Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rj29-j2g4-77q8

Опубликовано: 18 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 2.6

Описание

[TagAwareCipher] - Decryption Failure (Regex Match)

Impact

Vulnerability in SecureProps involves a regex failing to detect tags during decryption of encrypted data.

This occurs when the encrypted data has been encoded with NullEncoder and passed to TagAwareCipher, and contains special characters such as \n. As a result, the decryption process is skipped since the tags are not detected. This causes the encrypted data to be returned in plain format.

The vulnerability affects users who implement TagAwareCipher with any base cipher that has NullEncoder (not default).

Patches

The patch for the issue has been released. Users are advised to update to version 1.2.2.

Workarounds

The main recommendation is to update to the latest version as there are no breaking changes.

If that's not possible, you can use the default Base64Encoder with the base cipher decorated with TagAwareCipher to prevent special characters in the encrypted string from interfering with regex tag detection logic.

This workaround is safe but may involve double encoding since TagAwareCipher uses Base64Encoder by default.

References

Reported issue: https://github.com/IlicMiljan/Secure-Props/issues/20 Pull request resolving bug: https://github.com/IlicMiljan/Secure-Props/pull/21

Пакеты

Наименование

ilicmiljan/secure-props

composer
Затронутые версииВерсия исправления

>= 1.2.0, < 1.2.2

1.2.2

EPSS

Процентиль: 71%
0.00663
Низкий

2.6 Low

CVSS3

Дефекты

CWE-1333

Связанные уязвимости

CVSS3: 2.6
nvd
почти 2 года назад

SecureProps is a PHP library designed to simplify the encryption and decryption of property data in objects. A vulnerability in SecureProps version 1.2.0 and 1.2.1 involves a regex failing to detect tags during decryption of encrypted data. This occurs when the encrypted data has been encoded with `NullEncoder` and passed to `TagAwareCipher`, and contains special characters such as `\n`. As a result, the decryption process is skipped since the tags are not detected. This causes the encrypted data to be returned in plain format. The vulnerability affects users who implement `TagAwareCipher` with any base cipher that has `NullEncoder` (not default). The patch for the issue has been released. Users are advised to update to version 1.2.2. As a workaround, one may use the default `Base64Encoder` with the base cipher decorated with `TagAwareCipher` to prevent special characters in the encrypted string from interfering with regex tag detection logic. This workaround is safe but may involve

EPSS

Процентиль: 71%
0.00663
Низкий

2.6 Low

CVSS3

Дефекты

CWE-1333