Vulnerability Description
phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpipam | Phpipam | < 1.7.0 |
Related Weaknesses (CWE)
References
- https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00Patch
- https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5babExploitThird Party Advisory
FAQ
What is CVE-2024-0787?
CVE-2024-0787 is a vulnerability with a CVSS score of 5.9 (MEDIUM). phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_...
How severe is CVE-2024-0787?
CVE-2024-0787 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0787?
Check the references section above for vendor advisories and patch information. Affected products include: Phpipam Phpipam.