Uploaded image for project: 'Karaf'
  1. Karaf
  2. KARAF-4199

Privacy Violation: Heap Inspection

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Open
    • Major
    • Resolution: Unresolved
    • 4.0.3
    • None
    • None
    • None

    Description

      HP Fortify and SciTools Understand were used to perform an application security scan on the karaf source code.

      The method interactive() in Main.java stores sensitive data in a String object on line 127, making it impossible to reliably purge the data from memory.

      Main.java, lines 120-137:

      120 public String[] interactive(String destination, String name, String instruction, String[] prompt, boolean[] echo) {
      121     String[] answers = new String[prompt.length];
      122     try {
      123         for (int i = 0; i < prompt.length; i++) {
      124             if (echo[i]) {
      125                 answers[i] = console.readLine(prompt[i] + " ");
      126             } else {
      127                 answers[i] = new String(console.readPassword(prompt[i] + " "));
      128             }
      129             if (answers[i] == null) {
      130                 return null;
      131             }
      132         }
      133         return answers;
      134     } catch (IOError e) {
      135         return null;
      136     }
      137 }
      

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              EdAInWestOC Eduardo Aguinaga
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

                Created:
                Updated: