漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Opencast stores passwords using outdated MD5 hash algorithm
漏洞信息
Opencast before 8.1 stores passwords using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user. This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes. Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords. The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated. For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint.
漏洞信息
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
漏洞
使用已被攻破或存在风险的密码学算法
漏洞
Apereo Opencast 加密问题漏洞
漏洞信息
Opencast是Opencast组织的一款用于大规模自动视频捕获,管理和分发的直播视频支撑软件。 Apereo Opencast 8.1之前版本和7.6之前版本中存在加密问题漏洞,该漏洞源于程序使用过时且不安全的MD5哈希算法来存储密码并且使用用户名来对哈希值加盐。远程攻击者可利用该漏洞获取敏感信息。
漏洞信息
N/A
漏洞
N/A