Dangerous information in CentraOne Log files, possible user impersonationFrom: email@example.com
- Previous message: Ian Freislich: "Re: xmms/xchat full access shared memory segments (and Mozilla)"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org To: email@example.com Date: Mon, 17 Dec 2001 06:03:54 -0800
-----BEGIN PGP SIGNED MESSAGE-----
Vendor Contacted: 12/7/01
Date Published: 12/17/01
Bugtraq ID: -
CVE CAN: -
Title: Dangerous information being recorded in CentraOne Log files, possible user impersonation
Remote Exploit: No
Local Exploit: Yes
Centra is a Web-based product designed to facilitate e-learning and collaboration. By default, when the application is launched, several log files are created within one of the application's sub-directories. These log files are not protected and contain sensitive information about the user, his/her machine and the connected network; including the proxy server name, port, exception list and a base64 encoded username / password string. Base64 is not an encryption method and it is, therefore, trivial to decode the clear text username and password.
This information could easily be used to successfully launch an impersonation attack on related systems participating in the user's network by both internal and external users as Centra technical support frequently request that these files be e-mailed and external facing devices such as remote access devices and secure web sites typically use the same username / password combination.
Vendor contacted on 12/7/01. Having received no response by 12/17, vulnerability published.
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com
-----END PGP SIGNATURE-----