Home / Vulnerability Database / Pascal : Unsafe padding
Pascal

Pascal : Unsafe padding

Overview

The application uses encryption algorithm with incorrect padding which significantly weakens the encryption.

In case of asymmetric encryption you shouldn’t use RSA encryption algorithm without OAEP. The OAEP algorithm is used to preprocess messages before using RSA. The message is padded to a fixed length using OAEP and encrypted using RSA. This scheme of encryption is called RSA-OAEP.

In case of symmetric encryption the preferred method of ciphertext blocks supplementing is PKCS7, PKCS5 can also be used. Using methods with an unsuitable block dimension is unsafe.

In order to protect valuable data, use well tested implementations of standard encryption algorithms with sufficiently long keys.

Insufficient Cryptography vulnerabilities take the fifth place in the “OWASP Top 10 2016” mobile application vulnerabilities ranking.

CRITICAL

DerScanner Severity Score

Do you want to fix Pascal : Unsafe padding in your application?

See also

Pascal

Pascal : Error handling: generic exception

Pascal

Pascal : Undocumented feature: special account

Pascal

Pascal : Weak hashing algorithm