Inadequate Encryption Strength in SimpleSAMLphp



Published: 2017-09-01 | Updated: 2020-08-08
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12871
CWE-ID CWE-326
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SimpleSAMLphp
Web applications / Other software

Vendor SimpleSAMLphp

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Inadequate Encryption Strength

EUVDB-ID: #VU38369

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12871

CWE-ID: CWE-326 - Inadequate Encryption Strength

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).

Mitigation

Install update from vendor's website.

Vulnerable software versions

SimpleSAMLphp: 1.14.0 - 1.14.11

External links

http://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904
http://simplesamlphp.org/security/201703-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###