CVE-2024-34340

May 14, 2024, 4:12 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

Cacti

  • before 1.2.27

Source

security-advisories@github.com

Tags

CVE-2024-34340 details

Published : May 14, 2024, 3:38 p.m.
Last Modified : May 14, 2024, 4:12 p.m.

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, Cacti calls `compat_password_hash` when users set their password. `compat_password_hash` use `password_hash` if there is it, else use `md5`. When verifying password, it calls `compat_password_verify`. In `compat_password_verify`, `password_verify` is called if there is it, else use `md5`. `password_verify` and `password_hash` are supported on PHP < 5.5.0, following PHP manual. The vulnerability is in `compat_password_verify`. Md5-hashed user input is compared with correct password in database by `$md5 == $hash`. It is a loose comparison, not `===`. It is a type juggling vulnerability. Version 1.2.27 contains a patch for the issue.

CVSS Score

1 2 3 4 5 6 7 8 9.1 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

9.1

Exploitability Score

Impact Score

Base Severity

CRITICAL

References

URL Source
https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.