### [CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563) ![](https://img.shields.io/static/v1?label=Product&message=OpenSSL&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Padding%20Oracle&color=brighgreen) ### Description In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s). ### POC #### Reference - http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10365 - https://seclists.org/bugtraq/2019/Oct/1 - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Dashrath158/CVE-Management-App-using-Flask - https://github.com/Mohzeela/external-secret - https://github.com/arindam0310018/04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy - https://github.com/chnzzh/OpenSSL-CVE-lib - https://github.com/djschleen/ash - https://github.com/fredrkl/trivy-demo - https://github.com/jntass/TASSL-1.1.1k - https://github.com/mrodden/vyger - https://github.com/siddharthraopotukuchi/trivy - https://github.com/simiyo/trivy - https://github.com/t31m0/Vulnerability-Scanner-for-Containers - https://github.com/thecyberbaby/Trivy-by-AquaSecurity - https://github.com/thecyberbaby/Trivy-by-aquaSecurity - https://github.com/tlsresearch/TSI - https://github.com/umahari/security - https://github.com/vinamra28/tekton-image-scan-trivy