In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.
References
Link | Resource |
---|---|
https://sion-evans.com/blog/CVE-2019-20150.html | Exploit Third Party Advisory |
https://sion-evans.com/blog/CVE-2019-20150.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://sion-evans.com/blog/CVE-2019-20150.html - Exploit, Third Party Advisory |
Information
Published : 2020-08-20 13:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20150
Mitre link : CVE-2019-20150
CVE.ORG link : CVE-2019-20150
JSON object : View
Products Affected
treasuryxpress
- treasuryxpress
CWE