CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2005-02-16T05:00:00
Updated: 2024-08-07T21:13:54.216Z
Reserved: 2005-02-14T00:00:00
Link: CVE-2005-0408
Vulnrichment
No data.
NVD
Status : Modified
Published: 2005-02-14T05:00:00.000
Modified: 2024-11-20T23:55:03.300
Link: CVE-2005-0408
Redhat
No data.