CVE-2021-21253

OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attackers to pre-compute the hash value using dictionary attack techniques such as rainbow tables to crack passwords. This problem is fixed and published in version 1.1.2. A long randomly generated salt is added to the password hash function to better protect passwords stored in the voting system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:onlinevotingsystem_project:onlinevotingsystem:*:*:*:*:*:*:*:*

History

24 Oct 2022, 20:58

Type Values Removed Values Added
CWE CWE-759 CWE-916

02 Feb 2021, 15:09

Type Values Removed Values Added
References (CONFIRM) https://github.com/dbijaya/OnlineVotingSystem/security/advisories/GHSA-wwg8-372v-v332 - (CONFIRM) https://github.com/dbijaya/OnlineVotingSystem/security/advisories/GHSA-wwg8-372v-v332 - Third Party Advisory
References (MISC) https://github.com/dbijaya/OnlineVotingSystem/commit/0181cb0272857696c8eb3e44fcf6cb014ff90f09 - (MISC) https://github.com/dbijaya/OnlineVotingSystem/commit/0181cb0272857696c8eb3e44fcf6cb014ff90f09 - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
CPE cpe:2.3:a:onlinevotingsystem_project:onlinevotingsystem:*:*:*:*:*:*:*:*

26 Jan 2021, 18:16

Type Values Removed Values Added
Summary OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attackers to pre-compute the hash value using dictionary attack techniques such as rainbow tables to crack passwords. This problem is fixed and published in version 1.1.2. A long randomly generated salt is added to the password hash function to better protect passwords stored in the voting system. OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attackers to pre-compute the hash value using dictionary attack techniques such as rainbow tables to crack passwords. This problem is fixed and published in version 1.1.2. A long randomly generated salt is added to the password hash function to better protect passwords stored in the voting system.

21 Jan 2021, 15:48

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-21 15:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-21253

Mitre link : CVE-2021-21253

CVE.ORG link : CVE-2021-21253


JSON object : View

Products Affected

onlinevotingsystem_project

  • onlinevotingsystem
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort

CWE-759

Use of a One-Way Hash without a Salt