Loading HuntDB...

formassembly.com is vulnerable to padding-oracle attacks.

Medium
F
FormAssembly
Submitted None
Reported by edoverflow

Vulnerability Details

Technical details and impact analysis

Cryptographic Issues - Generic
Dear Formassembly bug bounty team, # Summary --- formassembly.com is vulnerable to CVE-2016-2107, allowing remote attackers to obtain sensitive information via padding-oracle attacks. ~~~ $ git clone https://github.com/FiloSottile/CVE-2016-2107.git $ go run main.go www.formassembly.com ... Vulnerable: true ~~~ The code above checks whether the TLS alert is `DATA_LENGTH_TOO_LONG` (vulnerable) or `BAD_RECORD_MAC` (not vulnerable). # What is CVE-2016-2107? --- Filippo Valsorda, the author of the tool I used to discover this issue, wrote a fantastic article on CVE-2016-2107 here: https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/ # What are padding-oracle attacks? --- During the decryption and the HMAC verification process the length of the padding is revealed. Padding-oracle attacks iterate over the padding of the cryptographic message, revealing the contents of the message. # More information --- While I am at it I may as well let you know that you also support 1024-bit Diffie-Hellman keys. I would recommend using a 2048-bit Diffie-Hellman group. Link to GitHub repo: https://github.com/FiloSottile/CVE-2016-2107 Link to online test: https://filippo.io/CVE-2016-2107/ Yours sincerely, Ed

Related CVEs

Associated Common Vulnerabilities and Exposures

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cryptographic Issues - Generic