CVE-2021-39182

EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:enrocrypt_project:enrocrypt:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
References () https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce - Exploit, Third Party Advisory () https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce - Exploit, Third Party Advisory
References () https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 - Third Party Advisory () https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 - Third Party Advisory

17 Jul 2023, 15:15

Type Values Removed Values Added
CWE CWE-916
CWE-328
CWE-327
CWE-326

Information

Published : 2021-11-08 15:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39182

Mitre link : CVE-2021-39182

CVE.ORG link : CVE-2021-39182


JSON object : View

Products Affected

enrocrypt_project

  • enrocrypt
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-328

Use of Weak Hash

CWE-916

Use of Password Hash With Insufficient Computational Effort

CWE-326

Inadequate Encryption Strength