Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes.
References
Link | Resource |
---|---|
https://github.com/inoda/ontrack/issues/78 | Issue Tracking Third Party Advisory |
https://cwe.mitre.org/data/definitions/916.html | Third Party Advisory |
https://gainsec.com/2022/08/07/cve-2022-hardcoded-creds-weak-password-hauk-android-location-sharing/ | Third Party Advisory |
https://cwe.mitre.org/data/definitions/521.html | Third Party Advisory |
Configurations
Information
Published : 2022-09-08 09:15
Updated : 2022-09-14 07:20
NVD link : CVE-2022-37164
Mitre link : CVE-2022-37164
JSON object : View
CWE
CWE-521
Weak Password Requirements
Products Affected
ontrack_project
- ontrack