An issue was discovered in BTITeam XBTIT 2.5.4. The hashed passwords stored in the xbtit_users table are stored as unsalted MD5 hashes, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack.
References
Link | Resource |
---|---|
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | Exploit Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-09-05 21:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-15680
Mitre link : CVE-2018-15680
CVE.ORG link : CVE-2018-15680
JSON object : View
Products Affected
btiteam
- xbtit
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort