CVE-2006-4068

The pswd.js script relies on the client to calculate whether a username and password match hard-coded hashed values for a server, and uses a hashing scheme that creates a large number of collisions, which makes it easier for remote attackers to conduct offline brute force attacks. NOTE: this script might also allow attackers to generate the server-side "secret" URL without determining the original password, but this possibility was not discussed by the original researcher.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pswd.js:pswd.js:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://securityreason.com/securityalert/1362 - () http://securityreason.com/securityalert/1362 -
References () http://www.securityfocus.com/archive/1/442120 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/442120 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/19333 - Exploit () http://www.securityfocus.com/bid/19333 - Exploit

Information

Published : 2006-08-10 00:04

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4068

Mitre link : CVE-2006-4068

CVE.ORG link : CVE-2006-4068


JSON object : View

Products Affected

pswd.js

  • pswd.js
CWE
CWE-255

Credentials Management Errors