0day.today - 世界最大的漏洞利用数据库。
![](/img/logo_green.jpg)
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币金币
本站管理员使用官方账号。请谨防诈骗!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Information disclosure in FreePBX 2.5.x
======================================= Information disclosure in FreePBX 2.5.x ======================================= Advisory Name: Information disclosure in FreePBX 2.5.x Internal Cybsec Advisory Id: 2010-0101 Vulnerability Class: Information disclosure Release Date: 15/01/2010 Affected Applications: Confirmed in FreePBX 2.5.x Other versions may also be affected Affected Platforms: Any running FreePBX2.5.x Local / Remote: Remote Severity: Medium – CVSS: 4 (AV:N/AC:L/Au:S/C:P/I:N/A:N) Researcher: Ivan Huertas Vendor Status: To be confirmed Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf Vulnerability Description: A user with access to the “administrators†section could see other’s administrators passwords by viewing the html’s source code. Proof of Concept: In http://xx.xx.xx.xx/admin/config.php?display=ampusers&userdisplay=admin <a href=# class="info">Password<span>Create a password for this new user</span></a>: </td><td> <input type="password" size="20" name="password" value="admin" tabindex="2"/> </td> Impact: A user with access to the “administrator†sections may access to other’s administrators passwords. Solution: Update to v2.6 Vendor Response: 2009-30-12 – Vulnerability was identified 2010-01-07 – Vendor contacted 2010-01-15 – Vulnerability published Patches were available before the vulnerability was discovered. # 0day.today [2024-06-30] #