Vulnerabilities > CVE-2005-0408 - Use of Password Hash With Insufficient Computational Effort vulnerability in Citrusdb 0.3.6

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
citrusdb
CWE-916
critical
nessus
exploit available

Summary

CitrusDB 0.3.6 and earlier generates easily predictable MD5 hashes of the user name for the id_hash cookie, which allows remote attackers to bypass authentication and gain privileges by calculating the MD5 checksum of the user name combined with the "boogaadeeboo" string, which is hard-coded in the $hidden_hash variable.

Vulnerable Configurations

Part Description Count
Application
Citrusdb
2

Exploit-Db

descriptionCitrusDB 0.3.6 Remote Authentication Bypass Vulnerability. CVE-2005-0408. Webapps exploit for php platform
idEDB-ID:25102
last seen2016-02-03
modified2004-02-15
published2004-02-15
reporterRedTeam Pentesting
sourcehttps://www.exploit-db.com/download/25102/
titleCitrusDB 0.3.6 - Remote Authentication Bypass Vulnerability

Nessus

NASL familyCGI abuses
NASL idCITRUSDB_PASSWORD.NASL
descriptionThe remote host is running CitrusDB, an open source customer database application written in PHP. The version of CitrusDB installed on the remote host uses as an authentication cookie the MD5 checksum of a username followed by the constant
last seen2020-06-01
modified2020-06-02
plugin id16477
published2005-02-16
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/16477
titleCitrusDB Static id_hash Admin Authentication Bypass