Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7mcc-6vvm-m53x

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.

The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.

EPSS

Процентиль: 81%
0.01475
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
около 15 лет назад

The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI.

EPSS

Процентиль: 81%
0.01475
Низкий

Дефекты

CWE-200