The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
References
Link | Resource |
---|---|
https://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904 | Issue Tracking Patch Third Party Advisory |
https://simplesamlphp.org/security/201703-02 | Issue Tracking Patch Third Party Advisory |
https://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904 | Issue Tracking Patch Third Party Advisory |
https://simplesamlphp.org/security/201703-02 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://simplesamlphp.org/security/201703-02 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-09-01 21:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12871
Mitre link : CVE-2017-12871
CVE.ORG link : CVE-2017-12871
JSON object : View
Products Affected
simplesamlphp
- simplesamlphp
CWE
CWE-326
Inadequate Encryption Strength