Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gxq8-qw7q-mh32

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.

In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.

EPSS

Процентиль: 52%
0.00288
Низкий

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 6.5
nvd
больше 5 лет назад

In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.

EPSS

Процентиль: 52%
0.00288
Низкий

Дефекты

CWE-522