Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-0567
HistoryFeb 15, 2023 - 12:00 a.m.

CVE-2023-0567

2023-02-1500:00:00
ubuntu.com
ubuntu.com
34
php version 8
password_verify function
blowfish hashes
invalid hash
security vulnerability
application security

CVSS3

7.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

23.6%

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3,
password_verify() function may accept some invalid Blowfish hashes as
valid. If such invalid hash ever ends up in the password database, it may
lead to an application allowing any password for this entry as valid.

Bugs

Notes

Author Note
mdeslaur This vulnerability requires an attacker to be able to modify password hashes, which is an unlikely scenario
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchphp5< anyUNKNOWN
ubuntu16.04noarchphp7.0< 7.0.33-0ubuntu0.16.04.16+esm6UNKNOWN
ubuntu18.04noarchphp7.2< 7.2.24-0ubuntu0.18.04.17UNKNOWN
ubuntu20.04noarchphp7.4< 7.4.3-4ubuntu2.18UNKNOWN
ubuntu22.04noarchphp8.1< 8.1.2-1ubuntu2.11UNKNOWN
ubuntu22.10noarchphp8.1< 8.1.7-1ubuntu3.3UNKNOWN
ubuntu23.04noarchphp8.1< 8.1.12-1ubuntu4UNKNOWN

CVSS3

7.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

23.6%