中危 crypto-js PBKDF2 比 1993 年指定的弱 1,000 倍,比当前标准弱 130 万倍 (CVE-2023-46233)
CVE编号
CVE-2023-46233利用情况
暂无补丁情况
官方补丁披露时间
2023-10-26漏洞描述
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | crypto-js_project | crypto-js | * | Up to (excluding) 4.2.0 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | cryptojs | * | Up to (including) 3.1.2+dfsg-2 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | cryptojs | * | Up to (including) 3.1.2+dfsg-3 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | cryptojs | * | Up to (including) 3.1.2+dfsg-3 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | cryptojs | * | Up to (including) 3.1.2+dfsg-3 | |||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-327 | 使用已被攻破或存在风险的密码学算法 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论