Cryptographic Issues Affecting org.owasp.esapi:esapi package, versions [2,2.1.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.37% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cryptographic Issues vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGOWASPESAPI-31308
  • published8 Jun 2014
  • disclosed30 Sept 2013
  • creditUnknown

Introduced: 30 Sep 2013

CVE-2013-5679  (opens in a new tab)
CWE-310  (opens in a new tab)

Overview

org.owasp.esapi:esapi The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an attack against authenticity in the default configuration, involving a null MAC and a zero MAC length.

References

CVSS Scores

version 3.1