GHSA-qwgm-mxm4-3q2c

Suggest an improvement
Source
https://github.com/advisories/GHSA-qwgm-mxm4-3q2c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qwgm-mxm4-3q2c/GHSA-qwgm-mxm4-3q2c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qwgm-mxm4-3q2c
Aliases
  • CVE-2014-0083
Published
2022-05-24T22:01:17Z
Modified
2023-11-08T03:57:30.899584Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
net-ldap has weak salt when generating passwords
Details

The Ruby net-ldap gem before 0.16.2 uses a weak salt when generating SSHA passwords.

Database specific
{
    "nvd_published_at": "2019-11-21T14:15:00Z",
    "github_reviewed_at": "2023-01-24T16:02:54Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-916"
    ]
}
References

Affected packages

RubyGems / net-ldap

Package

Name
net-ldap
Purl
pkg:gem/net-ldap

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.2

Affected versions

0.*

0.0.5
0.1.0
0.1.1
0.2
0.2.1
0.2.2
0.3.0
0.3.1
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
0.10.0
0.10.1
0.11
0.12.0
0.12.1
0.13.0
0.14.0
0.15.0
0.16.0
0.16.1