[ 
https://issues.apache.org/jira/browse/KYLIN-4478?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

xuekaiqi updated KYLIN-4478:
----------------------------
    Sprint: Sprint 52  (was: Sprint 53)

> Usage of "AES/ECB/PKCS5Padding" is insecure
> -------------------------------------------
>
>                 Key: KYLIN-4478
>                 URL: https://issues.apache.org/jira/browse/KYLIN-4478
>             Project: Kylin
>          Issue Type: Improvement
>            Reporter: Md Mahir Asef Kabir
>            Assignee: Md Mahir Asef Kabir
>            Priority: Major
>             Fix For: v3.1.0
>
>
> *Vulnerability Description:* In 
> “core-common/src/main/java/org/apache/kylin/common/util/EncryptUtil.java” 
> file the following code was written in public static String encrypt(String 
> strToEncrypt) method - 
> {code:java}
> Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
> {code}
> The vulnerability is, using "AES/ECB/PKCS5Padding” as the argument to 
> Cipher.getInstance method.
> *Reason it’s vulnerable:* ”AES/ECB/PKCS5Padding” is not secure. For further 
> reference, follow [this|https://zachgrace.com/posts/attacking-ecb/].
> *Suggested Fix:* Using 
> {code:java}
> Cipher cipher = Cipher.getInstance("AES/CFB/PKCS5Padding");
> {code}
> *Feedback:* Please select any of the options down below to help us get an 
> idea about how you felt about the suggestion - 
> # Liked it and will make the suggested changes
> # Liked it but happy with the existing version
> # Didn’t find the suggestion helpful



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to