LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://forums.livezilla.net/index.php?/topic/163-livezilla-changelog/ - | |
References | () http://packetstormsecurity.com/files/124444/LiveZilla-5.1.2.0-Insecure-Password-Storage.html - Exploit |
Information
Published : 2014-05-19 14:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7033
Mitre link : CVE-2013-7033
CVE.ORG link : CVE-2013-7033
JSON object : View
Products Affected
livezilla
- livezilla
CWE
CWE-310
Cryptographic Issues