2.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:H/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
50.1%
The authenticated-encryption feature in the symmetric-encryption implementation in the OWASP Enterprise Security API (ESAPI) for Java 2.x before 2.1.0 does not properly resist tampering with serialized ciphertext, which makes it easier for remote attackers to bypass intended cryptographic protection mechanisms via an attack against authenticity in the default configuration, involving a null MAC and a zero MAC length.
CPE | Name | Operator | Version |
---|---|---|---|
org.owasp.esapi:esapi | lt | 2.1.0 |
code.google.com/p/owasp-esapi-java/issues/detail?id=306
lists.owasp.org/pipermail/esapi-dev/2013-August/002285.html
owasp-esapi-java.googlecode.com/svn/trunk/documentation/ESAPI-security-bulletin1.pdf
github.com/advisories/GHSA-jcp9-796g-pv9p
github.com/ESAPI/esapi-java-legacy/commit/41138fef5f63d9cf0d5e05d2bee2c7f682ffef3f
nvd.nist.gov/vuln/detail/CVE-2013-5679