Description
SecureProps is a PHP library designed to simplify the encryption and decryption of property data in objects. A vulnerability in SecureProps version 1.2.0 and 1.2.1 involves a regex failing to detect tags during decryption of encrypted data. This occurs when the encrypted data has been encoded with `NullEncoder` and passed to `TagAwareCipher`, and contains special characters such as `\n`. As a result, the decryption process is skipped since the tags are not detected. This causes the encrypted data to be returned in plain format. The vulnerability affects users who implement `TagAwareCipher` with any base cipher that has `NullEncoder` (not default). The patch for the issue has been released. Users are advised to update to version 1.2.2. As a workaround, one may use the default `Base64Encoder` with the base cipher decorated with `TagAwareCipher` to prevent special characters in the encrypted string from interfering with regex tag detection logic. This workaround is safe but may involve double encoding since `TagAwareCipher` uses `NullEncoder` by default.
Published: 2024-03-18
Score: 2.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-1003 SecureProps is a PHP library designed to simplify the encryption and decryption of property data in objects. A vulnerability in SecureProps version 1.2.0 and 1.2.1 involves a regex failing to detect tags during decryption of encrypted data. This occurs when the encrypted data has been encoded with `NullEncoder` and passed to `TagAwareCipher`, and contains special characters such as `\n`. As a result, the decryption process is skipped since the tags are not detected. This causes the encrypted data to be returned in plain format. The vulnerability affects users who implement `TagAwareCipher` with any base cipher that has `NullEncoder` (not default). The patch for the issue has been released. Users are advised to update to version 1.2.2. As a workaround, one may use the default `Base64Encoder` with the base cipher decorated with `TagAwareCipher` to prevent special characters in the encrypted string from interfering with regex tag detection logic. This workaround is safe but may involve double encoding since `TagAwareCipher` uses `NullEncoder` by default.
Github GHSA Github GHSA GHSA-rj29-j2g4-77q8 [TagAwareCipher] - Decryption Failure (Regex Match)
History

Tue, 30 Dec 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Ilicmiljan
Ilicmiljan secureprops
CPEs cpe:2.3:a:ilicmiljan:secureprops:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ilicmiljan:secureprops:1.2.1:*:*:*:*:*:*:*
Vendors & Products Ilicmiljan
Ilicmiljan secureprops

Subscriptions

Ilicmiljan Secureprops
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T00:56:58.208Z

Reserved: 2024-03-11T22:45:07.687Z

Link: CVE-2024-28864

cve-icon Vulnrichment

Updated: 2024-07-16T00:14:36.271Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-18T22:15:09.247

Modified: 2025-12-30T13:43:50.433

Link: CVE-2024-28864

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses