Squash TM through 1.18.0 presents the cleartext passwords of external services in the administration panel, as demonstrated by a ta-server-password field in the HTML source code.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2018/09/13/1 | mailing list third party advisory exploit |
https://ci.squashtest.org/mantis/view.php?id=7553 | vendor advisory permissions required |