The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
The product does not encrypt sensitive or critical information before storage or transmission.
Link | Tags |
---|---|
https://www.themissinglink.com.au/security-advisories/cve-2022-40295 | third party advisory |