Vulnerability Name: | CVE-2011-3189 (CCN-69429) | ||||||||
Assigned: | 2011-08-18 | ||||||||
Published: | 2011-08-18 | ||||||||
Updated: | 2017-08-29 | ||||||||
Summary: | The crypt function in PHP 5.3.7, when the MD5 hash type is used, returns the value of the salt argument instead of the hashed string, which might allow remote attackers to bypass authentication via an arbitrary password, a different vulnerability than CVE-2011-2483. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-310 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-3189 Source: APPLE Type: UNKNOWN APPLE-SA-2012-02-01-1 Source: OSVDB Type: UNKNOWN 74726 Source: CCN Type: SA45678 PHP "crypt()" MD5 Salt Security Issue Source: SECUNIA Type: Vendor Advisory 45678 Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT5130 Source: MLIST Type: UNKNOWN [oss-security] 20110823 CVE assignment - PHP salt flaw CVE-2011-3189 Source: CCN Type: OSVDB ID: 74726 PHP crypt() Function MD5 Salt Hash Value Return Weakness Source: CCN Type: The PHP Group Web site PHP Source: CONFIRM Type: UNKNOWN http://www.php.net/archive/2011.php#id2011-08-23-1 Source: CONFIRM Type: UNKNOWN http://www.php.net/ChangeLog-5.php#5.3.8 Source: CCN Type: BID-49241 PHP Versions Prior to 5.3.7 Multiple Security Vulnerabilities Source: CONFIRM Type: UNKNOWN https://bugs.gentoo.org/show_bug.cgi?id=380261 Source: CONFIRM Type: Exploit https://bugs.php.net/bug.php?id=55439 Source: XF Type: UNKNOWN php-cve20113189-security-bypass(69429) Source: XF Type: UNKNOWN php-crypt-security-bypass(69429) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |