Lucene search

K
attackerkbAttackerKBAKB:8E6C800C-0C6A-4B6C-B8EB-DE019475C34E
HistoryMar 09, 2017 - 12:00 a.m.

CVE-2017-6528

2017-03-0900:00:00
attackerkb.com
13

EPSS

0.016

Percentile

87.6%

An issue was discovered in dnaTools dnaLIMS 4-2015s13. dnaLIMS is affected by plaintext password storage (the /home/dna/spool/.pfile file).

Recent assessments:

h00die at March 27, 2020 4:11pm UTC reported:

/home/dna/spool/.pfile is the database file for users. It is a tab delimited file, and by default passwords are kept in cleartext. An option is available to hash the passwords (MD5 I believe), however it is not the default. The configuration we found in live tested included several admin accounts for the software developer. No patch was available or would be created when the developer was notified.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5

EPSS

0.016

Percentile

87.6%