Vulnerability identifier: #VU38369
Vulnerability risk: Medium
CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-326
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SimpleSAMLphp
Web applications /
Other software
Vendor: SimpleSAMLphp
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
Mitigation
Install update from vendor's website.
Vulnerable software versions
SimpleSAMLphp: 1.14.0 - 1.14.11
External links
http://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904
http://simplesamlphp.org/security/201703-02
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.