Z-BlogPHP 1.6.0 Valyria is affected by incorrect access control. PHP loose comparison and a magic hash can be used to bypass authentication. zb_user/plugin/passwordvisit/include.php:passwordvisit_input_password() uses loose comparison to authenticate, which can be bypassed via magic hash values.
References
Link | Resource |
---|---|
https://github.com/zblogcn/zblogphp/commit/a67607fc984f976d6b36b8870dffaabd9d6c9d5e | Patch Third Party Advisory |
Configurations
History
04 Feb 2021, 14:56
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://github.com/zblogcn/zblogphp/commit/a67607fc984f976d6b36b8870dffaabd9d6c9d5e - Patch, Third Party Advisory | |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:zblogcn:z-blogphp:1.6.0:*:*:*:*:*:*:* |
27 Jan 2021, 16:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-01-27 16:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-23352
Mitre link : CVE-2020-23352
CVE.ORG link : CVE-2020-23352
JSON object : View
Products Affected
zblogcn
- z-blogphp
CWE