The Net Guys ASPired2Blog stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing usernames and passwords via a direct request for admin/blog.mdb. NOTE: some of these details are obtained from third party information.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://securityreason.com/securityalert/4931 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47294 | vdb entry |
https://www.exploit-db.com/exploits/7436 | exploit |
http://secunia.com/advisories/33134 | third party advisory vendor advisory |