The password of a web user in "Sante PACS Server.exe" is zero-padded to 0x2000 bytes, SHA1-hashed, base64-encoded, and stored in the USER table in the SQLite database HTTP.db. However, the number of hash bytes encoded and stored is truncated if the hash contains a zero byte
History

Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
Description The password of a web user in "Sante PACS Server.exe" is zero-padded to 0x2000 bytes, SHA1-hashed, base64-encoded, and stored in the USER table in the SQLite database HTTP.db. However, the number of hash bytes encoded and stored is truncated if the hash contains a zero byte
Title Santesoft Sante PACS Server HTTP.db SHA1 Hash Truncation
Weaknesses CWE-916
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-03-17T13:57:50.486Z

Reserved: 2025-03-12T18:58:14.121Z

Link: CVE-2025-2265

cve-icon Vulnrichment

Updated: 2025-03-17T13:57:22.858Z

cve-icon NVD

Status : Received

Published: 2025-03-13T17:15:38.967

Modified: 2025-03-13T17:15:38.967

Link: CVE-2025-2265

cve-icon Redhat

No data.