The pswd.js script relies on the client to calculate whether a username and password match hard-coded hashed values for a server, and uses a hashing scheme that creates a large number of collisions, which makes it easier for remote attackers to conduct offline brute force attacks. NOTE: this script might also allow attackers to generate the server-side "secret" URL without determining the original password, but this possibility was not discussed by the original researcher.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/442120 | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/19333 | Exploit |
http://securityreason.com/securityalert/1362 |
Configurations
Information
Published : 2006-08-09 17:04
Updated : 2008-09-05 14:08
NVD link : CVE-2006-4068
Mitre link : CVE-2006-4068
JSON object : View
CWE
CWE-255
Credentials Management Errors
Products Affected
pswd.js
- pswd.js