Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-c5vj-f36q-p9vg: Password Shucking Vulnerability

Impact

An improper implementation was found in the password storage process.

All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible.

If an attacker gets (1) the user’s hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user’s password.

Patches

Upgrade to Shield v1.0.0-beta.4 or later.

After upgrading, all users’ hashed passwords should be updated (saved to the database). See https://github.com/codeigniter4/shield/blob/develop/UPGRADING.md for details.

Workarounds

None.

References

  • https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords
  • https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html
  • https://www.scottbrady91.com/authentication/beware-of-password-shucking

For more information

If you have any questions or comments about this advisory:

ghsa
#vulnerability#git#auth

Package

composer codeigniter4/shield (Composer)

Affected versions

< 1.0.0-beta.4

Patched versions

1.0.0-beta.4

Description

Impact

An improper implementation was found in the password storage process.

All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible.

If an attacker gets (1) the user’s hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user’s password.

Patches

Upgrade to Shield v1.0.0-beta.4 or later.

After upgrading, all users’ hashed passwords should be updated (saved to the database).
See https://github.com/codeigniter4/shield/blob/develop/UPGRADING.md for details.

Workarounds

None.

References

  • https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords
  • https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html
  • https://www.scottbrady91.com/authentication/beware-of-password-shucking

For more information

If you have any questions or comments about this advisory:

References

  • GHSA-c5vj-f36q-p9vg
  • https://nvd.nist.gov/vuln/detail/CVE-2023-27580
  • codeigniter4/shield@ea9688d
  • https://blog.ircmaxell.com/2015/03/security-issue-combining-bcrypt-with.html
  • https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pre-hashing-passwords
  • https://github.com/codeigniter4/shield/blob/develop/UPGRADING.md
  • https://www.scottbrady91.com/authentication/beware-of-password-shucking

lonnieezell published to codeigniter4/shield

Mar 11, 2023

Published by the National Vulnerability Database

Mar 13, 2023

Published to the GitHub Advisory Database

Mar 13, 2023

Reviewed

Mar 13, 2023

Last updated

Mar 13, 2023

Related news

CVE-2023-27580: Password Storage - OWASP Cheat Sheet Series

CodeIgniter Shield provides authentication and authorization for the CodeIgniter 4 PHP framework. An improper implementation was found in the password storage process. All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible. If an attacker gets (1) the user's hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user's password. Upgrade to Shield v1.0.0-beta.4 or later to fix this issue. After upgrading, all users’ hashed passwords should be updated (saved to the database). There are no known workarounds.