lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070930022921.29120.qmail@securityfocus.com> Date: 30 Sep 2007 02:29:21 -0000 From: joseph.giron13@...il.com To: bugtraq@...urityfocus.com Subject: ASP-CMS version 1 default password location. ASP-CMS version 1 default password location. http://asp-cms.sourceforge.net/ A vulnerability exists within the content management system ASP-CMS that allows a remote user to see the username and password of the content management system itsself. the user/pass combo along with all the other settings of the application are stored in an MDB file in the folder mdb-database. Attackers can input the following into an affected site: http://www.example.com/asp-cms/mdb-database/ASP-CMS_v100.mdb The fix would be to add place the file somewhere else on the filesystem out of reach of the http area.