Before Thornberry NDoc version 8.0, laptop clients and the server have default database (Cache) users set up with a single password. This password is left behind in a cleartext log file during client installation on laptops. This password can be used to gain full admin/system access to client devices (if no firewall is present) or the NDoc server itself. Once the password is known to an attacker, local access is not required.
References
Link | Resource |
---|---|
https://gist.github.com/emptythevoid/84248daccce8737f1cdd5b395cf6f32c | Issue Tracking Third Party Advisory |
https://gist.github.com/emptythevoid/84248daccce8737f1cdd5b395cf6f32c | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/emptythevoid/84248daccce8737f1cdd5b395cf6f32c - Issue Tracking, Third Party Advisory |
Information
Published : 2017-10-26 20:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15366
Mitre link : CVE-2017-15366
CVE.ORG link : CVE-2017-15366
JSON object : View
Products Affected
ndocsoftware
- ndoc
CWE
CWE-532
Insertion of Sensitive Information into Log File