CVE-2021-39182

EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:enrocrypt_project:enrocrypt:*:*:*:*:*:*:*:*

History

17 Jul 2023, 15:15

Type Values Removed Values Added
CWE CWE-327
CWE-328
CWE-916
CWE-326

09 Nov 2021, 19:58

Type Values Removed Values Added
References (CONFIRM) https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 - (CONFIRM) https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 - Third Party Advisory
References (MISC) https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce - (MISC) https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:enrocrypt_project:enrocrypt:*:*:*:*:*:*:*:*

08 Nov 2021, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-08 15:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-39182

Mitre link : CVE-2021-39182

CVE.ORG link : CVE-2021-39182


JSON object : View

Products Affected

enrocrypt_project

  • enrocrypt
CWE
CWE-326

Inadequate Encryption Strength

CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-328

Reversible One-Way Hash

CWE-916

Use of Password Hash With Insufficient Computational Effort