Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8911

Опубликовано: 11 авг. 2020
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

A flaw was found in the AWS S3 Crypto SDK that allows users to encrypt files stored in S3 buckets with AES-CBC, without computing a MAC on the data. This allows for a padding oracle, enabling attackers with both write access to the target S3 bucket and the ability to observe the result of valid decryption attempts to potentially recover original plaintext. This is not an issue if files in S3 buckets are not encrypted with CBC mode, which is disabled in V2 of the AWS S3 Crypto SDK.

Отчет

The following products include components that use the AWS SDK (aws/aws-sdk-go), however they do not include code that encrypts or decrypts files in S3 buckets (aws/aws-sdk-go/service/s3/s3crypto). The below products are not affected by this flaw:

  • Red Hat Cluster Application Migration
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift ServiceMesh
  • Red Hat OpenShift Container Storage
  • Red Hat Ceph Storage
  • Red Hat Gluster Storage

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Interconnect 1amq-cert-manager-containerWill not fix
OpenShift ServerlessCLIWill not fix
OpenShift Serverlessknative-eventingWill not fix
OpenShift Serverlessknative-servingWill not fix
OpenShift Service Mesh 1servicemeshNot affected
OpenShift Service Mesh 1servicemesh-grafanaNot affected
OpenShift Service Mesh 1servicemesh-operatorNot affected
OpenShift Service Mesh 1servicemesh-prometheusNot affected
Red Hat Advanced Cluster Management for Kubernetes 2awk-sdk-goNot affected
Red Hat Ceph Storage 2grafanaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-327
https://bugzilla.redhat.com/show_bug.cgi?id=1869800aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang

EPSS

Процентиль: 42%
0.00203
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
nvd
больше 5 лет назад

A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

CVSS3: 5.6
github
почти 4 года назад

CBC padding oracle issue in AWS S3 Crypto SDK for golang

EPSS

Процентиль: 42%
0.00203
Низкий

5.6 Medium

CVSS3

Уязвимость CVE-2020-8911