An issue was discovered on Alcatel-Lucent OmniVista 4760 devices, and 8770 devices before 4.1.2. An incorrect web server configuration allows a remote unauthenticated attacker to retrieve the content of its own session files. Every session file contains the administrative LDAP credentials encoded in a reversible format. Sessions are stored in /sessions/sess_<sessionid>.
References
Link | Resource |
---|---|
https://git.lsd.cat/g/omnivista-rce | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/155595/Alcatel-Lucent-Omnivista-8770-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.al-enterprise.com/en/-/media/assets/internet/documents/sa-c0065-ov8770-rce-vulnerability-en.pdf | Vendor Advisory |
https://www.exploit-db.com/exploits/47761 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-12-27 19:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-20047
Mitre link : CVE-2019-20047
CVE.ORG link : CVE-2019-20047
JSON object : View
Products Affected
al-enterprise
- omnivista_8770
- omnivista_4760
CWE
CWE-522
Insufficiently Protected Credentials