Google AD Sync Tool Vulnerability (GADS)

Risk: High
Local: Yes
Remote: No

Due to a weakness in the way the Java encryption algorithm (PBEwithMD5andDES) has been implemented in the GADS tool all stored credentials can be decrypted into plain-text. This includes all of the encrypted passwords stored in any end-users saved XML configuration file, such as Active Directory accounts, SMTP, Proxy details, LDAP and OAuth tokens, etc. Proof of Concept. Using the following information from the XML and GADS tool to decrypt all encrypted passwords from any XML: 1. The hard coded salt: SALT[] = { -87, -101, -56, 50, 86, 53, -29, 3 } 2. The hard coded DES interation count: ITERATION_COUNT = 20 3. The Secret key derived from the uniqueID value in the XML: 6512630db9a74d90a5531f574b85f398 4. The cipher-text from the XML: <encryptedAdminPassword>1edOUtamjNA=</encryptedAdminPassword> 5. The algorithm: PBEwithMD5andDES The decrypted value is: winning!

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020,


Back to Top