CVE-2022-2921: Exposure of password hashes in notrinos/notrinos-erp
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.34648%
CWE
Published
8/22/2022
Updated
1/28/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| notrinos/notrinos-erp | composer | < 0.7 | 0.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) Use of MD5 for password hashing, and 2) Exposure of these hashes through database backups. The get_user_auth function was vulnerable because it implemented authentication using MD5 hash comparisons, making credential cracking feasible. The update_admin_password function (called in create_coy.php) was vulnerable because it generated and stored MD5 hashes during admin account creation. These functions were explicitly modified in the patch (replaced with bcrypt/password_hash), confirming their role in the vulnerability. The commit diff shows direct MD5 usage in these functions' pre-patch versions.