Weak password hashing using MD5 in funzioni.php in HotelDruid before 1.32 allows an attacker to obtain plaintext passwords from hash values.
References
Link | Resource |
---|---|
https://medium.com/%40cnetsec/security-advisory-cve-2024-23091-weak-password-hashing-using-md5-f18a6fe3a473 | Exploit Third Party Advisory |
https://www.hoteldruid.com/en/download.html | Product |
https://medium.com/%40cnetsec/security-advisory-cve-2024-23091-weak-password-hashing-using-md5-f18a6fe3a473 | Exploit Third Party Advisory |
https://www.hoteldruid.com/en/download.html | Product |
Configurations
History
No history.
Information
Published : 2024-07-30 14:15
Updated : 2025-03-18 20:15
NVD link : CVE-2024-23091
Mitre link : CVE-2024-23091
CVE.ORG link : CVE-2024-23091
JSON object : View
Products Affected
digitaldruid
- hoteldruid
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort