Description
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5649 | The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV). |
Github GHSA |
GHSA-ww3w-592j-5qrw | SimpleSAMLphp Incorrect IV generation for encryption |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:06.864Z
Reserved: 2017-08-15T00:00:00.000Z
Link: CVE-2017-12871
No data.
Status : Deferred
Published: 2017-09-01T21:29:00.530
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-12871
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA