ID CVE-2006-4068
Summary The pswd.js script relies on the client to calculate whether a username and password match hard-coded hashed values for a server, and uses a hashing scheme that creates a large number of collisions, which makes it easier for remote attackers to conduct offline brute force attacks. NOTE: this script might also allow attackers to generate the server-side "secret" URL without determining the original password, but this possibility was not discussed by the original researcher.
References
Vulnerable Configurations
  • cpe:2.3:a:pswd.js:pswd.js:*:*:*:*:*:*:*:*
    cpe:2.3:a:pswd.js:pswd.js:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-09-2008 - 21:08)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 19333
bugtraq 20060803 Javascript software authentication brute force attack
sreason 1362
Last major update 05-09-2008 - 21:08
Published 10-08-2006 - 00:04
Last modified 05-09-2008 - 21:08
Back to Top