Login.aspx in the SmarterTools SmarterStats 6.0 web server generates a ctl00$MPH$txtPassword password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67827 | vdb entry |
http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html | |
http://www.kb.cert.org/vuls/id/MORO-8GYQR4 | us government resource |
http://www.kb.cert.org/vuls/id/240150 | third party advisory us government resource |