Brute Force Vulnerability in phpIPAM version 1.5.1 Allows Attackers to Bypass IP Block Mechanism and Perform Brute Force Attacks on User Accounts
CVE-2024-0787
5.9MEDIUM
Key Information
- Vendor
- PHPipam
- Status
- PHPipam/PHPipam
- Vendor
- CVE Published:
- 15 November 2024
Summary
phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0.
Affected Version(s)
phpipam/phpipam < 1.7.0
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: null to: 5.3 - (MEDIUM)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database