SSLv3 POODLE Vulnerability On line.me
What is the POODLE attack?
Padding Oracle On Downgraded Legacy Encryption (POODLE) is an issue that affects SSL 3.0. If an adversary can modify network transmissions between the client and the server they can downgrade the SSL connection to SSL 3.0 and tamper with/decrypt data in transmission.The actual problem stems from the fact that the block cipher padding in CBC encryption in SSL 3.0 is not fully verified during the decryption process.
Is line.me vulnerable to POODLE?
PoC : openssl s_client -connect line.me:443 -ssl3Output :
shan@pasuruanblackhat:~$ openssl s_client -connect line.me:443 -ssl3
CONNECTED(00000003)
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = GeoTrust Inc., CN = GeoTrust SSL CA - G3
verify return:1
depth=0 C = JP, ST = Tokyo, L = Shibuya-ku, O = LINE Corporation, OU = System Operation Team, CN = *.line.me
verify return:1
---
Certificate chain
0 s:/C=JP/ST=Tokyo/L=Shibuya-ku/O=LINE Corporation/OU=System Operation Team/CN=*.line.me
i:/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3
1 s:/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3
i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=JP/ST=Tokyo/L=Shibuya-ku/O=LINE Corporation/OU=System Operation Team/CN=*.line.me
issuer=/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3
---
No client certificate CA names sent
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 3809 bytes and written 306 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : SSLv3
Cipher : ECDHE-RSA-AES256-SHA
Session-ID: A5AA8292848A6DB036B1D73465854810AEC8A0537646660AA7292EB851D34BE0
Session-ID-ctx:
Master-Key: DAA3AA02DAA664CF7A76137268D64ABF539E34A0C7925D265DF0A011F0D637F773B79C756A757F42E47748F24E9D0EB9
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1491872881
Timeout : 7200 (sec)
Verify return code: 0 (ok)
---
Sadly, this is not get bounty :(
Comments
Post a Comment