Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qmrr-73wg-fc4j

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

admin/user/create_user.php in Kolab Groupware Server 1.0.0 places a user password in an HTTP GET request, which allows local administrators, and possibly remote attackers, to obtain cleartext passwords by reading the ssl_access_log file or the referer string.

admin/user/create_user.php in Kolab Groupware Server 1.0.0 places a user password in an HTTP GET request, which allows local administrators, and possibly remote attackers, to obtain cleartext passwords by reading the ssl_access_log file or the referer string.

EPSS

Процентиль: 45%
0.00225
Низкий

Связанные уязвимости

nvd
больше 17 лет назад

admin/user/create_user.php in Kolab Groupware Server 1.0.0 places a user password in an HTTP GET request, which allows local administrators, and possibly remote attackers, to obtain cleartext passwords by reading the ssl_access_log file or the referer string.

EPSS

Процентиль: 45%
0.00225
Низкий