EspoCRM 5.6.4 is vulnerable to user password hash enumeration. A malicious authenticated attacker can brute-force a user password hash by 1 symbol at a time using specially crafted api/v1/User?filterList filters.
References
Link | Resource |
---|---|
https://github.com/espocrm/espocrm/issues/1357 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-28T15:27:05
Updated: 2019-07-28T15:27:05
Reserved: 2019-07-28T00:00:00
Link: CVE-2019-14351
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-28T16:15:10.870
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-14351
JSON object: View
Redhat Information
No data.
CWE