Intellisol Xpede 4.1 stores passwords in plaintext in a Javascript "session timeout" re-authentication capability, which could allow local users with access to gain privileges of other Xpede users by reading the password from the source file, e.g. from the browser's cache.
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/8612.php | Vendor Advisory |
http://www.securityfocus.com/archive/1/263485 | Vendor Advisory |
http://www.securityfocus.com/bid/4346 | Exploit Vendor Advisory |
http://www.iss.net/security_center/static/8612.php | Vendor Advisory |
http://www.securityfocus.com/archive/1/263485 | Vendor Advisory |
http://www.securityfocus.com/bid/4346 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/8612.php - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/263485 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4346 - Exploit, Vendor Advisory |
Information
Published : 2002-08-12 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0487
Mitre link : CVE-2002-0487
CVE.ORG link : CVE-2002-0487
JSON object : View
Products Affected
workforceroi
- xpede
CWE