PHP Advanced Transfer Manager 1.00 through 1.30 stores sensitive information, including password hashes, under the web root with insufficient access control, which allows remote attackers to download each password hash via a direct request for a users/[USERNAME] file.
Link | Tags |
---|---|
http://www.blogcu.com/Liz0ziM/316652/ | exploit url repurposed |
http://www.securityfocus.com/archive/1/427216/100/0/threaded | mailing list |
http://biyosecurity.be/bugs/patm.txt | exploit |
http://www.securityfocus.com/archive/1/437513/100/200/threaded | mailing list |
http://securityreason.com/securityalert/565 | third party advisory |
http://secunia.com/advisories/17134 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25127 | vdb entry |