Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-0567", "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "state": "PUBLISHED", "assignerShortName": "php", "dateReserved": "2023-01-29T07:45:55.380Z", "datePublished": "2023-02-16T06:15:50.127Z", "dateUpdated": "2024-08-02T05:17:50.104Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "product": "PHP", "programRoutines": [{"name": "password_verify"}], "repo": "https://github.com/php/php-src", "vendor": "PHP Group", "versions": [{"lessThan": "8.0.28", "status": "affected", "version": "8.0.x", "versionType": "semver"}, {"lessThan": "8.1.16", "status": "affected", "version": "8.1.x", "versionType": "semver"}, {"lessThan": "8.2.3", "status": "affected", "version": "8.2.x", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "remediation developer", "user": "00000000-0000-4000-9000-000000000000", "value": "Tim D\u00fcsterhus"}, {"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "tech at mkdgs dot fr"}], "datePublic": "2023-02-13T05:40:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<br><p>In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. </p>"}], "value": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.\u00a0\n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "providerMetadata": {"orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php", "dateUpdated": "2023-03-01T05:45:13.020935Z"}, "references": [{"url": "https://bugs.php.net/bug.php?id=81744"}, {"url": "https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4"}], "source": {"discovery": "EXTERNAL"}, "title": "password_verify() always returns true for some invalid hashes", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}, "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}]}, "adp": [{"title": "CVE Program Container", "references": [{"url": "https://security.netapp.com/advisory/ntap-20230331-0008/"}, {"url": "https://bugs.php.net/bug.php?id=81744", "tags": ["x_transferred"]}, {"url": "https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4", "tags": ["x_transferred"]}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T05:17:50.104Z"}}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-916", "lang": "en", "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort"}]}], "affected": [{"vendor": "php_group", "product": "php", "cpes": ["cpe:2.3:a:php_group:php:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "8.0.0", "status": "affected", "lessThan": "80.28", "versionType": "semver"}, {"version": "8.1.0", "status": "affected", "lessThan": "8.1.16", "versionType": "semver"}, {"version": "8.2.0", "status": "affected", "lessThan": "8.2.3", "versionType": "semver"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-08-01T15:34:47.733360Z", "id": "CVE-2023-0567", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-01T15:34:50.014Z"}}]}}