CVE-2019-17393

The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tomedo:server:1.7.3:*:*:*:*:*:*:*

History

21 Nov 2024, 04:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2019/Oct/33 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Oct/33 - Mailing List, Third Party Advisory

Information

Published : 2019-10-18 17:15

Updated : 2024-11-21 04:32


NVD link : CVE-2019-17393

Mitre link : CVE-2019-17393

CVE.ORG link : CVE-2019-17393


JSON object : View

Products Affected

tomedo

  • server
CWE
CWE-319

Cleartext Transmission of Sensitive Information

CWE-522

Insufficiently Protected Credentials