CVE-2023-26855
7.5HIGHThe hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
Publicado: 4/4/2023Actualizado: 2/13/2025
Descripción
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
Análisis IAImpulsado por IA
Productos Afectados
churchcrmchurchcrm
4.5.3
Referencias
- https://github.com/ChurchCRM/CRM/issues/6449ExploitIssue TrackingThird Party Advisory
- https://github.com/ChurchCRM/CRM/issues/6449ExploitIssue TrackingThird Party Advisory