[ 
https://issues.apache.org/jira/browse/LANG-1607?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17199606#comment-17199606
 ] 

Jonathan Leitschuh commented on LANG-1607:
------------------------------------------

> See e.g. this github PR, which is being replicated THOUSANDS of times

I ended up generating 3,880 pull requests. I already had a bit of this debate 
with the apache lang team here:

[https://github.com/apache/commons-lang/pull/459]

> To aid with CVE-2019-16303, consider upgrading RandomStringUtils default RNG
> ----------------------------------------------------------------------------
>
>                 Key: LANG-1607
>                 URL: https://issues.apache.org/jira/browse/LANG-1607
>             Project: Commons Lang
>          Issue Type: Bug
>            Reporter: Frank Ch. Eigler
>            Priority: Major
>
> In [https://nvd.nist.gov/vuln/detail/CVE-2019-16303]  , the 
> org.apache.commons.lang3.RandomStringUtils randomAlphanumeric() function is 
> used to generate random strings.  Because of weaknesses of the default RNG, 
> this allows baddies to predict other randomAlphnumeric() results, which in 
> this large family of client programs, results in severe vulnerabilities.
> While the class is not documented to be "cryptographically safe", it would be 
> prudent to upgrade the default RNG used in these classes to be crypto-usable 
> level, such as with the java.security.SecureRandom nextBytes().
> See e.g. this github PR, which is being replicated THOUSANDS of times, in 
> order to work around this problem in countless users of this library.  
> [https://github.com/elderdb/neptune/pull/1] 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to