GHSA-96v6-hrwg-p378

Suggest an improvement
Source
https://github.com/advisories/GHSA-96v6-hrwg-p378
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-96v6-hrwg-p378/GHSA-96v6-hrwg-p378.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-96v6-hrwg-p378
Aliases
Published
2022-01-08T00:31:51Z
Modified
2024-02-19T05:31:46.097090Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Weak Password Requirements in Daybyday CRM
Details

In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.

Database specific
{
    "nvd_published_at": "2022-01-05T15:15:00Z",
    "cwe_ids": [
        "CWE-521"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-01-07T19:46:24Z"
}
References

Affected packages

Packagist / bottelet/flarepoint

Package

Name
bottelet/flarepoint
Purl
pkg:composer/bottelet/flarepoint

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.1
Fixed
2.2.1

Affected versions

1.*

1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.2
1.3
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7

2.*

2.0.0
2.1.0
2.2.0