The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/870601 | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64543 | vdb entry |
http://www.vupen.com/english/advisories/2011/0059 | vdb entry vendor advisory |
http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt | exploit |
http://seclists.org/fulldisclosure/2011/Jan/58 | mailing list exploit |
http://www.securityfocus.com/bid/45699 | vdb entry |