Ya Xiao created RANGER-3151:
-------------------------------

             Summary: Avoid hardcoded salt in creating PBE
                 Key: RANGER-3151
                 URL: https://issues.apache.org/jira/browse/RANGER-3151
             Project: Ranger
          Issue Type: Improvement
          Components: Ranger
            Reporter: Ya Xiao


We found a security vulnerability in file 
src/main/java/org/apache/ranger/plugin/util/PasswordUtils.java. It allows a 
hardcoded salt "f77aLYLo" (at Line 54) passed to the PBE instantiation (at Line 
79). 

*Security Impact*:

The salt is expected as a random string. A hardcoded salt may compromise system 
security in a way that cannot be easily remedied.

_References_:

[https://vulncat.fortify.com/en/detail?id=desc.semantic.cpp.weak_cryptographic_hash_hardcoded_pbe_salt]

[https://cwe.mitre.org/data/definitions/760.html]

[http://www.crypto-it.net/eng/theory/pbe.html#part_salt]

*Solution we suggest*

We suggest generating a random default salt by SecureRandom class.

*Please share with us your opinions/comments if there is any*

Is the bug report helpful?



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to