Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-21972 | Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API. |
Solution
Generating secure API and user auth tokens in PHP involves creating unique and cryptographically secure strings that can be used as tokens for authentication purposes. The following code snippet is a basic example of how to generate secure API tokens in PHP: ```php function generateApiToken($length = 32) { $token = bin2hex(random_bytes($length)); return $token; } ```
Workaround
Disable API.
No history.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-08-01T23:19:52.903Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554
Updated: 2024-08-01T23:19:52.903Z
Status : Awaiting Analysis
Published: 2024-06-24T08:15:09.130
Modified: 2024-11-21T08:59:24.343
Link: CVE-2024-24554
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:22:43Z
EUVD