CVE-2013-3587
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
21/02/2020
Last modified:
07/11/2023
Description
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses in which a string in an HTTP request URL potentially matches an unknown string in an HTTP response body, aka a "BREACH" attack, a different issue than CVE-2012-4929.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.2.4 (including) |
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 11.0.0 (including) | 11.6.1 (including) |
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.1.2 (including) |
cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 11.3.0 (including) | 11.6.1 (including) |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.1.2 (including) |
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 11.0.0 (including) | 11.6.1 (including) |
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.1.2 (including) |
cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 11.4.0 (including) | 11.6.1 (including) |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.1.2 (including) |
cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 9.2.0 (including) | 9.4.8 (including) |
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 10.0.0 (including) | 10.2.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://breachattack.com/
- http://github.com/meldium/breach-mitigation-rails
- http://security.stackexchange.com/questions/20406/is-http-compression-safe#20407
- http://slashdot.org/story/13/08/05/233216
- http://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf
- http://www.kb.cert.org/vuls/id/987798
- https://bugzilla.redhat.com/show_bug.cgi?id=995168
- https://hackerone.com/reports/254895
- https://lists.apache.org/thread.html/r7f0e9cfd166934172d43ca4c272b8bdda4a343036229d9937affd1e1%40%3Cdev.httpd.apache.org%3E
- https://support.f5.com/csp/article/K14634
- https://www.blackhat.com/us-13/briefings.html#Prado
- https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/