Oi! Email Marketing System 3.0 (aka Oi! 3) stores the server's FTP password in cleartext on a Configuration web page, which allows local users with superadministrator privileges, or attackers who have obtained access to the web page, to view the password.
Link | Tags |
---|---|
http://securityreason.com/securityalert/483 | third party advisory |
http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt | exploit vendor advisory |
http://www.securityfocus.com/archive/1/425924/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/16794 | vdb entry |