Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
References
Link | Resource |
---|---|
https://integriaims.com/en/services/updates/ | Release Notes Vendor Advisory |
https://www.incibe.es/en/incibe-cert/notices/aviso/integria-ims-incorrect-authorization |
Configurations
History
17 Sep 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords. |
09 Nov 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords. | |
References |
|
|
Information
Published : 2021-10-07 16:15
Updated : 2024-09-17 00:15
NVD link : CVE-2021-3833
Mitre link : CVE-2021-3833
CVE.ORG link : CVE-2021-3833
JSON object : View
Products Affected
artica
- integria_ims
CWE
CWE-697
Incorrect Comparison