Home / Vulnerability Database / Scala : Timing attack
Scala
Scala : Timing attack
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
CWE
Overview
The method of string comparison is used that does not protect against timing attacks.
Common methods of string comparison terminate the operation after handling the first non-equal pair of characters. Thus, the operating time of the method depends on the length of the matching prefixes. An attacker can use this information to compromise valuable data. When working with the valuable data, such as encryption keys, secure methods of comparison must be used.
CRITICAL
DerScanner Severity Score
Do you want to fix Scala : Timing attack in your application?
See also
Scala
Scala : Unreleased resource stream
Scala
Scala : Multiple loggers in same class
Scala
