Use of Password Hash With Insufficient Computational Effort Affecting remdex/livehelperchat package, versions >=0.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Password Hash With Insufficient Computational Effort vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-REMDEXLIVEHELPERCHAT-2635699
  • published13 Apr 2022
  • disclosed6 Apr 2022
  • creditCaio Lüders

Introduced: 6 Apr 2022

CVE-2022-1235  (opens in a new tab)
CWE-916  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

remdex/livehelperchat is a package that offers live support for your website. Featuring web and desktop clients. Compatible Windows, Linux, Mac. Desktop client powered by QT. Supports mobile phones based on XMPP service providers (GTalk, Xabber, Mono etc.)

Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort where the secrethash, which the application relies on for multiple security measures, can be brute-forced. The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with a GPU.

References

CVSS Scores

version 3.1