You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@sling.apache.org by "Md Mahir Asef Kabir (Jira)" <ji...@apache.org> on 2020/05/03 22:47:00 UTC
[jira] [Created] (SLING-9418) Usage of SHA-256 is insecure
Md Mahir Asef Kabir created SLING-9418:
------------------------------------------
Summary: Usage of SHA-256 is insecure
Key: SLING-9418
URL: https://issues.apache.org/jira/browse/SLING-9418
Project: Sling
Issue Type: Improvement
Reporter: Md Mahir Asef Kabir
*Vulnerability Description:* In “src/main/java/org/apache/sling/discovery/base/connectors/ping/TopologyRequestValidator.java” file the following code was written in
{code:java}
private String hash(String toHash){code}
method -
{code:java}
MessageDigest m = MessageDigest.getInstance("SHA-256");{code}
The vulnerability is, using "SHA-256” as the argument to MessageDigest.getInstance method.
*Reason it’s vulnerable:* According to [this|https://securityboulevard.com/2019/07/insecure-default-password-hashing-in-cmss/], “SHA256 functions do not include a salt and a separate function must be used to add the salt”. Another reference can be found [here|https://dusted.codes/sha-256-is-not-a-secure-password-hashing-algorithm].
*Suggested Fix:* According to [this|https://securityboulevard.com/2019/07/insecure-default-password-hashing-in-cmss/], “The most secure current hash functions are BCRYPT, SCRYPT, and Argon2”
*Feedback:* Please select any of the options down below to help us get an idea about how you felt about the suggestion -
# Liked it and will make the suggested changes
# Liked it but happy with the existing version
# Didn’t find the suggestion helpful
*Note:* Tagging *[~stefanegli]* as suggested by [~rombert] in this [pull request.|https://github.com/apache/sling-org-apache-sling-discovery-base/pull/1]
--
This message was sent by Atlassian Jira
(v8.3.4#803005)