#VU59276 Storing passwords in a recoverable format in Apache Kylin


Published: 2022-01-06

Vulnerability identifier: #VU59276

Vulnerability risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-45458

CWE-ID: CWE-257

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Apache Kylin
Server applications / Database software

Vendor: Apache Foundation

Description

The vulnerability allows a local user to decrypt passwords.

The vulnerability exists due to the way users' passwords are encrypted with the PasswordPlaceholderConfigurer  class with hard-coded key and IV. A local user with ability to read Apache Kylin configuration file can obtain hard-coded key and IV and decrypt passwords of application users.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Apache Kylin: 4.0.0, 3.1.0 - 3.1.2, 3.0.0 - 3.0.2, 2.6.0 - 2.6.6, 2.5.0 - 2.5.2, 2.4.0 - 2.4.1, 2.3.0 - 2.3.2, 2.2.0, 2.1.0, 2.0.0


External links
http://lists.apache.org/thread/oof215qz188k16vhlo97cm1jksxdowfy
http://www.openwall.com/lists/oss-security/2022/01/06/3
http://www.openwall.com/lists/oss-security/2022/01/06/7


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability