Details
Alert Id 90024
Alert Type Active
Status beta
Risk High
CWE 209
WASC 20
Tags OWASP_2017_A06
OWASP_2021_A02
WSTG-V42-CRYP-02

Summary

By manipulating the padding on an encrypted string, an attacker is able to generate an error message that indicates a likely ‘padding oracle’ vulnerability. Such a vulnerability can affect any application or framework that uses encryption improperly, such as some versions of ASP.net, Java Server Faces, and Mono. An attacker may exploit this issue to decrypt data and recover encryption keys, potentially viewing and modifying confidential data. This rule should detect the MS10-070 padding oracle vulnerability in ASP.net if CustomErrors are enabled for that.

Solution

Update the affected server software, or modify the scripts so that they properly validate encrypted data before attempting decryption.

References

Code

org/zaproxy/zap/extension/ascanrulesBeta/PaddingOracleScanRule.java