phpList Authentication Bypass exploit in v3.5.0 due to type juggling with ‘==’ auth condition (CVE-2020-8547) : webhosting


Earlier this week, it was announced that phpList had a critical security vulnerability permitting an attacker to bypass authentication and login as an administrator using an incorrect & carefully-crafted password in some cases. This bug is a result of the fact that [a] PHP is a loosely typed language and [b] the phpList team was using the ‘==’ operator to test for equality of the user’s hashed password against the DB. This security pitfall has been known in PHP since at least 2010 (a decade ago!), but I’m sure the same mistake will be made again..

https://tech.michaelaltfield.net/2020/02/14/phplist-hardening-security/

%d bloggers like this: