When Stronger Crypto Breaks Auth: The FreshRSS Bcrypt Truncation Bypass

The article explains an authentication bypass in FreshRSS caused by an unintended interaction between a longer SHA-256 nonce and bcrypt’s 72-byte input limit. Because bcrypt truncates input beyond 72 bytes, the system ended up hashing only non–password-dependent data, allowing any password to succeed. The issue came from a well-intentioned crypto “upgrade” that increased nonce length, breaking assumptions in a custom challenge-response flow. The fix was simply reordering inputs so the password-dependent hash is included. The case highlights how combining secure primitives incorrectly can introduce critical vulnerabilities.

https://pentesterlab.com/blog/freshrss-bcrypt-truncation-auth-bypass

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities