First published: Mon Jun 24 2024(Updated: )
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
Credit: vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
Bludit |
Generating secure API and user auth tokens in PHP involves creating unique and cryptographically secure strings that can be used as tokens for authentication purposes. The following code snippet is a basic example of how to generate secure API tokens in PHP: ```php function generateApiToken($length = 32) { $token = bin2hex(random_bytes($length)); return $token; } ```
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24554 is classified as a medium severity vulnerability due to its potential to allow unauthorized access through predictable token generation.
To mitigate CVE-2024-24554, it is recommended to update to the latest version of Bludit that resolves this token generation issue.
CVE-2024-24554 affects the generation of sensitive tokens such as the API token and user token in Bludit.
CVE-2024-24554 allows attackers to potentially authenticate against the Bludit API due to the predictable token generation.
CVE-2024-24554 affects all versions of Bludit that utilize the vulnerable token generation method.