CVE-2011-3189
 
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The crypt function in PHP 5.3.7, when the MD5 hash type is used, returns the value of the salt argument instead of the hashed string, which might allow remote attackers to bypass authentication via an arbitrary password, a different vulnerability than CVE-2011-2483.
La función de cifrado en PHP v5.3.7, cuando el tipo de hash MD5 se utiliza, se devuelve el valor del argumento en vez de la cadena hash, lo que podría permitir a atacantes remotos evitar la autenticación a través de una contraseña arbitraria, una vulnerabilidad diferente a CVE-2011-2483.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-08-19 CVE Reserved
- 2011-08-25 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-10-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-310: Cryptographic Issues
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://osvdb.org/74726 | Vdb Entry | |
http://support.apple.com/kb/HT5130 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2011/08/23/4 | Mailing List | |
http://www.php.net/ChangeLog-5.php#5.3.8 | X_refsource_confirm | |
http://www.php.net/archive/2011.php#id2011-08-23-1 | X_refsource_confirm | |
https://bugs.gentoo.org/show_bug.cgi?id=380261 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/69429 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://bugs.php.net/bug.php?id=55439 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | 2017-08-29 | |
http://secunia.com/advisories/45678 | 2017-08-29 |