mxCamArchive 2.2 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain configuration details and passwords via a direct request for archive/config.ini.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/7136 | exploit |
http://www.securityfocus.com/bid/32324 | vdb entry |
http://secunia.com/advisories/32751 | third party advisory vendor advisory |
http://osvdb.org/49886 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46647 | vdb entry |