Layton Helpbox 4.4.0 Password Disclosure

2012.10.27
Risk: High
Local: No
Remote: Yes
CWE: CWE-200


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Layton Helpbox 4.4.0 Password Disclosure Vulnerability by Joseph Sheridan Summary Layton Technologies Helpbox product version 4.4.0 is vulnerable to a password disclosure vulnerability in an error page. CVE number: CVE-2012-4976 Impact: High Vendor homepage: http://www.laytontechnology.com Vendor notified: 10/09/2012 Vendor response: This product has been replaced by 'ServiceDesk' but fixes may be available with valid support contracts. Credit: Joseph Sheridan of ReactionIS Affected Products Helpbox 4.4.0 Details The error page discloses the ODBC database connection string containing the cleartext username and password for the database connection. An attacker can then use these details to access the database. The vulnerable page was 'selectawasset.asp' with a querystring parameter of 'element=sys_asset_id'. Impact An attacker may be able to login to the database directly with the credentials disclosed. Solution Layton advise upgrading to their newer 'ServiceDesk' product. However, if you have an active support contract, Layton may be able to provide fixes for you. About ReactionIS Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.

References:

http://www.laytontechnology.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top