Team Board 1.x and 2.x stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for data/team.mdb.
References
Link | Resource |
---|---|
http://secunia.com/advisories/33839 | Vendor Advisory |
http://www.osvdb.org/51752 | Exploit |
http://packetstorm.linuxsecurity.com/0902-exploits/teamboard-ddxss.txt | Exploit |
https://www.exploit-db.com/exploits/7982 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-03-05 22:50
Updated : 2017-09-28 18:34
NVD link : CVE-2009-0760
Mitre link : CVE-2009-0760
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
team5
- team_board