CVE-2021-45458
06.01.2022, 13:15
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.Enginsight
Vendor | Product | Version |
---|---|---|
apache | kylin | 2.0.0 ≤ 𝑥 ≤ 2.6.6 |
apache | kylin | 3.0.0 ≤ 𝑥 < 3.1.3 |
apache | kylin | 4.0.0 |
apache | kylin | 4.0.0:alpha |
apache | kylin | 4.0.0:beta |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-798 - Use of Hard-coded CredentialsThe software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
- CWE-330 - Use of Insufficiently Random ValuesThe software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
References