Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-08-01T23:19:52.903Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554

Updated: 2024-08-01T23:19:52.903Z

Status : Awaiting Analysis
Published: 2024-06-24T08:15:09.130
Modified: 2024-11-21T08:59:24.343
Link: CVE-2024-24554

No data.