We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-51478

Use of a Broken or Risky Cryptographic Algorithm in YesWiki



Description

YesWiki is a wiki system written in PHP. Prior to 4.4.5, the use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account. This issue is fixed in 4.4.5.

Reserved 2024-10-28 | Published 2024-10-31 | Updated 2024-10-31 | Assigner GitHub_M


CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L

Problem types

CWE-327: Use of a Broken or Risky Cryptographic Algorithm

Product status

< 4.4.5
affected

References

github.com/...eswiki/security/advisories/GHSA-4fvx-h823-38v3

github.com/...ommit/b5a8f93b87720d5d5f033a4b3a131ce0fb621dbc

github.com/...ommit/e1285709f6f6a2277bd0075acf369f33cefd78f7

cve.org (CVE-2024-51478)

nvd.nist.gov (CVE-2024-51478)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-51478

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.