Details
-
Bug
-
Status: Closed
-
Major
-
Resolution: Fixed
-
2.3.0
-
None
-
JDK 1.8
Description
Hello,
We recently noticed potential timing side channels in the implementation of password comparisons. The issue is in org.apache.wss4j.dom.validate package in UsernameTokenValidator class inside verifyDigestPassword() method where it uses Java string equal to compare given password against the stored one. This is a well-known issue first reported in the following articles:
https://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar-library/
https://github.com/eclipse/jetty.project/issues/1556
Also, I am sending recent fixes for this type of vulnerable (Eclipse Jetty and OpenJDK crypto)
http://hg.openjdk.java.net/jdk8u/jdk8u-dev/jdk/rev/26deba50fea8
Please let us know if you have any questions,
Best Regards,
Saeid (saeid.tizpazniari@colorado.edu)
Yannic (yannic.noller@acm.org)