CVE-2018-9031

The login interface on TNLSoftSolutions Sentry Vision 3.x devices provides password disclosure by reading an "if(pwd ==" line in the HTML source code. This means, in effect, that authentication occurs only on the client side.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tnlsoftsolutions:sentry_vision:3.0:*:*:*:*:*:*:*
cpe:2.3:a:tnlsoftsolutions:sentry_vision:3.1:*:*:*:*:*:*:*
cpe:2.3:a:tnlsoftsolutions:sentry_vision:3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
References () https://gist.github.com/pabloonicarres/c2c284ca7b025d629da39087445ed15d#file-sentryvision_authentication_bypass-sh - Exploit, Third Party Advisory () https://gist.github.com/pabloonicarres/c2c284ca7b025d629da39087445ed15d#file-sentryvision_authentication_bypass-sh - Exploit, Third Party Advisory
References () https://www.youtube.com/watch?v=pLMH9vGPRCo - Third Party Advisory () https://www.youtube.com/watch?v=pLMH9vGPRCo - Third Party Advisory

Information

Published : 2018-03-29 16:29

Updated : 2024-11-21 04:14


NVD link : CVE-2018-9031

Mitre link : CVE-2018-9031

CVE.ORG link : CVE-2018-9031


JSON object : View

Products Affected

tnlsoftsolutions

  • sentry_vision
CWE
CWE-522

Insufficiently Protected Credentials