{"id":"CVE-2024-0436","details":"Theoretically, it would be possible for an attacker to brute-force the password for an instance in single-user password protection mode via a timing attack given the linear nature of the `!==` used for comparison.\n\nThe risk is minified by the additional overhead of the request, which varies in a non-constant nature making the attack less reliable to execute","modified":"2026-03-14T12:29:44.004633Z","published":"2024-02-26T16:27:50.283Z","references":[{"type":"ADVISORY","url":"https://huntr.com/bounties/3e73cb96-c038-46a1-81b7-4d2215b36268"},{"type":"FIX","url":"https://github.com/mintplex-labs/anything-llm/commit/3c859ba3038121b67fb98e87dc52617fa27cbef0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mintplex-labs/anything-llm","events":[{"introduced":"0"},{"fixed":"013c0b9575ae6a87af87275e326041c4e0afeeee"},{"fixed":"3c859ba3038121b67fb98e87dc52617fa27cbef0"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0436.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}