Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-13021

Опубликовано: 14 мая 2020
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

The administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jetstream:jetselect:*:*:*:*:*:*:*:*

EPSS

Процентиль: 38%
0.00167
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-312

Связанные уязвимости

github
больше 3 лет назад

The administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.

EPSS

Процентиль: 38%
0.00167
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-312