Padding Oracle ms10-070 in the a DoD website (https://██████/)
Medium
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
miguel_santareno
Vulnerability Details
Technical details and impact analysis
Hi there i found a Padding Oracle ms10-070 in the following website:
https://█████████/
In the following steps i will demonstrate how to reproduce the vulnerability.
POC:
1ºGo to the following url:
https://████/
you will see in the source code off the page something like "WebResource.axd?d="
webresource.jpg
2ºOpen the link and Copy the value from WebResource.axd?d= to &t=636681459604795562
██████████████
value.jpg
Next step i use a script that i found in this github that allows me to test if the application is vulnerable or not.
https://github.com/inquisb/miscellaneous/blob/master/ms10-070_check.py
clone the script to your machine and then copy the value and paste.
Output from the script:
./ms10-070 ████████████
padding.jpg
Example:
For more detailed information please check the References section first link.
Remediation and References:
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-070
https://blogs.msdn.microsoft.com/fabdulwahab/2015/08/15/security-protecting-sharepoint-server-applications/
Best Regards Miguel Santareno
## Impact
Given control of data and a padding oracle, an attacker can wholly decrypt said data. This is possible without any knowledge of the key material.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cryptographic Issues - Generic