vulnerability
CentOS Linux: CVE-2023-0567: Important: php security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:N/I:C/A:N) | Mar 1, 2023 | Nov 1, 2023 | Jan 28, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:C/A:N)
Published
Mar 1, 2023
Added
Nov 1, 2023
Modified
Jan 28, 2025
Description
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
Solutions
centos-upgrade-apcu-panelcentos-upgrade-libzipcentos-upgrade-libzip-debuginfocentos-upgrade-libzip-debugsourcecentos-upgrade-libzip-develcentos-upgrade-libzip-toolscentos-upgrade-libzip-tools-debuginfocentos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-bcmath-debuginfocentos-upgrade-php-clicentos-upgrade-php-cli-debuginfocentos-upgrade-php-commoncentos-upgrade-php-common-debuginfocentos-upgrade-php-dbacentos-upgrade-php-dba-debuginfocentos-upgrade-php-dbgcentos-upgrade-php-dbg-debuginfocentos-upgrade-php-debuginfocentos-upgrade-php-debugsourcecentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-embedded-debuginfocentos-upgrade-php-enchantcentos-upgrade-php-enchant-debuginfocentos-upgrade-php-fficentos-upgrade-php-ffi-debuginfocentos-upgrade-php-fpmcentos-upgrade-php-fpm-debuginfocentos-upgrade-php-gdcentos-upgrade-php-gd-debuginfocentos-upgrade-php-gmpcentos-upgrade-php-gmp-debuginfocentos-upgrade-php-intlcentos-upgrade-php-intl-debuginfocentos-upgrade-php-ldapcentos-upgrade-php-ldap-debuginfocentos-upgrade-php-mbstringcentos-upgrade-php-mbstring-debuginfocentos-upgrade-php-mysqlndcentos-upgrade-php-mysqlnd-debuginfocentos-upgrade-php-odbccentos-upgrade-php-odbc-debuginfocentos-upgrade-php-opcachecentos-upgrade-php-opcache-debuginfocentos-upgrade-php-pdocentos-upgrade-php-pdo-debuginfocentos-upgrade-php-pearcentos-upgrade-php-pecl-apcucentos-upgrade-php-pecl-apcu-debuginfocentos-upgrade-php-pecl-apcu-debugsourcecentos-upgrade-php-pecl-apcu-develcentos-upgrade-php-pecl-rrdcentos-upgrade-php-pecl-rrd-debuginfocentos-upgrade-php-pecl-rrd-debugsourcecentos-upgrade-php-pecl-xdebug3centos-upgrade-php-pecl-xdebug3-debuginfocentos-upgrade-php-pecl-xdebug3-debugsourcecentos-upgrade-php-pecl-zipcentos-upgrade-php-pecl-zip-debuginfocentos-upgrade-php-pecl-zip-debugsourcecentos-upgrade-php-pgsqlcentos-upgrade-php-pgsql-debuginfocentos-upgrade-php-processcentos-upgrade-php-process-debuginfocentos-upgrade-php-snmpcentos-upgrade-php-snmp-debuginfocentos-upgrade-php-soapcentos-upgrade-php-soap-debuginfocentos-upgrade-php-xmlcentos-upgrade-php-xml-debuginfo
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.