ID CVE-2023-1976
Summary Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6.
References
Vulnerable Configurations
  • cpe:2.3:a:answer:answer:-:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:-:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:answer:answer:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:answer:answer:1.0.5:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-263
CAPEC
  • Try Common or Default Usernames and Passwords
    An adversary may try certain common or default usernames and passwords to gain access into the system and perform unauthorized actions. An adversary may try an intelligent brute force using empty passwords, known vendor default credentials, as well as a dictionary of common usernames and passwords. Many vendor products come preconfigured with default (and thus well-known) usernames and passwords that should be deleted prior to usage in a production environment. It is a common mistake to forget to remove these default login credentials. Another problem is that users would pick very simple (common) passwords (e.g. "secret" or "password") that make it easier for the attacker to gain access to the system compared to using a brute force attack or even a dictionary attack using a full dictionary.
  • Password Brute Forcing
    In this attack, the adversary tries every possible value for a password until they succeed. A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used (lower case letters, upper case letters, numbers, symbols, etc.) and the maximum length of the password. A system will be particularly vulnerable to this type of an attack if it does not have a proper enforcement mechanism in place to ensure that passwords selected by users are strong passwords that comply with an adequate password policy. In practice a pure brute force attack on passwords is rarely used, unless the password is suspected to be weak. Other password cracking methods exist that are far more effective (e.g. dictionary attacks, rainbow tables, etc.). Knowing the password policy on the system can make a brute force attack more efficient. For instance, if the policy states that all passwords must be of a certain level, there is no need to check smaller candidates.
  • Rainbow Table Password Cracking
    An attacker gets access to the database table where hashes of passwords are stored. He then uses a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system. A password rainbow table stores hash chains for various passwords. A password chain is computed, starting from the original password, P, via a reduce(compression) function R and a hash function H. A recurrence relation exists where Xi+1 = R(H(Xi)), X0 = P. Then the hash chain of length n for the original password P can be formed: X1, X2, X3, ... , Xn-2, Xn-1, Xn, H(Xn). P and H(Xn) are then stored together in the rainbow table. Constructing the rainbow tables takes a very long time and is computationally expensive. A separate table needs to be constructed for the various hash algorithms (e.g. SHA1, MD5, etc.). However, once a rainbow table is computed, it can be very effective in cracking the passwords that have been hashed without the use of salt.
  • Dictionary-based Password Attack
    An attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account. If the password chosen by the user was a word within the dictionary, this attack will be successful (in the absence of other mitigations). This is a specific instance of the password brute forcing attack pattern.
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 20-04-2023 - 21:09
Published 11-04-2023 - 11:15
Last modified 20-04-2023 - 21:09
Back to Top