Skip to content

Denial of Service in latest version [1.2.3] #52

@findneo

Description

@findneo

Please confirm if it is vulnerable.
Mitre id: CVE-2020-7226
Reporter: findneo

[Suggested description]
CiphertextHeader.java in
Cryptacular 1.2.3, as used in Apereo CAS and other products, allows
attackers to trigger excessive memory allocation during a decode
operation, because the nonce array length associated with "new byte" may
depend on untrusted input within the header of encoded data.


[Additional Information]
any encoded network communication based on
org.cryptacular.CiphertextHeader#decode(byte[]) is affected. xxx of
new byte[xxx] can be controlled by client and can be up to 0x7ffffffd
,which caused 2G of memory consuming without demanding for any
privilege.

one of the products using this vuln code is cas4.2.0.
login flow of cas4.2.0 based on
org.cryptacular.CiphertextHeader#decode(byte[]) ,Concretely
speaking,the affected code is
org.jasig.spring.webflow.plugin.EncryptedTranscoder#decode

besides,codebase for cas4.2.0 is apereo/cas-overlay-template@7eaf9d7


[VulnerabilityType Other]
Denial of Service


[Vendor of Product]
http://www.cryptacular.org/


[Affected Product Code Base]
cryptacular - 1.2.3


[Affected Component]
org.cryptacular.CiphertextHeader#decode(byte[]) ,
https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153


[Attack Type]
Remote


[Impact Denial of Service]
true


[Attack Vectors]
a crafted header of encoded data.
e.g '\x00\x00\x00\x34\x7f\xff\xff\xfd'

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions