CVE-2005-0408

CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:citrusdb:citrusdb:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html - Broken Link () http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html - Broken Link
References () http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt - Exploit, Vendor Advisory () http://www.redteam-pentesting.de/advisories/rt-sa-2005-002.txt - Exploit, Vendor Advisory

09 Feb 2024, 03:13

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE NVD-CWE-Other CWE-916
References (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html - (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2005-February/031707.html - Broken Link

Information

Published : 2005-02-14 05:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0408

Mitre link : CVE-2005-0408

CVE.ORG link : CVE-2005-0408


JSON object : View

Products Affected

citrusdb

  • citrusdb
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort