CVE-2016-6602

ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm to store passwords, which allows context-dependent attackers to obtain cleartext passwords by leveraging access to WEB-INF/conf/securitydbData.xml. NOTE: this issue can be combined with CVE-2016-6601 for a remote exploit.
References
Link Resource
http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2016/Aug/54 Exploit Mailing List
http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure Third Party Advisory
http://www.securityfocus.com/archive/1/539159/100/0/threaded
http://www.securityfocus.com/bid/92402 Third Party Advisory VDB Entry
https://blogs.securiteam.com/index.php/archives/2712 Exploit Technical Description Third Party Advisory
https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them
https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt Exploit
https://www.exploit-db.com/exploits/40229/ Exploit Third Party Advisory
http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2016/Aug/54 Exploit Mailing List
http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure Third Party Advisory
http://www.securityfocus.com/archive/1/539159/100/0/threaded
http://www.securityfocus.com/bid/92402 Third Party Advisory VDB Entry
https://blogs.securiteam.com/index.php/archives/2712 Exploit Technical Description Third Party Advisory
https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them
https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt Exploit
https://www.exploit-db.com/exploits/40229/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:*

History

21 Nov 2024, 02:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2016/Aug/54 - Exploit, Mailing List () http://seclists.org/fulldisclosure/2016/Aug/54 - Exploit, Mailing List
References () http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure - Third Party Advisory () http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure - Third Party Advisory
References () http://www.securityfocus.com/archive/1/539159/100/0/threaded - () http://www.securityfocus.com/archive/1/539159/100/0/threaded -
References () http://www.securityfocus.com/bid/92402 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92402 - Third Party Advisory, VDB Entry
References () https://blogs.securiteam.com/index.php/archives/2712 - Exploit, Technical Description, Third Party Advisory () https://blogs.securiteam.com/index.php/archives/2712 - Exploit, Technical Description, Third Party Advisory
References () https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them - () https://forums.webnms.com/topic/recent-vulnerabilities-in-webnms-and-how-to-protect-the-server-against-them -
References () https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt - Exploit () https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt - Exploit
References () https://www.exploit-db.com/exploits/40229/ - Exploit, Third Party Advisory () https://www.exploit-db.com/exploits/40229/ - Exploit, Third Party Advisory

Information

Published : 2017-01-23 21:59

Updated : 2024-11-21 02:56


NVD link : CVE-2016-6602

Mitre link : CVE-2016-6602

CVE.ORG link : CVE-2016-6602


JSON object : View

Products Affected

zohocorp

  • webnms_framework
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm