CVE-2017-11131

An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Jul/90 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2017/Jul/90 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*

Configuration 2 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*

Configuration 3 (hide)

cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2017/Jul/90 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Jul/90 - Mailing List, Third Party Advisory

Information

Published : 2017-08-01 14:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11131

Mitre link : CVE-2017-11131

CVE.ORG link : CVE-2017-11131


JSON object : View

Products Affected

stashcat

  • heinekingmedia
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort