You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by "Ya Xiao (Jira)" <ji...@apache.org> on 2021/01/15 19:37:00 UTC

[jira] [Updated] (RANGER-3151) Avoid hardcoded salt in creating PBE

     [ https://issues.apache.org/jira/browse/RANGER-3151?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Ya Xiao updated RANGER-3151:
----------------------------
    Description: 
We found a security vulnerability in file src/main/java/org/apache/ranger/plugin/util/PasswordUtils.java. It allows a hardcoded salt "f77aLYLo" (at Line 54) passed to the PBE instantiation (at Line 79). 

*Security Impact*:

The salt is expected as a random string. A hardcoded salt may compromise system security in a way that cannot be easily remedied.

_Useful links_:

[https://vulncat.fortify.com/en/detail?id=desc.semantic.cpp.weak_cryptographic_hash_hardcoded_pbe_salt]

[https://cwe.mitre.org/data/definitions/760.html]

[http://www.crypto-it.net/eng/theory/pbe.html#part_salt]

*Solution we suggest*

We suggest generating a random default salt by SecureRandom class.

*Please share with us your opinions/comments if there is any*

Is the bug report helpful?

  was:
We found a security vulnerability in file src/main/java/org/apache/ranger/plugin/util/PasswordUtils.java. It allows a hardcoded salt "f77aLYLo" (at Line 54) passed to the PBE instantiation (at Line 79). 

*Security Impact*:

The salt is expected as a random string. A hardcoded salt may compromise system security in a way that cannot be easily remedied.

_References_:

[https://vulncat.fortify.com/en/detail?id=desc.semantic.cpp.weak_cryptographic_hash_hardcoded_pbe_salt]

[https://cwe.mitre.org/data/definitions/760.html]

[http://www.crypto-it.net/eng/theory/pbe.html#part_salt]

*Solution we suggest*

We suggest generating a random default salt by SecureRandom class.

*Please share with us your opinions/comments if there is any*

Is the bug report helpful?


> Avoid hardcoded salt in creating PBE
> ------------------------------------
>
>                 Key: RANGER-3151
>                 URL: https://issues.apache.org/jira/browse/RANGER-3151
>             Project: Ranger
>          Issue Type: Improvement
>          Components: Ranger
>            Reporter: Ya Xiao
>            Priority: Major
>              Labels: patch, security
>
> We found a security vulnerability in file src/main/java/org/apache/ranger/plugin/util/PasswordUtils.java. It allows a hardcoded salt "f77aLYLo" (at Line 54) passed to the PBE instantiation (at Line 79). 
> *Security Impact*:
> The salt is expected as a random string. A hardcoded salt may compromise system security in a way that cannot be easily remedied.
> _Useful links_:
> [https://vulncat.fortify.com/en/detail?id=desc.semantic.cpp.weak_cryptographic_hash_hardcoded_pbe_salt]
> [https://cwe.mitre.org/data/definitions/760.html]
> [http://www.crypto-it.net/eng/theory/pbe.html#part_salt]
> *Solution we suggest*
> We suggest generating a random default salt by SecureRandom class.
> *Please share with us your opinions/comments if there is any*
> Is the bug report helpful?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)