Details
Alert Id 90024
Alert Type Active Scan Rule
Status beta
Risk High
CWE 209
WASC 20

Summary

By manipulating the padding on an encrypted string, an attacker is able to generate an error message that indicates a likely ‘padding oracle’ vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. This rule should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled for that.

Solution

Update the affected server software, or modify the scripts so that they properly validate encrypted data before attempting decryption.

References

Code

org/zaproxy/zap/extension/ascanrulesBeta/PaddingOracleScanRule.java