Description
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30647 | The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords. |
References
| Link | Providers |
|---|---|
| https://github.com/ChurchCRM/CRM/issues/6449 |
|
History
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:34:31.281Z
Reserved: 2023-02-27T00:00:00.000Z
Link: CVE-2023-26855
Updated: 2024-08-02T11:53:54.607Z
Status : Modified
Published: 2023-04-04T02:15:07.113
Modified: 2025-02-13T16:15:39.787
Link: CVE-2023-26855
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD