Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability detected for hardcoded password in ch/qos/logback/core/net/ssl/SSL.java (OWASP category : Reverse Engineering) #787

Open
LikhitaGanji opened this issue Mar 8, 2024 · 1 comment

Comments

@LikhitaGanji
Copy link

LikhitaGanji commented Mar 8, 2024

We have detected that Logback uses a hardcoded password in the source code(ch/qos/logback/core/net/ssl/SSL.java).
A hardcoded password is nothing but a plaintext password stored in the source code. Hardcoded password can be easily retrieved or manipulated through reverse engineering.

MASA-02

Creating this issue to check if it possible to not hardcode the password as plaintext or encrypt the password in the source code to avoid this vulnerability.

@griffinjm
Copy link

griffinjm commented Mar 17, 2024

This is the default Java cacerts keystore file and password, it is well documented as the default password since at least Java 8. https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants