CVE-2024-3096

In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

18 Jun 2025, 21:10

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian
Php
Debian debian Linux
Php php
References () http://www.openwall.com/lists/oss-security/2024/04/12/11 - () http://www.openwall.com/lists/oss-security/2024/04/12/11 - Mailing List
References () https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr - () https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240510-0010/ - () https://security.netapp.com/advisory/ntap-20240510-0010/ - Third Party Advisory

13 Feb 2025, 18:18

Type Values Removed Values Added
Summary (en) In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true. (en) In PHP  version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.

21 Nov 2024, 09:28

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/04/12/11 - () http://www.openwall.com/lists/oss-security/2024/04/12/11 -
References () https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr - () https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr -
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html -
References () https://security.netapp.com/advisory/ntap-20240510-0010/ - () https://security.netapp.com/advisory/ntap-20240510-0010/ -

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0010/ -

08 May 2024, 01:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/12/11 -
Summary
  • (es) En la versión PHP 8.1.* anterior a 8.1.28, 8.2.* anterior a 8.2.18, 8.3.* anterior a 8.3.5, si una contraseña almacenada con contraseña_hash() comienza con un byte nulo (\x00), se prueba una cadena en blanco como la contraseña a través de contraseña_verify() devolverá verdadero incorrectamente.

29 Apr 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-29 04:15

Updated : 2025-06-18 21:10


NVD link : CVE-2024-3096

Mitre link : CVE-2024-3096

CVE.ORG link : CVE-2024-3096


JSON object : View

Products Affected

debian

  • debian_linux

php

  • php
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo