Team Board 1.x and 2.x stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for data/team.mdb.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.osvdb.org/51752 | vdb entry exploit |
http://packetstorm.linuxsecurity.com/0902-exploits/teamboard-ddxss.txt | exploit |
https://www.exploit-db.com/exploits/7982 | exploit |
http://secunia.com/advisories/33839 | third party advisory vendor advisory |