Описание
The web application stores credentials in clear text in the "admin.xml" file, which can be accessed without logging into the website, which could allow an attacker to obtain credentials related to all users, including admin users, in clear text, and use them to subsequently execute malicious actions.
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:ormazabal:ekorccp_firmware:601j:*:*:*:*:*:*:*
cpe:2.3:h:ormazabal:ekorccp:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:ormazabal:ekorrci_firmware:601j:*:*:*:*:*:*:*
cpe:2.3:h:ormazabal:ekorrci:-:*:*:*:*:*:*:*
EPSS
Процентиль: 8%
0.00031
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
Дефекты
CWE-256
CWE-522
Связанные уязвимости
CVSS3: 7.3
github
больше 2 лет назад
** UNSUPPPORTED WHEN ASSIGNED ** The web application stores credentials in clear text in the "admin.xml" file, which can be accessed without logging into the website, which could allow an attacker to obtain credentials related to all users, including admin users, in clear text, and use them to subsequently execute malicious actions.
EPSS
Процентиль: 8%
0.00031
Низкий
7.3 High
CVSS3
5.5 Medium
CVSS3
Дефекты
CWE-256
CWE-522