Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-21972 | Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API. |
Solution
Generating secure API and user auth tokens in PHP involves creating unique and cryptographically secure strings that can be used as tokens for authentication purposes. The following code snippet is a basic example of how to generate secure API tokens in PHP: ```php function generateApiToken($length = 32) { $token = bin2hex(random_bytes($length)); return $token; } ```
Workaround
Disable API.
No history.

Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-08-01T23:19:52.903Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554

Updated: 2024-08-01T23:19:52.903Z

Status : Awaiting Analysis
Published: 2024-06-24T08:15:09.130
Modified: 2024-11-21T08:59:24.343
Link: CVE-2024-24554

No data.

Updated: 2025-07-13T11:22:43Z