Bug 1224241 (CVE-2024-34340)

Summary: VUL-0: CVE-2024-34340: cacti: Authentication Bypass when using using older password hashes
Product: [openSUSE] openSUSE Distribution Reporter: Andreas Stieger <Andreas.Stieger>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P3 - Medium CC: Andreas.Stieger, camila.matos
Version: Leap 15.5   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/405734/
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Andreas Stieger 2024-05-14 18:43:51 UTC
https://github.com/cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m

Md5-hashed user input is compared with correct password in database by $md5 == $hash. It is a loose comparison, not ===. It is a type juggling vulnerability.
Comment 1 OBSbugzilla Bot 2024-05-14 19:25:13 UTC
This is an autogenerated message for OBS integration:
This bug (1224241) was mentioned in
https://build.opensuse.org/request/show/1174071 Factory / cacti
https://build.opensuse.org/request/show/1174072 Backports:SLE-12+Backports:SLE-15-SP5 / cacti+cacti-spine
Comment 2 OBSbugzilla Bot 2024-05-14 20:55:13 UTC
This is an autogenerated message for OBS integration:
This bug (1224241) was mentioned in
https://build.opensuse.org/request/show/1174083 Backports:SLE-12+Backports:SLE-15-SP5 / cacti+cacti-spine
Comment 3 Andreas Stieger 2024-05-15 19:31:31 UTC
done