Description
newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
Problem types
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Product status
1.0.0
Credits
Lennon Chia
References
github.com/newbee-ltd/newbee-mall/issues/119
www.vulncheck.com/...ing-enables-offline-credential-cracking