First published: Thu Oct 07 2021(Updated: )
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
Credit: cve-coordination@incibe.es cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Artica Integria IMS | =5.0.92 | |
=5.0.92 |
This vulnerability has been solved in Integria IMS 5.0 93
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-3833.
The title of this vulnerability is Integria IMS incorrect authorization.
The severity of CVE-2021-3833 is critical with a severity value of 9.8.
The vulnerability CVE-2021-3833 allows an attacker with a specific formatted password to exploit the loose comparator used for password validation and log in to the system with different passwords.
To fix the vulnerability CVE-2021-3833 in Integria IMS 5.0.92, you should update to a patched version provided by Artica Integria IMS.