The /server/properties resource in Tenable Web UI before 2.3.5 for Nessus 5.2.3 through 5.2.7 allows remote attackers to obtain sensitive information via the token parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/127532/Tenable-Nessus-5.2.7-Parameter-Tampering-Authentication-Bypass.html - Exploit | |
References | () http://www.halock.com/blog/cve-2014-4980-parameter-tampering-nessus-web-ui/ - | |
References | () http://www.osvdb.org/109376 - | |
References | () http://www.securityfocus.com/archive/1/532839/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/68782 - | |
References | () http://www.securitytracker.com/id/1030614 - | |
References | () http://www.tenable.com/security/tns-2014-05 - Vendor Advisory |
Information
Published : 2014-07-23 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-4980
Mitre link : CVE-2014-4980
CVE.ORG link : CVE-2014-4980
JSON object : View
Products Affected
tenable
- nessus
- web_ui
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor