The hashing algorithm of ChurchCRM v4.5.3 utilizes a non...
High severity
Unreviewed
Published
Apr 4, 2023
to the GitHub Advisory Database
•
Updated Apr 18, 2023
Description
Published by the National Vulnerability Database
Apr 4, 2023
Published to the GitHub Advisory Database
Apr 4, 2023
Last updated
Apr 18, 2023
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
References