jasypt before 1.9.2 allows a timing attack against the password hash comparison.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1040360 | vdb entry |
https://access.redhat.com/errata/RHSA-2017:2809 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2547 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2810 | vendor advisory |
http://www.securitytracker.com/id/1039744 | vdb entry |
https://access.redhat.com/errata/RHSA-2018:0294 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2808 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2546 | vendor advisory |
https://sourceforge.net/p/jasypt/code/668/ | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2017:3141 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2811 | vendor advisory |