EspoCRM 5.6.4 is vulnerable to user password hash enumeration. A malicious authenticated attacker can brute-force a user password hash by 1 symbol at a time using specially crafted api/v1/User?filterList filters.
References
Link Resource
https://github.com/espocrm/espocrm/issues/1357 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-28T15:27:05

Updated: 2019-07-28T15:27:05

Reserved: 2019-07-28T00:00:00


Link: CVE-2019-14351

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-07-28T16:15:10.870

Modified: 2020-08-24T17:37:01.140


Link: CVE-2019-14351

JSON object: View

cve-icon Redhat Information

No data.

CWE