Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-3096

Опубликовано: 12 апр. 2024
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.

A null byte interaction error vulnerability was found in PHP. If a password stored with password_hash starts with a null byte (\x00), testing a blank string as the password via password_verify will incorrectly return true. If a user can create a password with a leading null byte (unlikely, but syntactically valid), an attacker could trivially compromise the victim's account by attempting to sign in with a blank string.

Отчет

The identified issue with password_verify treating a null byte (\x00) at the beginning of a stored hash as the end of the string, leading to incorrect verification of a blank password, is categorized as low severity due to its narrow exploitability and specific conditions required for successful exploitation. The presence of a null byte in the password is uncommon and unlikely to occur under normal user input or system-generated password scenarios. Additionally, modern web applications typically employ input validation and strict password policies that would prevent the creation of passwords with null byte prefixes.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 8php:8.0/phpFix deferred
Red Hat Enterprise Linux 8phpFixedRHSA-2024:1095111.12.2024
Red Hat Enterprise Linux 8phpFixedRHSA-2024:1095211.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2024:1094911.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2024:1095011.12.2024
Red Hat Enterprise Linux 9phpFixedRHSA-2025:731513.05.2025

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-626
https://bugzilla.redhat.com/show_bug.cgi?id=2275061php: password_verify can erroneously return true, opening ATO risk

EPSS

Процентиль: 43%
0.00205
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 года назад

In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.

CVSS3: 6.5
nvd
около 1 года назад

In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.

CVSS3: 6.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 6.5
debian
около 1 года назад

In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before ...

github
около 1 года назад

password_verify can erroneously return true, opening ATO risk

EPSS

Процентиль: 43%
0.00205
Низкий

4.8 Medium

CVSS3