Details
-
Improvement
-
Status: Closed
-
Major
-
Resolution: Duplicate
-
None
-
None
-
None
-
None
Description
Vulnerability Description: In “core-common/src/main/java/org/apache/kylin/common/util/EncryptUtil.java” file the following code was written in public static String encrypt(String strToEncrypt) method & public static String decrypt(String strToDecrypt) method -
Cipher cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");
The vulnerability is, using "AES/ECB/PKCS5Padding” as the argument to Cipher.getInstance method.
Reason it’s vulnerable: ”AES/ECB/PKCS5Padding” is not secure. For further reference, please follow this .
Suggested Fix: Using
Cipher cipher = Cipher.getInstance("AES/CFB/PKCS5Padding");
Feedback: Please select any of the options down below to help us get an idea about how you felt about the suggestion -
- Liked it and will make the suggested changes
- Liked it but happy with the existing version
- Didn’t find the suggestion helpful
Attachments
Issue Links
- duplicates
-
KYLIN-4478 Usage of "AES/ECB/PKCS5Padding" is insecure
- Closed