SAFE TEAM Regulus 2.2 – ‘Custchoice.php’ Update Your Password Action Information Disclosure

SAFE TEAM Regulus 2.2 – ‘Custchoice.php’ Update Your Password Action Information Disclosure

漏洞ID 1054586 漏洞类型
发布时间 2004-09-07 更新时间 2004-09-07
图片[1]-SAFE TEAM Regulus 2.2 – ‘Custchoice.php’ Update Your Password Action Information Disclosure-安全小百科CVE编号 N/A
图片[2]-SAFE TEAM Regulus 2.2 – ‘Custchoice.php’ Update Your Password Action Information Disclosure-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24582
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/11133/info

Regulus is reported prone to an information disclosure vulnerability. It is reported that a specified user/customer password hash is contained in a hidden tag of the 'Update Your Password' action page. 

An attacker may employ data that is obtained in this manner to aid in further attacks launched against the vulnerable software.

This vulnerability is reported to affect all versions of SAFE TEAM Regulus.

http://example.com/base-dir/htmlcust/custchoice.php?lang=English&userid=<name>&action=To update your password

Where '<name>' is the target username.

相关推荐: OmniCom winShadow hostname Buffer Overflow Vulnerability

OmniCom winShadow hostname Buffer Overflow Vulnerability 漏洞ID 1099533 漏洞类型 Boundary Condition Error 发布时间 2003-09-29 更新时间 2003-09-2…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享