OpenFUN Richie Observable Timing Discrepancy in its sync_course_run_from_request function
Moderate severity
GitHub Reviewed
Published
Feb 25, 2026
to the GitHub Advisory Database
•
Updated Feb 26, 2026
Description
Published by the National Vulnerability Database
Feb 25, 2026
Published to the GitHub Advisory Database
Feb 25, 2026
Last updated
Feb 26, 2026
Reviewed
Feb 26, 2026
An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies.
References