Описание
LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
Ссылки
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 5.1.2.0 (включая)
Одно из
cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:livezilla:livezilla:5.1.1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.0025
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-310
Связанные уязвимости
github
больше 3 лет назад
LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
EPSS
Процентиль: 48%
0.0025
Низкий
4.3 Medium
CVSS2
Дефекты
CWE-310