oss-sec mailing list archives
Re: CVE-2025-54947: Apache StreamPark: Use hard-coded key vulnerability
From: Solar Designer <solar () openwall com>
Date: Fri, 12 Dec 2025 21:50:24 +0100
Hi, Thank you for bringing these CVE announcements to oss-security. However: On Fri, Dec 12, 2025 at 02:57:25PM +0000, Huajie Wang wrote:
Severity: important
Is this message providing a replacement CVE and advisory for what you had announced as "CVE-2025-53960: Apache StreamPark: Use the user's password as the secret key Vulnerability" last week? https://www.openwall.com/lists/oss-security/2025/12/04/1 If so, this looks like misuse of CVEs to me. When you want to amend an advisory, this is generally not a valid reason to issue another CVE. You should be able to amend an advisory while retaining the CVE. Since I see this happen for different Apache projects lately, maybe there's an issue in Apache guidelines or tooling that needs to be fixed? In this case, looks like only the title and severity have changed, but even if you edited something in the description or affected versions range that would also be no reason for a new CVE, unless you actually start talking about a different issue. Also, CVEs aside, it's confusing when you post something anew without any explanation of how it relates to seemingly the same thing you posted before. For a better example, see how the Xen project does it, with revision history in advisories. Finally, you could have posted the amendment as a "reply" to your own message that first announced the issue. That way, your amendment would have been linked as "next in thread" from the original message in list archives, so anyone who found the original message in there would know there is and be able to easily access the additional information - which isn't the case currently. On the actual vulnerability:
Description: In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Attackers may obtain this key through reverse engineering or code analysis, potentially decrypting sensitive data or forging encrypted information, leading to information disclosure or unauthorized system access. This issue affects Apache StreamPark: from 2.0.0 before 2.1.7. Users are recommended to upgrade to version 2.1.7, which fixes the issue.
This leaves me and probably others wondering how you fixed the issue. Your previous announcement seems to have wrongly included a hint on the fix in the vulnerability description. "Use the user's password as the secret key" - is that the fix? Any more detail you can share on it? Such as whether/what PBKDF is used to derive the encryption key from the user's password (if no KDF, or a fast non-password KDF, then that's yet another vulnerability right there). Maybe refer to fix commit(s)? Inclusion of more detail on the fixes may result in folks in here taking a look and commenting, helping find potential issues with initial fixes.
Credit: omkarparth () gmail com (finder)
Added to CC. Thanks again, Alexander
Current thread:
- CVE-2025-54947: Apache StreamPark: Use hard-coded key vulnerability Huajie Wang (Dec 12)
- Re: CVE-2025-54947: Apache StreamPark: Use hard-coded key vulnerability Solar Designer (Dec 12)
