LiveZilla 5.1.2.1 and earlier includes the MD5 hash of the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7033.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-05-19 07:55
Updated : 2014-05-20 05:08
NVD link : CVE-2013-7385
Mitre link : CVE-2013-7385
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
livezilla
- livezilla