oss-security September 2010 archive
Main Archive Page > Month Archives  > oss-security archives
oss-security: Re: [oss-security] CVE request: padding oracle att

Re: [oss-security] CVE request: padding oracle attack: ruby on rails 2.3, owasp esapi

From: Michael Koziarski <michael_at_nospam>
Date: Tue Sep 21 2010 - 20:44:05 GMT
To: Thomas Biege <thomas@suse.de>

On Wed, Sep 22, 2010 at 2:57 AM, Thomas Biege <thomas@suse.de> wrote:
> I got no answer from the POET paper authors yet but it can be
> that CVE-2010-3299 is invalid.

I'm not sure what the criteria for a CVE is but there's nothing
exploitable here in the vast vast bulk of rails applications.

It's certainly true that an application using the low level
encrypt/decrypt API is vulnerable to padding oracle attacks, but as
you mentioned those apis aren't actually used anywhere within rails
itself.

Given the 'shoot yourself in the foot' nature of those low level apis,
we'll probably deprecate them as public apis and advise people to use
encrypt_and_sign/decrypt_and_verify instead.

> Cheers
> Thomas
>
>
> Am Dienstag 14 September 2010 21:36:53 schrieb Josh Bressers:
>> I've assgiend two. The details are quite vague unfortunately.
>>
>> CVE-2010-3299 padding oracle attack: ruby on rails 2.3
>> CVE-2010-3300 padding oracle attack: owasp esapi
>>
>> Thanks.
>>
>> > Hi,
>> > the paper [1], about practical padding oracle attacks
>> > mentions some programming frameworks as vulnerable (section 5):
>> > - Ruby On ails 2.3
>> > - OWASP ESAPI
>> >
>> > I think they both need a CVE-ID. Thanks.
>> >
>> > Cheers
>> > Thomas
>> >
>> > [1] http://usenix.org/events/woot10/tech/full_papers/Rizzo.pdf
>>
>
> --
> Thomas Biege <thomas@suse.de>, SUSE LINUX, Security Support & Auditing
> SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
> --
> Wer aufhoert besser werden zu wollen, hoert auf gut zu sein.
> -- Marie von Ebner-Eschenbach
>

-- Cheers Koz