Описание
CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.
Ссылки
- Broken Link
- ExploitVendor Advisory
- Broken Link
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.3.6 (включая)
cpe:2.3:a:citrusdb:citrusdb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 85%
0.02617
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-916
Связанные уязвимости
CVSS3: 9.8
github
почти 4 года назад
CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.
EPSS
Процентиль: 85%
0.02617
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-916