CVE-2025-27408

Manifest offers users a one-file micro back end. Prior to version 4.9.2, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.2 fixes the issue.
Configurations

No configuration.

History

04 Mar 2025, 23:15

Type Values Removed Values Added
Summary
  • (es) Manifest ofrece a los usuarios un micro back end de un solo archivo. Antes de la versión 4.9.1, Manifest empleaba una implementación de hash de contraseñas débil que utiliza SHA3 sin sal. Esto expone las contraseñas de los usuarios a un mayor riesgo de ser descifradas si un atacante obtiene acceso a la base de datos. Sin el uso de una sal, las contraseñas idénticas de varios usuarios darán como resultado el mismo hash, lo que facilita que los atacantes identifiquen y exploten patrones, acelerando así el proceso de descifrado. La versión 4.9.1 soluciona el problema.
Summary (en) Manifest offers users a one-file micro back end. Prior to version 4.9.1, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.1 fixes the issue. (en) Manifest offers users a one-file micro back end. Prior to version 4.9.2, Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database. Without the use of a salt, identical passwords across multiple users will result in the same hash, making it easier for attackers to identify and exploit patterns, thereby accelerating the cracking process. Version 4.9.2 fixes the issue.

28 Feb 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-28 18:15

Updated : 2025-03-04 23:15


NVD link : CVE-2025-27408

Mitre link : CVE-2025-27408

CVE.ORG link : CVE-2025-27408


JSON object : View

Products Affected

No product.

CWE
CWE-759

Use of a One-Way Hash without a Salt