phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0.
References
Link | Resource |
---|---|
https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5 | Patch |
https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab | Exploit Third Party Advisory |
Configurations
History
19 Nov 2024, 15:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5 - Patch | |
References | () https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab - Exploit, Third Party Advisory | |
First Time |
Phpipam phpipam
Phpipam |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:* |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
15 Nov 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-15 11:15
Updated : 2024-11-19 15:53
NVD link : CVE-2024-0787
Mitre link : CVE-2024-0787
CVE.ORG link : CVE-2024-0787
JSON object : View
Products Affected
phpipam
- phpipam
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts