nzo/url-encryptor-bundle Insecure default secret key and IV allowing anyone to decrypt values
High severity
GitHub Reviewed
Published
May 17, 2024
to the GitHub Advisory Database
•
Updated May 17, 2024
Package
Affected versions
>= 5.0.0, < 5.0.1
>= 4.0.0, < 4.3.2
Patched versions
5.0.1
4.3.2
Description
Published to the GitHub Advisory Database
May 17, 2024
Reviewed
May 17, 2024
Last updated
May 17, 2024
Versions of nzo/url-encryptor-bundle prior to 5.0.1 and 4.3.2 are affected by a security vulnerability related to the lack of mandatory key and IV requirements. By default, the bundle uses the aes-256-ctr algorithm, which is susceptible to malleability attacks, potentially leading to Insecure Direct Object Reference (IDOR) vulnerabilities. Additionally, the reuse of keys enables users to decrypt and modify encrypted data if they can guess the plaintext of one ciphertext.
References