Skip to content

Salt for PBKDF2 derived from password

High
samrocketman published GHSA-36h5-vrq6-pp34 Jan 13, 2026

Package

maven net.gleske:jervis (Maven)

Affected versions

< 2.2

Patched versions

2.2

Description

Vulnerability

String salt = sha256Sum(passphrase).toLowerCase()
byte[] b_secret = passwordKeyDerivation(passphrase, salt)

String salt = sha256Sum(passphrase).toLowerCase()
byte[] b_secret = passwordKeyDerivation(passphrase, salt)

The salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key.

Impact

Pre-computation attacks.

Severity is considered low for internal uses of this library and high for consumers of this library.

Patches

Jervis will generate a random salt for each password and store it alongside the ciphertext.

Upgrade to Jervis 2.2.

Workarounds

None

References

Severity

High

CVE ID

CVE-2025-68703

Weaknesses

No CWEs