jasypt before 1.9.2 allows a timing attack against the password hash comparison.
References
Configurations
History
21 Nov 2024, 02:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1039744 - | |
References | () http://www.securitytracker.com/id/1040360 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2546 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2547 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2808 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2809 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2810 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2811 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3141 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0294 - | |
References | () https://sourceforge.net/p/jasypt/code/668/ - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-05-21 18:29
Updated : 2025-04-20 01:37
NVD link : CVE-2014-9970
Mitre link : CVE-2014-9970
CVE.ORG link : CVE-2014-9970
JSON object : View
Products Affected
jasypt_project
- jasypt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor