Weak password hashing using MD5 in funzioni.php in HotelDruid before 1.32 allows an attacker to obtain plaintext passwords from hash values.
References
Link | Resource |
---|---|
https://medium.com/%40cnetsec/security-advisory-cve-2024-23091-weak-password-hashing-using-md5-f18a6fe3a473 | Exploit Third Party Advisory |
https://www.hoteldruid.com/en/download.html | Product |
Configurations
History
23 Aug 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40cnetsec/security-advisory-cve-2024-23091-weak-password-hashing-using-md5-f18a6fe3a473 - Exploit, Third Party Advisory | |
References | () https://www.hoteldruid.com/en/download.html - Product | |
CWE | CWE-916 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:digitaldruid:hoteldruid:*:*:*:*:*:*:*:* | |
First Time |
Digitaldruid
Digitaldruid hoteldruid |
31 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-30 14:15
Updated : 2024-08-23 13:51
NVD link : CVE-2024-23091
Mitre link : CVE-2024-23091
CVE.ORG link : CVE-2024-23091
JSON object : View
Products Affected
digitaldruid
- hoteldruid
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort