CVE-2017-11133

An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. To encrypt messages, AES in CBC mode is used with a pseudo-random secret. This secret and the IV are generated with math.random() in previous versions and with CryptoJS.lib.WordArray.random() in newer versions, which uses math.random() internally. This is not cryptographically strong.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Jul/90 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2017/Jul/90 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*

Configuration 2 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*

Configuration 3 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/Jul/90 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Jul/90 - Mailing List, Third Party Advisory

Information

Published : 2017-08-01 14:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11133

Mitre link : CVE-2017-11133

CVE.ORG link : CVE-2017-11133


JSON object : View

Products Affected

stashcat

  • heinekingmedia
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm