Vulnerability Details : CVE-2013-3587
Potential exploit
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Vulnerability category: Information leak
Products affected by CVE-2013-3587
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 9.0.0 and up to, including, (<=) 9.6.1cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Local Traffic ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 9.2.0 and up to, including, (<=) 9.4.8cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Security ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 10.1.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Access Policy ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
- F5 » Big-ip Wan Optimization ManagerVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Wan Optimization ManagerVersions from including (>=) 11.0.0 and up to, including, (<=) 11.3.0cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ModuleVersions from including (>=) 9.4.5 and up to, including, (<=) 9.4.8cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ModuleVersions from including (>=) 10.0.0 and up to, including, (<=) 10.2.4cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
- F5 » Big-ip Protocol Security ModuleVersions from including (>=) 11.0.0 and up to, including, (<=) 11.4.1cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Application Acceleration ManagerVersions from including (>=) 11.4.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Firewall ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Advanced Firewall ManagerVersions from including (>=) 11.3.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*
- F5 » Big-ip Policy Enforcement ManagerVersions from including (>=) 12.0.0 and up to, including, (<=) 12.1.2cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
- F5 » Big-ip Policy Enforcement ManagerVersions from including (>=) 11.3.0 and up to, including, (<=) 11.6.1cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
- cpe:2.3:a:f5:arx:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-3587
0.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-3587
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2013-3587
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3587
-
http://github.com/meldium/breach-mitigation-rails
GitHub - meldium/breach-mitigation-rails: Make Rails apps more resilient against the BREACH and CRIME attacksThird Party Advisory
-
http://www.kb.cert.org/vuls/id/987798
VU#987798 - BREACH vulnerability in compressed HTTPSThird Party Advisory;US Government Resource
-
http://breachattack.com/
BREACH ATTACKThird Party Advisory
-
http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf
Third Party Advisory
-
https://hackerone.com/reports/254895
#254895 SSL BREACH attack (CVE-2013-3587)Exploit;Third Party Advisory
-
https://www.blackhat.com/us-13/briefings.html#Prado
Black Hat USA 2013 | BriefingsThird Party Advisory
-
https://lists.apache.org/thread.html/r7f0e9cfd166934172d43ca4c272b8bdda4a343036229d9937affd1e1@%3Cdev.httpd.apache.org%3E
GSOC project Idea- fix for CVE-2013-3587 - Pony MailMailing List;Third Party Advisory
-
http://security.stackexchange.com/questions/20406/is-http-compression-safe#20407
cryptography - Is HTTP compression safe? - Information Security Stack ExchangeExploit;Third Party Advisory
-
https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/
Security advisory: BREACH and Django | Weblog | DjangoThird Party Advisory
-
http://slashdot.org/story/13/08/05/233216
BREACH Compression Attack Steals SSL Secrets - SlashdotThird Party Advisory
-
https://support.f5.com/csp/article/K14634
Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=995168
995168 – (BREACH, CVE-2013-3587) CVE-2013-3587 BREACH attack against HTTP compressionIssue Tracking;Third Party Advisory
Jump to