Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.16388
Categoría:Web application abuses
Título:Credit Card Data Disclosure in CitrusDB
Resumen:CitrusDB uses a textfile to temporarily store credit card information.;; This textfile is located in the web tree via a static URL and thus accessible to third parties.; It also isn't deleted after processing resulting in a big window of opportunity for an attacker.
Descripción:Summary:
CitrusDB uses a textfile to temporarily store credit card information.

This textfile is located in the web tree via a static URL and thus accessible to third parties.
It also isn't deleted after processing resulting in a big window of opportunity for an attacker.

Solution:
Update to CitrusDB version 0.3.6 or higher and set the
option '$path_to_ccfile' in the configuration to a path not accessible via HTTP.

Workaround : Either deny access to the file using access restriction
features of the remote webserver or change CitrusDB to use a file
outside the document root and not accessible via HTTP.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-0229
BugTraq ID: 12402
http://www.securityfocus.com/bid/12402
http://marc.info/?l=full-disclosure&m=110824766519417&w=2
http://www.redteam-pentesting.de/advisories/rt-sa-2005-001.txt
http://securitytracker.com/id?1013040
XForce ISS Database: citrus-information-disclosure(19145)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19145
CopyrightCopyright (C) 2005 Noam Rathaus

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.