The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
References
Link | Resource |
---|---|
https://simplesamlphp.org/security/201703-02 | Issue Tracking Patch Third Party Advisory |
https://github.com/simplesamlphp/simplesamlphp/commit/77df6a932d46daa35e364925eb73a175010dc904 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-09-01 14:29
Updated : 2017-09-05 18:36
NVD link : CVE-2017-12871
Mitre link : CVE-2017-12871
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
simplesamlphp
- simplesamlphp