The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Oct/33 | Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Oct/33 | Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html - Third Party Advisory, VDB Entry | |
| References | () http://seclists.org/fulldisclosure/2019/Oct/33 - Mailing List, Third Party Advisory | 
Information
                Published : 2019-10-18 17:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17393
Mitre link : CVE-2019-17393
CVE.ORG link : CVE-2019-17393
JSON object : View
Products Affected
                tomedo
- server
