]
Bela Ban commented on JGRP-2528:
--------------------------------
This is not an issue as the password can be injected by means of a system property, or
programmatically. The "changeit" value is just a sample. Nothing there to see,
move on... :-)
Hardcoded password detected
---------------------------
Key: JGRP-2528
URL:
https://issues.redhat.com/browse/JGRP-2528
Project: JGroups
Issue Type: Enhancement
Reporter: Mahir Kabir
Assignee: Bela Ban
Priority: Major
We are a security research team at Virginia Tech. We are doing an empirical study about
the usefulness of the existing security vulnerability detection tools. The following is a
reported vulnerability by certain tools. We'll appreciate it if you can give any
feedback on it.
*Vulnerability Location:*
in file
https://github.com/belaban/JGroups/blob/32359fa52dc96bacc78792afdaa51cc1a...,
line 107 invokes store.load() with store_password, which is assigned with a constant
value "changeit".
*Security Impact:*
Keystore password should not be kept in the source code. The source code can be widely
shared in an enterprise environment and is certainly shared in open source. The product
transmits or stores authentication credentials, but it uses an insecure way that is
susceptible to unauthorized interception and/or retrieval.
*suggestions:*
To be managed safely, passwords or secret keys should be stored in separate configuration
files or keystores. The Keystore password is better to load from the locally set files
instead of directly set in the code.
Useful link:
[
https://cwe.mitre.org/data/definitions/321.html]
[
https://cwe.mitre.org/data/definitions/522.html]
[
https://www.baeldung.com/java-keystore]
*Please share with us your opinions/comments if there is any:*
Is the bug report helpful?