製品・ソフトウェアに関する情報
phpLiteAdmin における認証に関する脆弱性
Title phpLiteAdmin における認証に関する脆弱性
Summary

phpLiteAdmin には、認証に関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date April 23, 2018, midnight
Registration Date July 3, 2018, 6:08 p.m.
Last Update July 3, 2018, 6:08 p.m.
CVSS3.0 : 緊急
Score 9.8
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected System
phpLiteAdmin project
phpLiteAdmin 1.9.5 から 1.9.7.1 まで
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年07月03日]
  掲載
July 3, 2018, 6:08 p.m.

NVD Vulnerability Information
CVE-2018-10362
Summary

An issue was discovered in phpLiteAdmin 1.9.5 through 1.9.7.1. Due to loose comparison with '==' instead of '===' in classes/Authorization.php for the user-provided login password, it is possible to login with a simpler password if the password has the form of a power in scientific notation (like '2e2' for '200' or '0e1234' for '0'). This is possible because, in the loose comparison case, PHP interprets the string as a number in scientific notation, and thus converts it to a number. After that, the comparison with '==' casts the user input (e.g., the string '200' or '0') to a number, too. Hence the attacker can login with just a '0' or a simple number he has to brute force. Strong comparison with '===' prevents the cast into numbers.

Publication Date April 25, 2018, 2:29 p.m.
Registration Date March 1, 2021, 6:42 p.m.
Last Update Nov. 21, 2024, 12:41 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:phpliteadmin:phpliteadmin:*:*:*:*:*:*:*:* 1.9.5 1.9.7.1
Related information, measures and tools
Common Vulnerabilities List