The pswd.js script relies on the client to calculate whether a username and password match hard-coded hashed values for a server, and uses a hashing scheme that creates a large number of collisions, which makes it easier for remote attackers to conduct offline brute force attacks. NOTE: this script might also allow attackers to generate the server-side "secret" URL without determining the original password, but this possibility was not discussed by the original researcher.
References
Link | Resource |
---|---|
http://securityreason.com/securityalert/1362 | |
http://www.securityfocus.com/archive/1/442120 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/19333 | Exploit |
http://securityreason.com/securityalert/1362 | |
http://www.securityfocus.com/archive/1/442120 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/19333 | Exploit |
Configurations
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1362 - | |
References | () http://www.securityfocus.com/archive/1/442120 - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/19333 - Exploit |
Information
Published : 2006-08-10 00:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4068
Mitre link : CVE-2006-4068
CVE.ORG link : CVE-2006-4068
JSON object : View
Products Affected
pswd.js
- pswd.js
CWE
CWE-255
Credentials Management Errors