==) w*i** **v* v*ri**l* *x**ution tim*s **p*n*in* on input m*t***s. T** p*t** r*pl**** t**s* wit* *rypto/s