CVE-2024-0787 Vulnerability Details

  /     /     /  

CVE-2024-0787 Metadata Quick Info

CVE Published: 15/11/2024 | CVE Updated: 15/11/2024 | CVE Year: 2024
Source: @huntr_ai | Vendor: phpipam | Product: phpipam/phpipam
Status : PUBLISHED

CVE-2024-0787 Description

phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the \'X-Forwarded-For\' header. The issue lies in the \'get_user_ip()\' function in \'class.Common.php\' at lines 1044 and 1045, where the presence of the \'X-Forwarded-For\' header is checked and used instead of \'REMOTE_ADDR\'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-307
CWE Name: CWE-307 Improper Restriction of Excessive Authentication Attempts
Source: phpipam

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).