Intellisol Xpede 4.1 stores passwords in plaintext in a Javascript "session timeout" re-authentication capability, which could allow local users with access to gain privileges of other Xpede users by reading the password from the source file, e.g. from the browser's cache.
References
| Link | Resource |
|---|---|
| http://www.iss.net/security_center/static/8612.php | Vendor Advisory |
| http://www.securityfocus.com/archive/1/263485 | Vendor Advisory |
| http://www.securityfocus.com/bid/4346 | Exploit Vendor Advisory |
| http://www.iss.net/security_center/static/8612.php | Vendor Advisory |
| http://www.securityfocus.com/archive/1/263485 | Vendor Advisory |
| http://www.securityfocus.com/bid/4346 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.iss.net/security_center/static/8612.php - Vendor Advisory | |
| References | () http://www.securityfocus.com/archive/1/263485 - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/4346 - Exploit, Vendor Advisory |
Information
Published : 2002-08-12 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-0487
Mitre link : CVE-2002-0487
CVE.ORG link : CVE-2002-0487
JSON object : View
Products Affected
workforceroi
- xpede
CWE
