Description
EspoCRM 5.6.4 is vulnerable to user password hash enumeration. A malicious authenticated attacker can brute-force a user password hash by 1 symbol at a time using specially crafted api/v1/User?filterList filters.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5567 | EspoCRM 5.6.4 is vulnerable to user password hash enumeration. A malicious authenticated attacker can brute-force a user password hash by 1 symbol at a time using specially crafted api/v1/User?filterList filters. |
References
| Link | Providers |
|---|---|
| https://github.com/espocrm/espocrm/issues/1357 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:12:43.463Z
Reserved: 2019-07-28T00:00:00.000Z
Link: CVE-2019-14351
No data.
Status : Modified
Published: 2019-07-28T16:15:10.870
Modified: 2024-11-21T04:26:34.020
Link: CVE-2019-14351
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD