8.1
CVSSv3

CVE-2023-33243

Published: 15/06/2023 Updated: 03/07/2023
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password. While storing password hashes instead of cleartext passwords in an application's database generally has become best practice to protect users' passwords in case of a database compromise, this is rendered ineffective when allowing to authenticate using the password hash.

Vulnerable Product Search on Vulmon Subscribe to Product

starface starface

Exploits

RedTeam Pentesting discovered that the web interface of STARFACE as well as its REST API allows authentication using the SHA512 hash of the password instead of the cleartext password While storing password hashes instead of cleartext passwords in an application's database generally has become best practice to protect users' passwords in case of a ...

Github Repositories

PoC for login with password hash in STARFACE

Proof of Concept for Login with Password Hash in STARFACE (CVE-2023-33243) Details are described in our advisory In the corresponding blog post the vulnerability CVE-2023-33243 is used as an example to describe how we generally approach the analysis of authentication mechanisms and identify misconceptions we encounter during our pentest engagements Dependencies Install Python