Use of a One-Way Hash without a Salt Affecting silverstripe/framework package, versions >=3.1.19-rc1, <3.1.20 >=3.2.4-rc1, <3.2.5 >=3.3.2-rc1, <3.3.3 >=3.4.0-rc1, <3.4.1


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-SILVERSTRIPEFRAMEWORK-7148694
  • published 28 May 2024
  • disclosed 27 May 2024
  • credit Jono Menz

Introduced: 27 May 2024

CVE NOT AVAILABLE CWE-760 Open this link in a new tab

How to fix?

Upgrade silverstripe/framework to version 3.1.20, 3.2.5, 3.3.3, 3.4.1 or higher.

Overview

silverstripe/framework is a PHP framework forming the base for the SilverStripe CMS.

Affected versions of this package are vulnerable to Use of a One-Way Hash without a Salt due to the improper update of the password encryption salt when a user changes their password. An attacker can exploit this behavior to potentially use old hash values by leveraging the unchanged salt.

CVSS Scores

version 3.1
Expand this section

Snyk

3.7 low
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None