Lucene search

K
githubGitHub Advisory DatabaseGHSA-FH32-35W2-RXCC
HistoryMay 02, 2022 - 3:53 a.m.

Use of Password Hash With Insufficient Computational Effort in Apache Derby

2022-05-0203:53:13
CWE-916
GitHub Advisory Database
github.com
7

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.8%

The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.

Affected configurations

Vulners
Node
github_advisory_databaseorg.apache.derby\Matchderby
CPENameOperatorVersion
org.apache.derby:derbyle10.5.3.01

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

51.8%