exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Zabbix 2.0.5 Password Leak

Zabbix 2.0.5 Password Leak
Posted Sep 25, 2013
Authored by Pablo Gonzalez, Chema Alonso, German Sanchez

Zabbix version 2.0.5 suffers from an issue where it allows for the disclosure of a user's password.

tags | advisory
advisories | CVE-2013-5572
SHA-256 | cf632cf260f0dd10243a64e66e97a8eb0ca481c0cc6b35ff2633b0cd564cacf9

Zabbix 2.0.5 Password Leak

Change Mirror Download
Hello,

I attach information about CVE-2013-5572 (Zabbix leakage password).

================================================================

ID: CVE-2013-5572

Title: Vulnerability Leak Password Zabbix

Date: 23/08/2013

Status: Not Solved

Scope: Privilege Elevation

Author: Chema Alonso, Pablo González, Germán Sánchez

================================================================



There is a security bug on Zabbix 2.0.5. This bug allows to see a zabbix
user’s password, if this user has a open session in management console.
Potentially, This vulnerability allows to carry on an privilege elevation
affecting the way Active Directory resources on Enterprise Network are
accessed.



About Zabbix

------------



>From Wikipedia : "Zabbix is a network management system application

[...] designed to monitor and track the status of various network

services, servers, and other network hardware."





Vulnerability description

-------------------------



First, once the user is able to open a console session in Zabbix, he or she
can access to the tab (Administration -> Users) where the various users of
the system are displayed.



The user that has been impersonated can view the application source code
finding there the password that interacts Zabbix, for example with the
domain controller.



The field that should be looked for in the source code of the website is
type = "password" id = "ldap_bind_password" name = "ldap_bind_password"
value = <password>.



Another option to discover the password supposes that, once the user
requests the refreshing the web page, the browser asks the user to store or
cache the password.



Affected versions and platforms

-------------------------------



This bug has been verified on the Zabbix 2.0.5. Although the bug can
probably be found in previous versions.




Thank you.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close