Details
Alert ID 90024
Alert Type Active
Status release
Risk High
CWE 209
WASC 20
Technologies Targeted All
Tags CWE-209
OWASP_2017_A06
OWASP_2021_A02
POLICY_QA_FULL
WSTG-V42-CRYP-02
More Info Scan Rule Help

Summary

By manipulating the padding on an encrypted string, an attacker is able to generate an error message that indicates a likely ‘padding oracle’ vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. This rule should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled for that.

Solution

Update the affected server software, or modify the scripts so that they properly validate encrypted data before attempting decryption.

Other Info

References

Code

org/zaproxy/zap/extension/ascanrules/PaddingOracleScanRule.java