Show plain JSON{"id": "CVE-2017-11131", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.9, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.2}]}, "published": "2017-08-01T14:29:00.390", "references": [{"url": "http://seclists.org/fulldisclosure/2017/Jul/90", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-916"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. For authentication, the user password is hashed directly with SHA-512 without a salt or another key-derivation mechanism to enable a secure secret for authentication. Moreover, only the first 32 bytes of the hash are used. This allows for easy dictionary and rainbow-table attacks if an attacker has access to the password hash."}, {"lang": "es", "value": "Se ha descubierto un error en la versi\u00f3n 1.7.5 de heinekingmedia StashCat para Android, en la versi\u00f3n 0.0.80w para web, y 0.0.86 para ordenador. Para la autenticaci\u00f3n, la contrase\u00f1a del usuario se crea con un hash SHA-512 sin sal ni ning\u00fan otro mecanismo de derivaci\u00f3n de clave para establecer un secreto seguro. Adem\u00e1s, solo se utilizan los 32 primeros bytes del hash. Esto facilita los ataques de diccionario y de tablas rainbow si un atacante tiene acceso al hash de la contrase\u00f1a."}], "lastModified": "2019-10-03T00:03:26.223", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:*:android:*:*", "vulnerable": true, "matchCriteriaId": "97F04CBB-21CF-4DC2-9E98-70DF7B355308", "versionEndIncluding": "1.7.5"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:web:*:*:*", "vulnerable": true, "matchCriteriaId": "7E553895-3705-4809-99B5-D5E950740406", "versionEndIncluding": "0.0.80w"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:stashcat:heinekingmedia:*:*:*:*:desktop:*:*:*", "vulnerable": true, "matchCriteriaId": "1B54E116-A0F8-4EF9-BC5B-A998B6A5572B", "versionEndIncluding": "0.0.86w"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}