Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8912

Опубликовано: 11 авг. 2020
Источник: redhat
CVSS3: 2.5
EPSS Низкий

Описание

A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

A flaw was found in the AWS S3 Crypto SDK where algorithm parameters for the data encryption key are not authenticated. This flaw allows attackers with S3 bucket write access to change the negotiated encryption algorithm, potentially providing viable brute force methods to recover plaintext. This is not an issue in V2 of the API or for applications not encrypting files in S3 buckets. The highest threat from this vulnerability is to confidentiality.

Отчет

The following products include components that use the AWS SDK (aws/aws-sdk-go), however they do not include code that encrypts or decrypts files in S3 buckets (aws/aws-sdk-go/service/s3/s3crypto). The below products are not affected by this flaw:

  • Red Hat Cluster Application Migration
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift ServiceMesh
  • Red Hat OpenShift Container Storage
  • Red Hat Ceph Storage
  • Red Hat Gluster Storage

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Interconnect 1amq-cert-manager-containerFix deferred
OpenShift ServerlessCLIFix deferred
OpenShift Serverlessknative-eventingFix deferred
OpenShift Serverlessknative-servingFix deferred
OpenShift Service Mesh 1servicemeshNot affected
OpenShift Service Mesh 1servicemesh-grafanaNot affected
OpenShift Service Mesh 1servicemesh-operatorNot affected
OpenShift Service Mesh 1servicemesh-prometheusNot affected
Red Hat Advanced Cluster Management for Kubernetes 2awk-sdk-goNot affected
Red Hat Ceph Storage 2grafanaNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-327
https://bugzilla.redhat.com/show_bug.cgi?id=1869801aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang

EPSS

Процентиль: 34%
0.00141
Низкий

2.5 Low

CVSS3

Связанные уязвимости

CVSS3: 2.5
nvd
больше 5 лет назад

A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.

CVSS3: 2.5
github
почти 4 года назад

In-band key negotiation issue in AWS S3 Crypto SDK for golang

EPSS

Процентиль: 34%
0.00141
Низкий

2.5 Low

CVSS3