Описание
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-0214
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64543
- http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt
- http://seclists.org/fulldisclosure/2011/Jan/58
- http://www.kb.cert.org/vuls/id/870601
- http://www.securityfocus.com/bid/45699
- http://www.vupen.com/english/advisories/2011/0059
Связанные уязвимости
The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.