Miggo Logo

CVE-2023-27580: Password Shucking Vulnerability

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.27712%
Published
3/13/2023
Updated
3/23/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
codeigniter4/shieldcomposer< 1.0.0-beta.41.0.0-beta.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using SHA-384 pre-hashing without salt before bcrypt, as shown in the commit diff where these functions were replaced with direct password_hash/password_verify. The deprecated hashDanger() and verifyDanger() methods in the patched code represent the old vulnerable implementation. This implementation allowed attackers to exploit externally leaked SHA-384 hashes to bypass bcrypt's protection through password shucking, as described in the referenced security advisories and blog posts.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n improp*r impl*m*nt*tion w*s *oun* in t** p*sswor* stor*** pro**ss. *ll **s*** p*sswor*s stor** in S*i*l* v*.*.*-**t*.* or **rli*r *r* **si*r to *r**k t**n *xp**t** *u* to t** vuln*r**ility. T**r**or*, t**y s*oul* ** r*mov** *s soon *s

Reasoning

T** vuln*r**ility st*ms *rom usin* S**-*** pr*-**s*in* wit*out s*lt ***or* **rypt, *s s*own in t** *ommit *i** w**r* t**s* *un*tions w*r* r*pl**** wit* *ir**t p*sswor*_**s*/p*sswor*_v*ri*y. T** **pr***t** **s***n**r() *n* v*ri*y**n**r() m*t*o*s in t*