** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Codiad 2.8.4 /componetns/user/class.user.php:Authenticate() is vulnerable in magic hash authentication bypass. If encrypted or hash value for the passwords form certain formats of magic hash, e.g, 0e123, another hash value 0e234 something can successfully authenticate.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3169 | ** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Codiad 2.8.4 /componetns/user/class.user.php:Authenticate() is vulnerable in magic hash authentication bypass. If encrypted or hash value for the passwords form certain formats of magic hash, e.g, 0e123, another hash value 0e234 something can successfully authenticate. |
Github GHSA |
GHSA-8fhh-hf9w-55p7 | Codiad Vulnerable to PHP Magic Hash Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/Codiad/Codiad/issues/1121 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:58:14.987Z
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-23355
No data.
Status : Modified
Published: 2021-01-27T16:15:12.903
Modified: 2024-11-21T05:13:46.510
Link: CVE-2020-23355
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA