Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*", "matchCriteriaId": "97F04CBB-21CF-4DC2-9E98-70DF7B355308", "versionEndIncluding": "1.7.5", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*", "matchCriteriaId": "7E553895-3705-4809-99B5-D5E950740406", "versionEndIncluding": "0.0.80w", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*", "matchCriteriaId": "1B54E116-A0F8-4EF9-BC5B-A998B6A5572B", "versionEndIncluding": "0.0.86w", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. To encrypt messages, AES in CBC mode is used with a pseudo-random secret. This secret and the IV are generated with math.random() in previous versions and with CryptoJS.lib.WordArray.random() in newer versions, which uses math.random() internally. This is not cryptographically strong."}, {"lang": "es", "value": "Se ha descubierto un error en la versi\u00f3n 1.7.5 de heinekingmedia StashCat para Android, en la versi\u00f3n 0.0.80w para web, y 0.0.86 para ordenador. Para cifrar mensajes, se utiliza AES en modo CBC con un secreto pseudoaleatorio. Este secreto, as\u00ed como el vector de inicializaci\u00f3n (IV), se generaban con math.random() en versiones anteriores y con CryptoJS.lib.WordArray.random() en versiones nuevas que usan math.random() de forma interna. Esta no es una pr\u00e1ctica segura a nivel de criptograf\u00eda."}], "id": "CVE-2017-11133", "lastModified": "2024-11-21T03:07:10.470", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-08-01T14:29:00.500", "references": [{"source": "cve@mitre.org", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://seclists.org/fulldisclosure/2017/Jul/90"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mailing List", "Third Party Advisory"], "url": "http://seclists.org/fulldisclosure/2017/Jul/90"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-327"}], "source": "nvd@nist.gov", "type": "Primary"}]}