Описание
backupsettings.html in the web administrative portal in Zhone zNID GPON 2426A before S3.0.501 places a session key in a URL, which allows remote attackers to obtain arbitrary user passwords via the sessionKey parameter in a getConfig action to backupsettings.conf.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до s3.0.501 (исключая)
Одновременно
cpe:2.3:o:dasanzhone:znid_2426a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dasanzhone:znid_2426a:-:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.18268
Средний
8.8 High
CVSS3
4 Medium
CVSS2
Дефекты
CWE-255
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
backupsettings.html in the web administrative portal in Zhone zNID GPON 2426A before S3.0.501 places a session key in a URL, which allows remote attackers to obtain arbitrary user passwords via the sessionKey parameter in a getConfig action to backupsettings.conf.
EPSS
Процентиль: 95%
0.18268
Средний
8.8 High
CVSS3
4 Medium
CVSS2
Дефекты
CWE-255