CVE-2017-11131
Severity CVSS v4.0:
Pending analysis
Type:
CWE-916
Use of Password Hash With Insufficient Computational Effort
Publication date:
01/08/2017
Last modified:
20/04/2025
Description
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:* | 1.7.5 (including) | |
cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:* | 0.0.80w (including) | |
cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:* | 0.0.86w (including) |
To consult the complete list of CPE names with products and versions, see this page