Vulnerability Details : CVE-2017-11131
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash.
Products affected by CVE-2017-11131
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*
- cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-11131
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11131
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
5.9
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2017-11131
-
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11131
-
http://seclists.org/fulldisclosure/2017/Jul/90
Full Disclosure: CIPH-2017-1: Advisory for StashCatMailing List;Third Party Advisory
Jump to