CVE-2013-7385

LiveZilla 5.1.2.1 and earlier includes the MD5 hash of the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7033.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.1.2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-05-19 14:55

Updated : 2024-02-04 18:35


NVD link : CVE-2013-7385

Mitre link : CVE-2013-7385

CVE.ORG link : CVE-2013-7385


JSON object : View

Products Affected

livezilla

  • livezilla
CWE
CWE-310

Cryptographic Issues