Vulnerability CVE-2008-1393


Published: 2008-03-19   Modified: 2012-02-12

Description:
Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obtain administrative privileges by sniffing the network.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Plone CMS Security Research - the Art of Plowning
Amir Azam, Jan F...
20.03.2008

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Plone -> Plone cms 

 References:
http://plone.org/documentation/how-to/secure-login-without-plain-text-passwords
http://plone.org/products/plone/roadmap/48
?
http://securityreason.com/securityalert/3754
http://www.procheckup.com/Hacking_Plone_CMS.pdf
http://www.securityfocus.com/archive/1/489544/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/41427

Copyright 2024, cxsecurity.com

 

Back to Top