phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5 | Patch | 
| https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab | Exploit Third Party Advisory | 
Configurations
                    History
                    19 Nov 2024, 15:53
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.9  | 
| First Time | 
        
        Phpipam phpipam
         Phpipam  | 
|
| References | () https://github.com/phpipam/phpipam/commit/55c2056068be9f1359e967fcff64db6b7f4d00b5 - Patch | |
| References | () https://huntr.com/bounties/840cb582-1feb-43ab-9cc4-e4b5a63c5bab - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:* | 
15 Nov 2024, 13:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
15 Nov 2024, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-15 11:15
Updated : 2024-11-19 15:53
NVD link : CVE-2024-0787
Mitre link : CVE-2024-0787
CVE.ORG link : CVE-2024-0787
JSON object : View
Products Affected
                phpipam
- phpipam
 
CWE
                
                    
                        
                        CWE-307
                        
            Improper Restriction of Excessive Authentication Attempts
