Description
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Codiad 2.8.4 /componetns/user/class.user.php:Authenticate() is vulnerable in magic hash authentication bypass. If encrypted or hash value for the passwords form certain formats of magic hash, e.g, 0e123, another hash value 0e234 something can successfully authenticate.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3169 | ** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Codiad 2.8.4 /componetns/user/class.user.php:Authenticate() is vulnerable in magic hash authentication bypass. If encrypted or hash value for the passwords form certain formats of magic hash, e.g, 0e123, another hash value 0e234 something can successfully authenticate. |
Github GHSA |
GHSA-8fhh-hf9w-55p7 | Codiad Vulnerable to PHP Magic Hash Vulnerability |
References
| Link | Providers |
|---|---|
| https://github.com/Codiad/Codiad/issues/1121 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:58:14.987Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-23355
No data.
Status : Modified
Published: 2021-01-27T16:15:12.903
Modified: 2024-11-21T05:13:46.510
Link: CVE-2020-23355
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA