CVE-2017-5999

An issue was discovered in sysPass 2.x before 2.1, in which an algorithm was never sufficiently reviewed by cryptographers. The fact that inc/SP/Core/Crypt.class is using the MCRYPT_RIJNDAEL_256() function (the 256-bit block version of Rijndael, not AES) instead of MCRYPT_RIJNDAEL_128 (real AES) could help an attacker to create unknown havoc in the remote system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:syspass:syspass:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96562 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96562 - Third Party Advisory, VDB Entry
References () https://cxsecurity.com/issue/WLB-2017020196 - Third Party Advisory () https://cxsecurity.com/issue/WLB-2017020196 - Third Party Advisory
References () https://github.com/nuxsmin/sysPass/commit/a0e2c485e53b370a7cc6d833e192c3c5bfd70e1f - Patch () https://github.com/nuxsmin/sysPass/commit/a0e2c485e53b370a7cc6d833e192c3c5bfd70e1f - Patch
References () https://github.com/nuxsmin/sysPass/releases/tag/2.1.0.17022601 - Patch, Release Notes () https://github.com/nuxsmin/sysPass/releases/tag/2.1.0.17022601 - Patch, Release Notes

Information

Published : 2017-03-06 06:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5999

Mitre link : CVE-2017-5999

CVE.ORG link : CVE-2017-5999


JSON object : View

Products Affected

syspass

  • syspass
CWE
CWE-326

Inadequate Encryption Strength