Lucene search

K
redhatcveRedhat.comRH:CVE-2024-3096
HistoryApr 15, 2024 - 8:56 a.m.

CVE-2024-3096

2024-04-1508:56:38
redhat.com
access.redhat.com
46
cve-2024-3096
security
vulnerability

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.8%

A null byte interaction error vulnerability was found in PHP. If a password stored with password_hash starts with a null byte (\x00), testing a blank string as the password via password_verify will incorrectly return true. If a user can create a password with a leading null byte (unlikely, but syntactically valid), an attacker could trivially compromise the victim’s account by attempting to sign in with a blank string.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.8%