Skip to content

fix(security): 2 improvements across 2 files#854

Open
tomaioo wants to merge 2 commits intonextcloud:masterfrom
tomaioo:fix/security/weak-cryptographic-parameters-for-vault-
Open

fix(security): 2 improvements across 2 files#854
tomaioo wants to merge 2 commits intonextcloud:masterfrom
tomaioo:fix/security/weak-cryptographic-parameters-for-vault-

Conversation

@tomaioo
Copy link
Copy Markdown

@tomaioo tomaioo commented Apr 25, 2026

Summary

fix(security): 2 improvements across 2 files

Problem

Severity: High | File: js/app/services/encryptservice.js:L31

The encryption configuration uses PBKDF iterations set to 1000 and an authentication tag size (ts) of 64 bits for SJCL CCM mode. For a password manager context, these settings are weak by modern standards and reduce resistance against brute-force and forgery attempts.

Solution

Increase KDF work factor substantially (e.g., PBKDF2 >= 100k+ iterations or migrate to Argon2/scrypt if possible), and use a 128-bit authentication tag. Re-evaluate all crypto defaults against current best practices and threat model.

Changes

  • js/app/services/encryptservice.js (modified)
  • js/app/services/settingsservice.js (modified)

tomaioo added 2 commits April 24, 2026 23:14
- Security: Weak cryptographic parameters for vault/client-side encryption
- Security: Potential storage of vault password in browser localStorage

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
- Security: Weak cryptographic parameters for vault/client-side encryption
- Security: Potential storage of vault password in browser localStorage

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant