Description
The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5649 | The aesEncrypt method in lib/SimpleSAML/Utils/Crypto.php in SimpleSAMLphp 1.14.x through 1.14.11 makes it easier for context-dependent attackers to bypass the encryption protection mechanism by leveraging use of the first 16 bytes of the secret key as the initialization vector (IV). |
Github GHSA |
GHSA-ww3w-592j-5qrw | SimpleSAMLphp Incorrect IV generation for encryption |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:06.864Z
Reserved: 2017-08-15T00:00:00.000Z
Link: CVE-2017-12871
No data.
Status : Modified
Published: 2017-09-01T21:29:00.530
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-12871
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA