AuditWizard 6.3.2 gives away administrator password

2006.09.12
Risk: Low
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 1.7/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.1/10
Exploit range: Local
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

I found that AuditWizard 6.3.2 by Layton Technologies is leaving the domain administrator password in the logfiles of machines that it audits if you use the Remote Audit feature. I've contacted them but they have yet to produce a fix. They have acknowledged the problem but according to their tech support, "upper management" has decided not to publish any information about the problem on their website. Here's what the C:LaytonCmdSvc.log contains on many of my systems: Layton Remote Command Process started Logon with the following credentials User: administrator Domain: ippc Password: <removed> Logged on ok LogonUser Successful Command Executed is : "\CoorsauditScanScan32.exe" __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top