backup.php in HandsomeWeb SOS Webpages before 1.1.12 does not require knowledge of the cleartext password, which allows remote attackers to bypass authentication by leveraging knowledge of the administrator password hash.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/126844/HandsomeWeb-SOS-Webpages-1.1.11-Backup-Hash-Disclosure.html | third party advisory vdb entry exploit |
http://sourceforge.net/projects/soswebpages/files/SOS%20Webpages/SOS%20Webpages%201.1.12/ | third party advisory |
http://seclists.org/fulldisclosure/2014/May/130 | mailing list third party advisory exploit |
http://www.securityfocus.com/bid/67644 | third party advisory vdb entry |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-3445/ | third party advisory exploit |