The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.
References
Link | Resource |
---|---|
https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1 | Patch Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-0391 | Exploit Patch Third Party Advisory |
https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1 | Patch Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-0391 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1 - Patch, Third Party Advisory | |
References | () https://pkg.go.dev/vuln/GO-2022-0391 - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-12-27 22:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2582
Mitre link : CVE-2022-2582
CVE.ORG link : CVE-2022-2582
JSON object : View
Products Affected
amazon
- aws_software_development_kit
CWE
CWE-326
Inadequate Encryption Strength