We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-51478

Use of a Broken or Risky Cryptographic Algorithm in YesWiki



AssignerGitHub_M
Reserved2024-10-28
Published2024-10-31
Updated2024-10-31

Description

YesWiki is a wiki system written in PHP. Prior to 4.4.5, the use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account. This issue is fixed in 4.4.5.



CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L

Product status

< 4.4.5
affected

References

https://github.com/YesWiki/yeswiki/security/advisories/GHSA-4fvx-h823-38v3

https://github.com/YesWiki/yeswiki/commit/b5a8f93b87720d5d5f033a4b3a131ce0fb621dbc

https://github.com/YesWiki/yeswiki/commit/e1285709f6f6a2277bd0075acf369f33cefd78f7

cve.org CVE-2024-51478

nvd.nist.gov CVE-2024-51478

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-51478
Subscribe to our newsletter to learn more about our work.