Use of a Risky Cryptographic Algorithm Affecting org.xwiki.platform:xwiki-platform-crypto-script package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.31% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGXWIKIPLATFORM-2808875
  • published6 May 2022
  • disclosed6 May 2022
  • creditUnknown

Introduced: 6 May 2022

CVE-2022-29161  (opens in a new tab)
CWE-327  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Use of a Risky Cryptographic Algorithm where the generated X509 certificates are signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. Note: If the upgrade is not possible, it is possible to patch the module xwiki-platform-crypto in a local installation by applying the change exposed in the fixed commit and re-compiling the module.

CVSS Scores

version 3.1