Details
-
Improvement
-
Status: Closed
-
Major
-
Resolution: Fixed
-
None
-
None
-
None
-
Sprint 52
Description
Vulnerability Description: In “core-common/src/main/java/org/apache/kylin/common/util/EncryptUtil.java” file the following code was written in public static String encrypt(String strToEncrypt) method -
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
The vulnerability is, using "AES/ECB/PKCS5Padding” as the argument to Cipher.getInstance method.
Reason it’s vulnerable: ”AES/ECB/PKCS5Padding” is not secure. For further reference, follow this.
Suggested Fix: Using
Cipher cipher = Cipher.getInstance("AES/CFB/PKCS5Padding");
Feedback: Please select any of the options down below to help us get an idea about how you felt about the suggestion -
- Liked it and will make the suggested changes
- Liked it but happy with the existing version
- Didn’t find the suggestion helpful
Attachments
Issue Links
- is duplicated by
-
KYLIN-4479 Usage of "AES/ECB/PKCS5Padding" is insecure
- Closed