LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41768 | vdb entry |
http://secunia.com/advisories/29757 | third party advisory vendor advisory |
http://osvdb.org/44397 | vdb entry |
https://www.exploit-db.com/exploits/5425 | exploit |