Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
CVSS
No CVSS.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: NCSC.ch
Published: 2024-06-24T07:11:36.377Z
Updated: 2024-06-24T13:47:43.818Z
Reserved: 2024-01-25T14:02:00.527Z
Link: CVE-2024-24554
JSON object: View
NVD Information
Status : Awaiting Analysis
Published: 2024-06-24T08:15:09.130
Modified: 2024-06-24T12:57:36.513
Link: CVE-2024-24554
JSON object: View
Redhat Information
No data.