Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 17 Dec 2017 21:03:38 +0100
From: Raphael Geissert <atomo64@...il.com>
To: Stefano Brivio <sbrivio@...hat.com>
Cc: Open Source Security <oss-security@...ts.openwall.com>, security@...atype.com
Subject: Re: Sonatype Nexus Repository Manager 2.x weak
 password encryption

Hi,

On Sunday, 17 December 2017 15:17:45 CET Stefano Brivio wrote:
> On Sun, 17 Dec 2017 13:53:47 +0100
>
> Raphael Geissert <atomo64@...il.com> wrote:
> > Hi,
> >
> > The Nexus Repository Manager in at least version 2.14.5 [0] (latest of
> > the 2.x series), stores the LDAP bind password in an on-disk file
> > using PBE (bouncy castle's implementation of PBEWithSHAAnd128BitRC4).
> >
> > This is all great except for:
> > - it using only 23 iterations[1]
> > - it using a hard-coded and weak password[2]
> >
> > Therefore offering as much protection as a rot13 would.
> >
> > Given that the same PasswordHelper containing the weak password is
> > present elsewhere in the code, it is very likely that this weak crypto
> > issue affects other passwords stored by Nexus:
> >
> > -
> >
components/nexus-core/src/main/java/org/sonatype/nexus/configuration/Pass
> > wordHelper.java[3] -
> >
components/nexus-security/src/main/java/org/sonatype/security/configurati
> > on/source/PasswordHelper.java[4]
> >
> > It appears that this code is no longer used by the 3.x series.
> >
> > FWIW, the on-file password is:
> >
> > base64(SALT_SIZE || SALT || PBE_OUTPUT )
> >
> > SALT_SIZE always being 8 (hard-coded).
> >
> > N.b. I'll be filing a CVE request in a moment.

This is now CVE-2017-17717.

> > N.b. I have not contacted sonatype. I couldn't find an email address.
>
> The page at https://www.sonatype.com/contactus says:
>
> 1. Send urgent or sensitive reports to security@...atype.com.
> 2. Use our public key to keep your message safe.
> 3. Provide us with a secure way to respond.
> 4. We’ll get back to you as soon as we can. Usually within 24 hours.

Oh, I somehow missed it. Thanks for the pointer and for copying it to
sonatype.

Cheers,
-- 
Raphael Geissert

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ