Vulnerability Details : CVE-2017-11136
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. It uses RSA to exchange a secret for symmetric encryption of messages. However, the private RSA key is not only stored on the client but transmitted to the backend, too. Moreover, the key to decrypt the private key is composed of the first 32 bytes of the SHA-512 hash of the user password. But this hash is stored on the backend, too. Therefore, everyone with access to the backend database can read the transmitted secret for symmetric encryption, hence can read the communication.
Products affected by CVE-2017-11136
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-11136
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11136
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
References for CVE-2017-11136
-
http://seclists.org/fulldisclosure/2017/Jul/90
Full Disclosure: CIPH-2017-1: Advisory for StashCatMailing List;Third Party Advisory
Jump to