Описание
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.14.0 (включая) до 3.15.0 (включая)
cpe:2.3:a:bludit:bludit:*:*:*:*:*:*:*:*
EPSS
Процентиль: 31%
0.00117
Низкий
8.2 High
CVSS3
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 8.2
github
больше 1 года назад
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
EPSS
Процентиль: 31%
0.00117
Низкий
8.2 High
CVSS3
Дефекты
CWE-287