CryptoES is a cryptography algorithms library compatible with ES6 and TypeScript. Prior to version 2.1.0, CryptoES PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 2.1.0 contains a patch for this issue. As a workaround, configure CryptoES to use SHA256 with at least 250,000 iterations.
References
Link | Resource |
---|---|
https://github.com/entronad/crypto-es/commit/d506677fae3d03a454b37ad126e0c119d416b757 | Patch |
https://github.com/entronad/crypto-es/security/advisories/GHSA-mpj8-q39x-wq5h | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-25T20:48:14.285Z
Updated: 2023-10-25T20:49:28.040Z
Reserved: 2023-10-16T17:51:35.573Z
Link: CVE-2023-46133
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-25T21:15:10.093
Modified: 2023-11-08T14:14:18.310
Link: CVE-2023-46133
JSON object: View
Redhat Information
No data.