Vulnerability CVE-2008-6537


Published: 2009-03-29   Modified: 2012-02-12

Description:
LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
LightNEasy 1.2 (no database) Remote Hash Retrieve Exploit
__GiReX__
01.04.2009

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Lightneasy -> Lightneasy 

 References:
http://www.milw0rm.com/exploits/5425
https://exchange.xforce.ibmcloud.com/vulnerabilities/41768

Copyright 2024, cxsecurity.com

 

Back to Top