Loading HuntDB...

Padding Oracle ms10-070 in the a DoD website (https://██████/)

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by miguel_santareno

Vulnerability Details

Technical details and impact analysis

Cryptographic Issues - Generic
Hi there i found a Padding Oracle ms10-070 in the following website: https://█████████/ In the following steps i will demonstrate how to reproduce the vulnerability. POC: 1ºGo to the following url: https://████/ you will see in the source code off the page something like "WebResource.axd?d=" webresource.jpg 2ºOpen the link and Copy the value from WebResource.axd?d= to &t=636681459604795562 ██████████████ value.jpg Next step i use a script that i found in this github that allows me to test if the application is vulnerable or not. https://github.com/inquisb/miscellaneous/blob/master/ms10-070_check.py clone the script to your machine and then copy the value and paste. Output from the script: ./ms10-070 ████████████ padding.jpg Example: For more detailed information please check the References section first link. Remediation and References: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-070 https://blogs.msdn.microsoft.com/fabdulwahab/2015/08/15/security-protecting-sharepoint-server-applications/ Best Regards Miguel Santareno ## Impact Given control of data and a padding oracle, an attacker can wholly decrypt said data. This is possible without any knowledge of the key material.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cryptographic Issues - Generic