Predictable Salt and Weak Cookie Security in BTITeam XBTIT 2.5.4

Predictable Salt and Weak Cookie Security in BTITeam XBTIT 2.5.4

CVE-2018-15681 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

An issue was discovered in BTITeam XBTIT 2.5.4. When a user logs in, their password hash is rehashed using a predictable salt and stored in the "pass" cookie, which is not flagged as HTTPOnly. Due to the weak and predictable salt that is in place, an attacker who successfully steals this cookie can efficiently brute-force it to retrieve the user's cleartext password.

Learn more about our User Device Pen Test.