Dangerous information in CentraOne Log files, possible user impersonation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




-----BEGIN PGP SIGNED MESSAGE-----

Vendor Contacted:	12/7/01
Date Published:	12/17/01
Bugtraq ID: 	-
CVE CAN: 	-
Title:	Dangerous information being recorded in CentraOne Log files, possible user impersonation
Severity: 	Medium
Remote Exploit:	No
Local Exploit:	Yes

Vulnerability Description:
Centra is a Web-based product designed to facilitate e-learning and collaboration.  By default, when the application is launched, several log files are created within one of the application's sub-directories.  These log files are not protected and contain sensitive information about the user, his/her machine and the connected network; including the proxy server name, port, exception list and a base64 encoded username / password string.  Base64 is not an encryption method and it is, therefore, trivial to decode the clear text username and password.

This information could easily be used to successfully launch an impersonation attack on related systems participating in the user's network by both internal and external users as Centra technical support frequently request that these files be e-mailed and external facing devices such as remote access devices and secure web sites typically use the same username / password combination.

Solution/Vendor Information/Workaround:
Vendor contacted on 12/7/01.  Having received no response by 12/17, vulnerability published.
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlsEARECABsFAjwd+uUUHHplZGZseUBodXNobWFpbC5jb20ACgkQUqpz3LoqFknxlgCe
MvVdTbUhm8cKm4HO88hzBWe22OMAnjrInV0tQOG4BJDs8gBxl7aLatCK
=Ai2x
-----END PGP SIGNATURE-----


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux