Vulnerability Description
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nibbleblog | Nibbleblog | 3.7.1c |
References
- https://github.com/dignajar/nibbleblog/pull/148Third Party Advisory
- https://github.com/dignajar/nibbleblog/pull/148Third Party Advisory
FAQ
What is CVE-2020-23356?
CVE-2020-23356 is a vulnerability with a CVSS score of 7.5 (HIGH). dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed...
How severe is CVE-2020-23356?
CVE-2020-23356 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-23356?
Check the references section above for vendor advisories and patch information. Affected products include: Nibbleblog Nibbleblog.