backupsettings.html in the web administrative portal in Zhone zNID GPON 2426A before S3.0.501 places a session key in a URL, which allows remote attackers to obtain arbitrary user passwords via the sessionKey parameter in a getConfig action to backupsettings.conf.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2015/Oct/57 | mailing list exploit third party advisory |
https://www.exploit-db.com/exploits/38453/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html | exploit vdb entry third party advisory |
http://www.securityfocus.com/archive/1/536663/100/0/threaded | mailing list |