Description
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
No analysis available yet.
Remediation
Vendor Solution
This vulnerability has been solved in Integria IMS 5.0 93
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27080 | Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords. |
References
History
Tue, 17 Sep 2024 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords. | Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords. |
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-16T23:46:25.217Z
Reserved: 2021-09-27T00:00:00.000Z
Link: CVE-2021-3833
No data.
Status : Modified
Published: 2021-10-07T16:15:08.947
Modified: 2024-11-21T06:22:34.253
Link: CVE-2021-3833
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD