Use of Password Hash With Insufficient Computational Effort in Apache Derby
Moderate severity
GitHub Reviewed
Published
May 2, 2022
to the GitHub Advisory Database
•
Updated Sep 26, 2023
Description
Published by the National Vulnerability Database
Aug 16, 2010
Published to the GitHub Advisory Database
May 2, 2022
Reviewed
Jun 17, 2022
Last updated
Sep 26, 2023
The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
References