Описание
Dozzle uses unsafe hash for passwords
Summary
The app uses sha-256 as the hash for passwords. The app should switch to bcrypt.
Details
SHA-256 is a message digest hash, and not classified as secure for password hashing. Message digest hashes are designed to be fast, while password hashing mechanisms are designed with certain cryptographic properties (e.g. slow) to protect against vulnerabilities. Refer to the links below for more information:
- https://security.stackexchange.com/questions/195563/why-is-sha-256-not-good-for-passwords
- https://stackoverflow.com/questions/11624372/best-practice-for-hashing-passwords-sha256-or-sha512
- https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords-with-bcrypt
PoC
N/A
Impact
It leaves users susceptible to rainbow table attacks
Пакеты
github.com/amir20/dozzle
< 8.5.3
8.5.3
EPSS
1.7 Low
CVSS4
4.8 Medium
CVSS3
CVE ID
Дефекты
Связанные уязвимости
Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3.
EPSS
1.7 Low
CVSS4
4.8 Medium
CVSS3