Bug 2275061 (CVE-2024-3096) - CVE-2024-3096 php: password_verify can erroneously return true, opening ATO risk
Summary: CVE-2024-3096 php: password_verify can erroneously return true, opening ATO risk
Keywords:
Status: NEW
Alias: CVE-2024-3096
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2275062
Blocks: 2275070
TreeView+ depends on / blocked
 
Reported: 2024-04-15 07:54 UTC by ybuenos
Modified: 2024-04-18 09:07 UTC (History)
0 users

Fixed In Version: php 8.1.28, php 8.2.18, php 8.3.6
Doc Type: ---
Doc Text:
A null byte interaction error vulnerability was found in PHP. If a password stored with password_hash starts with a null byte (\x00), testing a blank string as the password via password_verify will incorrectly return true. If a user can create a password with a leading null byte (unlikely, but syntactically valid), an attacker could trivially compromise the victim's account by attempting to sign in with a blank string.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2024-04-15 07:54:51 UTC
If a password stored with password_hash starts with a null byte (\x00), testing a blank string as the password via password_verify will incorrectly return true.

If a user were able to create a password with a leading null byte (unlikely, but syntactically valid), an attacker could trivially compromise the victim's account by attempting to sign in with a blank string.

Comment 1 ybuenos 2024-04-15 07:55:06 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 2275062]


Note You need to log in before you can comment on or make changes to this bug.