SSLv3 POODLE Vulnerability On line.me

What is the POODLE attack?

Padding Oracle On Downgraded Legacy Encryption (POODLE) is an issue that affects SSL 3.0. If an adversary can modify network transmissions between the client and the server they can downgrade the SSL connection to SSL 3.0 and tamper with/decrypt data in transmission.

The actual problem stems from the fact that the block cipher padding in CBC encryption in SSL 3.0 is not fully verified during the decryption process.

Is line.me vulnerable to POODLE?

PoC : openssl s_client -connect line.me:443 -ssl3

Output : 


shan@pasuruanblackhat:~$ openssl s_client -connect line.me:443 -ssl3 
CONNECTED(00000003) 
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority 
verify return:1 
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA 
verify return:1 
depth=1 C = US, O = GeoTrust Inc., CN = GeoTrust SSL CA - G3 
verify return:1 
depth=0 C = JP, ST = Tokyo, L = Shibuya-ku, O = LINE Corporation, OU = System Operation Team, CN = *.line.me 
verify return:1 
--- 
Certificate chain 
 0 s:/C=JP/ST=Tokyo/L=Shibuya-ku/O=LINE Corporation/OU=System Operation Team/CN=*.line.me 
   i:/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3 
 1 s:/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3 
   i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA 
 2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA 
   i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority 
--- 
Server certificate 
-----BEGIN CERTIFICATE----- 
MIIE+jCCA+KgAwIBAgIQT+BVpSsRw+hrDQWw2oOcaDANBgkqhkiG9w0BAQsFADBE 
MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UEAxMU 
R2VvVHJ1c3QgU1NMIENBIC0gRzMwHhcNMTQxMDI4MDAwMDAwWhcNMTgwODI1MjM1 
OTU5WjCBgTELMAkGA1UEBhMCSlAxDjAMBgNVBAgTBVRva3lvMRMwEQYDVQQHFApT 
aGlidXlhLWt1MRkwFwYDVQQKFBBMSU5FIENvcnBvcmF0aW9uMR4wHAYDVQQLFBVT 
eXN0ZW0gT3BlcmF0aW9uIFRlYW0xEjAQBgNVBAMUCSoubGluZS5tZTCCASIwDQYJ 
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAN4HfFL4D/oWZZ0Jezp7Y/HWlygVEqQC 
+3wZxhsFG1Co6NK45+1CZDP/8/Sc7PCKPNu36qHPXuGIzFhFm5hZ4kstyjdBegug 
LuESkACXwptYmhGoUECDf9xXGw5cZ47QYkzQhUXuM7RQSmcQ04w+t/enEscsARQ7 
3t6xa9S1FbDV1eGnJpolEqH9U/1Qhkfipyj+KWidgpAjpHOmJDgLjJYN/+SuzqUn 
8rC8vdBB0SxG8iOtp9B5PTytooqOb/WsJjbtZuXXU4h/bzdAj4RsXaxTLYLRGfSA 
UfHTx3pCkdB8UQFnxcanaWm71BR6M17J+ccGxgji9nEmAqe/ehuMMDECAwEAAaOC 
AagwggGkMB0GA1UdEQQWMBSCCSoubGluZS5tZYIHbGluZS5tZTAJBgNVHRMEAjAA 
MA4GA1UdDwEB/wQEAwIFoDArBgNVHR8EJDAiMCCgHqAchhpodHRwOi8vZ24uc3lt 
Y2IuY29tL2duLmNybDCBoQYDVR0gBIGZMIGWMIGTBgpghkgBhvhFAQc2MIGEMD8G 
CCsGAQUFBwIBFjNodHRwczovL3d3dy5nZW90cnVzdC5jb20vcmVzb3VyY2VzL3Jl 
cG9zaXRvcnkvbGVnYWwwQQYIKwYBBQUHAgIwNQwzaHR0cHM6Ly93d3cuZ2VvdHJ1 
c3QuY29tL3Jlc291cmNlcy9yZXBvc2l0b3J5L2xlZ2FsMB0GA1UdJQQWMBQGCCsG 
AQUFBwMBBggrBgEFBQcDAjAfBgNVHSMEGDAWgBTSb/eW9IU/cjwwfSPahXibo3xa 
fDBXBggrBgEFBQcBAQRLMEkwHwYIKwYBBQUHMAGGE2h0dHA6Ly9nbi5zeW1jZC5j 
b20wJgYIKwYBBQUHMAKGGmh0dHA6Ly9nbi5zeW1jYi5jb20vZ24uY3J0MA0GCSqG 
SIb3DQEBCwUAA4IBAQACFmRMvPXqgMDDdk7oZQIaleqvSpG91hYvEQ3hq8jz+xHE 
cKYhOUkiPDSNJeHJNzOai9Gwm5/270HEQ/1xlC9KozHXa9L87DkgU1f07UhvvBUE 
jTeWo9kq/TbtG9iYh01vB0OZmGmIXRgnficCBsybZ5K7vif9D641Mzrb8HsSndVK 
JqEPh8rY2l5zE81BA5jrm/FUQE00xPs5Yh39GNiWrk7DClLbnGq8tKa6pWR035jA 
o/jPkfmgqjxw373HJPrH4F+vzOiLaYAxSL9hxdx6d/4bzjeVDJd9qyPZ7k0rAtQh 
+MZQF6PMnytMaxPuDAFJCTuHJygu6Nzv1E5leUON 
-----END CERTIFICATE----- 
subject=/C=JP/ST=Tokyo/L=Shibuya-ku/O=LINE Corporation/OU=System Operation Team/CN=*.line.me 
issuer=/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G3 
--- 
No client certificate CA names sent 
Server Temp Key: ECDH, P-256, 256 bits 
--- 
SSL handshake has read 3809 bytes and written 306 bytes 
--- 
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA 
Server public key is 2048 bit 
Secure Renegotiation IS supported 
Compression: NONE 
Expansion: NONE 
No ALPN negotiated 
SSL-Session: 
    Protocol : SSLv3 
    Cipher : ECDHE-RSA-AES256-SHA 
    Session-ID: A5AA8292848A6DB036B1D73465854810AEC8A0537646660AA7292EB851D34BE0 
    Session-ID-ctx: 
    Master-Key: DAA3AA02DAA664CF7A76137268D64ABF539E34A0C7925D265DF0A011F0D637F773B79C756A757F42E47748F24E9D0EB9 
    Key-Arg : None 
    PSK identity: None 
    PSK identity hint: None 
    SRP username: None 
    Start Time: 1491872881 
    Timeout : 7200 (sec) 
    Verify return code: 0 (ok) 
--- 

Sadly, this is not get bounty :(

Comments

Popular posts from this blog

Missing CSRF Token On Add Admin [Popoji CMS]

Open Redirect On Codepolitan.com

Session not expired When logout [partners.uber.com]