CVE-2024-55885
MEDIUM
6,9
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0011
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
327
Use of a Broken or Risky Cryptographic Algorithm
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Accountability
Non-Repudiation
Potential Impacts:
Read Application Data
Modify Application Data
Hide Activities
Applicable Platforms
Languages:
Not Language-Specific, Verilog, VHDL
Technologies:
ICS/OT, Not Technology-Specific
328
Use of Weak Hash
DraftCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Applicable Platforms
Technologies:
ICS/OT
Application
Beego by Beego
Version Range Affected
To
2.3.4
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/beego/beego/commit/e7fa4835f71f47ab1d13afd638cebf661800d5a4
https://github.com/beego/beego/security/advisories/GHSA-9j3m-fr7q-jxfw