An issue was discovered on Alcatel-Lucent OmniVista 4760 devices, and 8770 devices before 4.1.2. An incorrect web server configuration allows a remote unauthenticated attacker to retrieve the content of its own session files. Every session file contains the administrative LDAP credentials encoded in a reversible format. Sessions are stored in /sessions/sess_<sessionid>.
References
Link | Resource |
---|---|
https://git.lsd.cat/g/omnivista-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8770-rce-vulnerability-en.pdf | Vendor Advisory |
https://www.exploit-db.com/exploits/47761 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-27T18:19:20
Updated: 2019-12-27T18:19:20
Reserved: 2019-12-27T00:00:00
Link: CVE-2019-20047
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-27T19:15:12.553
Modified: 2020-01-07T21:35:16.473
Link: CVE-2019-20047
JSON object: View
Redhat Information
No data.
CWE