CVE-2008-4905

Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
References
Link Resource
http://secunia.com/advisories/32272 Broken Link Vendor Advisory
http://securityreason.com/securityalert/4550 Broken Link
http://www.securityfocus.com/archive/1/497970 Broken Link Third Party Advisory VDB Entry
http://secunia.com/advisories/32272 Broken Link Vendor Advisory
http://securityreason.com/securityalert/4550 Broken Link
http://www.securityfocus.com/archive/1/497970 Broken Link Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:typosphere:typo:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2008-11-04 00:58

Updated : 2025-04-09 00:30


NVD link : CVE-2008-4905

Mitre link : CVE-2008-4905

CVE.ORG link : CVE-2008-4905


JSON object : View

Products Affected

typosphere

  • typo
CWE
CWE-330

Use of Insufficiently Random Values