The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/33 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Oct/33 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154873/Tomedo-Server-1.7.3-Information-Disclosure-Weak-Cryptography.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2019/Oct/33 - Mailing List, Third Party Advisory |
Information
Published : 2019-10-18 17:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17393
Mitre link : CVE-2019-17393
CVE.ORG link : CVE-2019-17393
JSON object : View
Products Affected
tomedo
- server