iMatix Xitami 管理员纯文本密码存储漏洞

漏洞信息详情

iMatix Xitami 管理员纯文本密码存储漏洞

漏洞简介

Xitami 2.4至2.5 b4版本储存全域可读default.aut文件纯文本中的管理员密码。远程攻击者可以利用该漏洞提升特权。

漏洞公告

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: xitami-default-password-plaintext(7600)
链接:http://xforce.iss.net/xforce/xfdb/7600

来源: BID
名称: 3582
链接:http://www.securityfocus.com/bid/3582

来源: archives.neohapsis.com
链接:http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html

来源: BUGTRAQ
名称: 20011126 Xitami Webserver stores admin password in clear text.
链接:http://www.securityfocus.com/archive/1/242375

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享