PHP Advanced Transfer Manager (phpATM) /users/ Direct Request Password Hash Disclosure

2005-09-20T10:05:00
ID OSVDB:19529
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-09-20T10:05:00

Description

Vulnerability Description

PHP Advanced Transfer Manager contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when an attacker directly requests a user file (/users/[name]), which will disclose the encrypted password hash for that user resulting in a loss of confidentiality.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP Advanced Transfer Manager contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when an attacker directly requests a user file (/users/[name]), which will disclose the encrypted password hash for that user resulting in a loss of confidentiality.

Manual Testing Notes

http://[target]/[path]/users/[admin_name]

References:

Vendor URL: http://phpatm.free.fr/ Security Tracker: 1014930 Secunia Advisory ID:16867 Related OSVDB ID: 19524 Related OSVDB ID: 19526 Related OSVDB ID: 19530 Related OSVDB ID: 19523 Related OSVDB ID: 19528 Related OSVDB ID: 19532 Related OSVDB ID: 19533 Related OSVDB ID: 19525 Related OSVDB ID: 19527 Related OSVDB ID: 19531 Other Advisory URL: http://rgod.altervista.org/phpatm130.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-01/0385.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0740.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0369.html CVE-2006-1209