First published: Wed Jan 27 2021(Updated: )
Z-BlogPHP 1.6.0 Valyria is affected by incorrect access control. PHP loose comparison and a magic hash can be used to bypass authentication. zb_user/plugin/passwordvisit/include.php:passwordvisit_input_password() uses loose comparison to authenticate, which can be bypassed via magic hash values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zblogcn Z-blogphp | =1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Z-BlogPHP is CVE-2020-23352.
The severity of CVE-2020-23352 is high with a severity value of 7.5.
CVE-2020-23352 affects Z-BlogPHP by allowing bypass of authentication via PHP loose comparison and magic hash values.
The incorrect access control vulnerability in Z-BlogPHP can be exploited by using PHP loose comparison and a magic hash to bypass authentication.
Yes, a fix for CVE-2020-23352 is available. Please refer to the official reference for more details.