Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: NCSC.ch
Published: 2024-06-24T07:11:36.377Z
Updated: 2024-08-01T23:19:52.903Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554
Vulnrichment
Updated: 2024-08-01T23:19:52.903Z
NVD
Status : Awaiting Analysis
Published: 2024-06-24T08:15:09.130
Modified: 2024-06-24T12:57:36.513
Link: CVE-2024-24554
Redhat
No data.