New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
piwik stores passwords as unsalted MD5 hash
So, apparently there's a seven-year-old Github issue to improve the password hashing (you can confirm it's still unsalted MD5 with "SELECT password FROM piwik_user"). But it hasn't been implemented because they want backwards-compatibility with APIs or something. This means a not-too-difficult timing attack can probably be used to guess the password.
piwik is pretty awesome but this is just terrible security practice..
Saw this originally on https://news.ycombinator.com/item?id=10697045
Thanked by 1geekalot
Comments
what are the chances of passwords being stolen?
my passwords are over 30+ char.
I have no idea about crypto, but can understand that this is pathetic somewhat.
@GM2015
MD5 is pretty bad for using for passwords, there are rainbow tables that exist for MD5 and from what I hear MD5 can be cracked within minutes :-/.
@perennate
Even if the MD5 is salted its still at risk, piwiki should be using sha256 salted at minimum
No, they should use a key derivation function designed for passwords like PBKDF2 or bcrypt at minimum.
I included unsalted part because that makes it even worse.