ezRADIUS 0.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain credentials via a direct request for (1) config.ini or (2) database.ini. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29769 - Vendor Advisory | |
References | () http://sourceforge.net/forum/forum.php?forum_id=809832 - | |
References | () http://sourceforge.net/project/shownotes.php?release_id=591272&group_id=221332 - | |
References | () http://www.osvdb.org/44399 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41767 - |
Information
Published : 2008-04-11 21:05
Updated : 2024-11-21 00:45
NVD link : CVE-2008-1752
Mitre link : CVE-2008-1752
CVE.ORG link : CVE-2008-1752
JSON object : View
Products Affected
achmad_zaenuri
- ezradius
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor