First published: Wed May 10 2017(Updated: )
Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/dolibarr/dolibarr | <=4.0.4 | |
Dolibarr ERP & CRM | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7888 is considered a high severity vulnerability due to the use of MD5 for password storage, making it susceptible to brute-force attacks.
To fix CVE-2017-7888, upgrade to a version of Dolibarr that uses a stronger password hashing algorithm, such as bcrypt or Argon2.
CVE-2017-7888 allows attackers to easily crack user passwords, potentially leading to unauthorized access and data breaches.
CVE-2017-7888 affects Dolibarr ERP/CRM version 4.0.4 and earlier.
Yes, CVE-2017-7888 can be exploited remotely if an attacker has network access to the affected Dolibarr application.