Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://cwe.mitre.org/data/definitions/521.html | third party advisory |
https://cwe.mitre.org/data/definitions/916.html | third party advisory |
https://github.com/inoda/ontrack/issues/78 | issue tracking third party advisory |
https://gainsec.com/2022/08/07/cve-2022-hardcoded-creds-weak-password-hauk-android-location-sharing/ | third party advisory |