CVE-2018-15680

An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack.
References
Link Resource
https://rastating.github.io/xbtit-multiple-vulnerabilities/ Exploit Mitigation Third Party Advisory
https://rastating.github.io/xbtit-multiple-vulnerabilities/ Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:btiteam:xbtit:2.5.4:*:*:*:*:*:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () https://rastating.github.io/xbtit-multiple-vulnerabilities/ - Exploit, Mitigation, Third Party Advisory () https://rastating.github.io/xbtit-multiple-vulnerabilities/ - Exploit, Mitigation, Third Party Advisory

Information

Published : 2018-09-05 21:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15680

Mitre link : CVE-2018-15680

CVE.ORG link : CVE-2018-15680


JSON object : View

Products Affected

btiteam

  • xbtit
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort