An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-2766 An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:57:57.648Z

Reserved: 2017-07-09T00:00:00

Link: CVE-2017-11131

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-08-01T14:29:00.390

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-11131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.