Description
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-16103 | dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters. |
References
| Link | Providers |
|---|---|
| https://github.com/dignajar/nibbleblog/pull/148 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:58:15.052Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-23356
No data.
Status : Modified
Published: 2021-01-27T16:15:12.950
Modified: 2024-11-21T05:13:46.657
Link: CVE-2020-23356
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD