Vulnerability Description
Z-BlogPHP 1.6.0 Valyria is affected by incorrect access control. PHP loose comparison and a magic hash can be used to bypass authentication. zb_user/plugin/passwordvisit/include.php:passwordvisit_input_password() uses loose comparison to authenticate, which can be bypassed via magic hash values.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zblogcn | Z-Blogphp | 1.6.0 |
References
- https://github.com/zblogcn/zblogphp/commit/a67607fc984f976d6b36b8870dffaabd9d6c9PatchThird Party Advisory
- https://github.com/zblogcn/zblogphp/commit/a67607fc984f976d6b36b8870dffaabd9d6c9PatchThird Party Advisory
FAQ
What is CVE-2020-23352?
CVE-2020-23352 is a vulnerability with a CVSS score of 7.5 (HIGH). Z-BlogPHP 1.6.0 Valyria is affected by incorrect access control. PHP loose comparison and a magic hash can be used to bypass authentication. zb_user/plugin/passwordvisit/include.php:passwordvisit_inpu...
How severe is CVE-2020-23352?
CVE-2020-23352 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-23352?
Check the references section above for vendor advisories and patch information. Affected products include: Zblogcn Z-Blogphp.