Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:29417
HistoryFeb 17, 2021 - 6:09 p.m.

Authorization Bypass

2021-02-1718:09:26
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
17
authorization bypass
openssl
vulnerability
sslv2 negotiation
version rollback attack
padding check
server vulnerability

EPSS

0.002

Percentile

57.6%

openssl is vulnerable to authorization bypass. The vulnerability exists when a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made.