Lucene search

K
packetstormChris HeinPACKETSTORM:154873
HistoryOct 16, 2019 - 12:00 a.m.

Tomedo Server 1.7.3 Information Disclosure / Weak Cryptography

2019-10-1600:00:00
Chris Hein
packetstormsecurity.com
145

0.002 Low

EPSS

Percentile

57.0%

`Affected software: Tomedo Server 1.7.3  
Vulnerability type: Cleartext Transmission of Sensitive Information & Weak Cryptography for Passwords  
Vulnerable version: Tomedo Server 1.7.3  
Vulnerable component: Customer Tomedo Server that communicates with Vendor Tomedo Update Server  
Vendor report confidence: Confirmed  
Fixed version: Version later then 1.7.3  
Vendor notification: 20/09/19  
Solution date: 25/09/19  
CVE reference: CVE-2019-17393  
CVSS Score: 3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N   
Credits: Chris Hein, ProSec GmbH  
Communication Timeline:   
20th September 2019 Initial contact - no response  
25th September second contact attempt  
28th September Vendor responded and released an update  
14th October fulldisclosure   
  
Vulnerability Details:  
The Customerโ€™s Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors.  
Basic authentication is used for the authentication whatโ€™s makes it possible to base64 decode the sniffed credentials and get hold of the username and password.  
  
Proof of concept:  
Capture the traffic between the Tomedo servers via a proxy or a MITM attack and base64 decode the credentials from the HTTP GET request.  
`

0.002 Low

EPSS

Percentile

57.0%

Related for PACKETSTORM:154873