Xitami 2.4 through 2.5 b4 stores the Administrator password in plaintext in the default.aut file, whose default permissions are world-readable, which allows remote attackers to gain privileges.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/3582 | broken link third party advisory vdb entry |
http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html | vendor advisory broken link exploit |
http://www.securityfocus.com/archive/1/242375 | broken link mailing list third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7600 | third party advisory vdb entry |