cve/2023/CVE-2023-0567.md

19 lines
832 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0567](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
### POC
#### Reference
- https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4
#### Github
- https://github.com/ARPSyndicate/cvemon
2024-05-28 08:49:17 +00:00
- https://github.com/mdisec/mdisec-twitch-yayinlari
2024-05-25 21:48:12 +02:00