Miggo Logo

CVE-2024-51478:
YesWiki Uses a Broken or Risky Cryptographic Algorithm

9.9

CVSS Score
3.1

Basic Information

EPSS Score
0.25225%
Published
10/31/2024
Updated
10/31/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
yeswiki/yeswikicomposer<= 4.4.44.4.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary vulnerable function is UserManager::generateUserLink, as explicitly documented in the vulnerability details and CVE description. It directly implements the weak MD5-based key generation with hard-coded salt. The secondary function in LostPasswordAction is inferred from commit e128570's patch, which modified similar vulnerable logic in a different component. Both functions shared the same flawed cryptographic pattern before patching.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** us* o* * w**k *rypto*r*p*i* *l*orit*m *n* * **r*-*o*** s*lt to **s* t** p*sswor* r*s*t k*y *llows it to ** r**ov*r** *n* us** to r*s*t t** p*sswor* o* *ny ***ount. ### **t*ils *irstly, t** s*lt us** to **s* t** p*sswor* r*s*t k*y is

Reasoning

T** prim*ry vuln*r**l* *un*tion is `Us*rM*n***r::**n*r*t*Us*rLink`, *s *xpli*itly *o*um*nt** in t** vuln*r**ility **t*ils *n* *V* **s*ription. It *ir**tly impl*m*nts t** w**k M**-**s** k*y **n*r*tion wit* **r*-*o*** s*lt. T** s**on**ry *un*tion in `L