Timing Attack Affecting org.jasypt:jasypt package, versions [,1.9.2)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.44% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGJASYPT-31668
- published 26 Apr 2018
- disclosed 21 May 2017
- credit Unknown
Introduced: 21 May 2017
CVE-2014-9970 Open this link in a new tabHow to fix?
Upgrade org.jasypt:jasypt
to version 1.9.2 or higher.
Overview
org.jasypt:jasypt is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works.
Affected versions of this package are vulnerable to Timing Attacks via the Arrays.equals
function. A local user can conduct a timing attack on password hash comparison in the Jasypt component to determine passwords on the target system.