Disable support for LOW encryption ciphers for glassfish port no 3920

Qualis team found a vulnerability with our glassfish with port no 3920 .

glassfish version :- glassfish-3.1.2.2

Port no :- 3920,3820

Below are the details from Qualis

Messages encrypted with LOW encryption ciphers are easy to decrypt.
Commercial SSL servers should only support MEDIUM or HIGH strength
ciphers to guarantee transaction security.

Impact :- An attacker can exploit this vulnerability to decrypt secure
communications without authorization.

Let us know , how to fix this vulnerability for port 3920 and 3820 in Glassfish-3.1.2.2 .

Answer

The SSL/TLS standards don’t mandate a single specific encryption cipher, but allow the client and the server to negotiate to select one they both support.

To improve interoperability most server implementations support – by default – the largest possible range of ciphers, including some which are now considered weak (e.g. RC4). That’s what triggers Qualis.

In your Glassfish server you can override the defaults and restrict the list of supported encryption ciphers in the configuration. Check the create-ssl directive and set for instance:

create-ssl --ssl2enabled=false --ssl3enabled=true --tlsenabled=true ....

Attribution
Source : Link , Question Author : user1726453 , Answer Author : HBruijn

Leave a Comment