An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
References
Link | Resource |
---|---|
https://blog.hivint.com/rconfig-3-9-3-unauthenticated-sensitive-information-disclosure-ead4ed88f153 | Exploit Third Party Advisory |
https://github.com/rconfig/rconfig/commit/20f4e3d87e84663d922b937842fddd9af1b68dd9 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-03-20T17:42:54
Updated: 2020-03-20T17:42:54
Reserved: 2020-02-27T00:00:00
Link: CVE-2020-9425
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-03-20T18:15:14.107
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-9425
JSON object: View
Redhat Information
No data.
CWE