Text Rider 2.4 stores sensitive data in the data directory under the web document root with insufficient access control, which allows remote attackers to obtain usernames and password hashes by directly accessing data/userlist.txt.
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://evuln.com/vulns/46/summary.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/18605 - Vendor Advisory | |
References | () http://securitytracker.com/id?1015533 - | |
References | () http://www.securityfocus.com/archive/1/423130/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/0321 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24279 - |
Information
Published : 2006-01-26 22:03
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0439
Mitre link : CVE-2006-0439
CVE.ORG link : CVE-2006-0439
JSON object : View
Products Affected
text_rider
- text_rider
CWE