Aida-Web Information Exposure

2007.11.24
Credit: MC Iglo
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Hi list, Parameters being transferred per $_GET aren't sanitised properly. http://name.tld/CGI-Bin/frame.html?Mehr=xxx Everyone can read any comment and its poster, although it should be readable only for superiors http://name.tld/CGI-Bin/frame.html?Mehr=xxx&SUPER=x You can see, which supervisor the task was forwarded to and their UniqueIDs Anyways, everything is acting really strange if you try to test something. Out of 10 tries, u get 8x All information you want to get 1x a weird name instead of the real one 1x a Errorpage like 404, "session timed out", blank site,... For all these tests it is not necessary to be logged in. There might be a lot more bugs, but I can't look for them on a live system :( Vendor: http://www.aida-orga.de/ Regards MC.Iglo


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top