Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Remediation
References
Related Vulnerabilities
WordPress Plugin Gravity Forms HubSpot Cross-Site Scripting (1.0.8)
WordPress Plugin WPJobBoard Cross-Site Scripting (5.5.3)
MediaWiki CVE-2022-28204 Vulnerability (CVE-2022-28204)
WordPress Plugin Media Library Assistant Multiple Vulnerabilities (2.65)
WordPress Plugin Transposh WordPress Translation Cross-Site Scripting (0.8.3)