CVE-2012-2146:
Elixir can leak information due to weak use of crypto
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6335%
CWE
Published
5/17/2022
Updated
9/20/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Elixir | pip | <= 0.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure IV handling in Blowfish-CFB encryption. The encrypt_value function shown in references uses Blowfish.new(secret, Blowfish.MODE_CFB) without specifying an IV, which defaults to all-zero. This violates cryptographic best practices for CFB mode, allowing attackers to derive plaintext patterns from ciphertexts. The patch introduces AES with proper IV generation, confirming the original function's weakness. The test case showing fixed ciphertext output in comment #38 further validates this function as the vulnerability source.