-
Notifications
You must be signed in to change notification settings - Fork 400
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
App uses CBC with PKCS5/PKCS7 padding #694
Comments
@juliansteenbakker additionally, could you please tell whether provided by you code
makes sense, as library have such comments:
|
I am using this code but still get the same issue. |
In my opinion, they are trying to make the package available for Android versions lower than API 23 (Android 6), but this is a security data storage package and versions prior to this API are vulnerable. That said, there's no way to provide security for users using insecure devices, I think this should be removed from the source code and it should be mandatory to use the "minSdkVersion" flag as 23 or higher. I look forward to hearing from you, so that I can decide whether to continue using this package or switch to a more secure and reliable one. |
so what is the most secure and reliable way for me to use because we are developing mobile app and we are stuggling when we scan the app in mobsf and receive a vuln indicating PKCS7 PADDING is vuln to oracle padding attack |
See if you are setting a different encryption than the default, if so just ignore this alert, another option is to create a fork and make the changes for your application |
Which would be the Secure Huawei Libraries to use in this Case |
I am working on a new version of this package that fixes these problems. It will be tracked in #769 |
Mobile Security Framework (MobSF) reports high risk error that comes from the android part of package.
Error details:
The App uses the encryption mode CBC with PKCS5/PKCS7 padding. This configuration is vulnerable to padding oracle attacks.
CWE: CWE-649: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
OWASP Top 10: M5: Insufficient Cryptography
OWASP MASVS: MSTG-CRYPTO-3
Source of error: c5/h.java
I see a lot of similar reports:
#584
#562
#526
#475
They are either ignored or closed, but issue is still persists.
The provided solution:
is good to have, but it doesn't remove the warning reported by MobSF.
Why
Cipher.getInstance("AES/CBC/PKCS7Padding")
is still in the package ? Why will we not just remove it ?I would really appreciate if you would have a look at this issue and help to resolve it. Many thanks !
The text was updated successfully, but these errors were encountered: