Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JAVA-ORGBOUNCYCASTLE-1035562
- published 3 Nov 2020
- disclosed 3 Nov 2020
- credit Unknown
How to fix?
org.bouncycastle:bcprov-ext-jdk14 to version 1.61 or higher.
org.bouncycastle:bcprov-ext-jdk14 is a Java implementation of cryptographic algorithms.
Affected versions of this package are vulnerable to Information Exposure. Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in
org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid
ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.