Mathcad 12 through 13.1 allows local users to bypass the security features by directly accessing or editing the XML representation of the worksheet with a text editor or other program, which allows attackers to (1) bypass password protection by replacing the password field with a hash of a known password, (2) modify timestamps to avoid detection of modifications, (3) remove locks by removing the "is-locked" attribute, and (4) view locked data, which is stored in plaintext.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/27118 | vdb entry |
http://securityreason.com/securityalert/2305 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27116 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27115 | vdb entry |
http://www.securityfocus.com/archive/1/436441/30/4560/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27117 | vdb entry |