CVE-2011-0436

The register_user function in client/new_account_form.php in Domain Technologie Control (DTC) before 0.32.9 includes a cleartext password in an e-mail message, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302
http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=adffff7efb3687ff465ee0552a944dd3109f3cb0
http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=f8e3b2d7cc2da313addc05394568ab9599499285
http://openwall.com/lists/oss-security/2011/02/22/1
http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog
http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog
http://secunia.com/advisories/43523 Vendor Advisory
http://www.debian.org/security/2011/dsa-2179
http://www.gplhost.sg/lists/dtcannounce/msg00025.html Patch
http://www.vupen.com/english/advisories/2011/0556 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65898
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302
http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=adffff7efb3687ff465ee0552a944dd3109f3cb0
http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=f8e3b2d7cc2da313addc05394568ab9599499285
http://openwall.com/lists/oss-security/2011/02/22/1
http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog
http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog
http://secunia.com/advisories/43523 Vendor Advisory
http://www.debian.org/security/2011/dsa-2179
http://www.gplhost.sg/lists/dtcannounce/msg00025.html Patch
http://www.vupen.com/english/advisories/2011/0556 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/65898
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.14:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.15:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.16:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.29.17:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.8:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.10:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.18:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.30.20:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.1:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.2:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.3:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.4:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.5:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.6:*:*:*:*:*:*:*
cpe:2.3:a:gplhost:domain_technologie_control:0.32.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:23

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302 -
References () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=adffff7efb3687ff465ee0552a944dd3109f3cb0 - () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=adffff7efb3687ff465ee0552a944dd3109f3cb0 -
References () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=f8e3b2d7cc2da313addc05394568ab9599499285 - () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=f8e3b2d7cc2da313addc05394568ab9599499285 -
References () http://openwall.com/lists/oss-security/2011/02/22/1 - () http://openwall.com/lists/oss-security/2011/02/22/1 -
References () http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog - () http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog -
References () http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog - () http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog -
References () http://secunia.com/advisories/43523 - Vendor Advisory () http://secunia.com/advisories/43523 - Vendor Advisory
References () http://www.debian.org/security/2011/dsa-2179 - () http://www.debian.org/security/2011/dsa-2179 -
References () http://www.gplhost.sg/lists/dtcannounce/msg00025.html - Patch () http://www.gplhost.sg/lists/dtcannounce/msg00025.html - Patch
References () http://www.vupen.com/english/advisories/2011/0556 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0556 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65898 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65898 -

07 Nov 2023, 02:06

Type Values Removed Values Added
References
  • {'url': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285', 'name': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • {'url': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0', 'name': 'http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=f8e3b2d7cc2da313addc05394568ab9599499285 -
  • () http://git.gplhost.com/gitweb/?p=dtc.git%3Ba=commit%3Bh=adffff7efb3687ff465ee0552a944dd3109f3cb0 -

Information

Published : 2011-03-07 21:00

Updated : 2024-11-21 01:23


NVD link : CVE-2011-0436

Mitre link : CVE-2011-0436

CVE.ORG link : CVE-2011-0436


JSON object : View

Products Affected

gplhost

  • domain_technologie_control
CWE
CWE-310

Cryptographic Issues