Md Mahir Asef Kabir created SLING-9418:
------------------------------------------

             Summary: Usage of SHA-256 is insecure
                 Key: SLING-9418
                 URL: https://issues.apache.org/jira/browse/SLING-9418
             Project: Sling
          Issue Type: Improvement
            Reporter: Md Mahir Asef Kabir


*Vulnerability Description:* In 
“src/main/java/org/apache/sling/discovery/base/connectors/ping/TopologyRequestValidator.java”
 file the following code was written in
{code:java}
private String hash(String toHash){code}
method -
{code:java}
MessageDigest m = MessageDigest.getInstance("SHA-256");{code}
The vulnerability is, using "SHA-256” as the argument to 
MessageDigest.getInstance method.

*Reason it’s vulnerable:* According to 
[this|https://securityboulevard.com/2019/07/insecure-default-password-hashing-in-cmss/],
 “SHA256 functions do not include a salt and a separate function must be used 
to add the salt”. Another reference can be found 
[here|https://dusted.codes/sha-256-is-not-a-secure-password-hashing-algorithm].

*Suggested Fix:* According to 
[this|https://securityboulevard.com/2019/07/insecure-default-password-hashing-in-cmss/],
 “The most secure current hash functions are BCRYPT, SCRYPT, and Argon2”

*Feedback:* Please select any of the options down below to help us get an idea 
about how you felt about the suggestion -
 # Liked it and will make the suggested changes
 # Liked it but happy with the existing version
 # Didn’t find the suggestion helpful

 

*Note:* Tagging *[~stefanegli]* as suggested by [~rombert] in this [pull 
request.|https://github.com/apache/sling-org-apache-sling-discovery-base/pull/1]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to