Vulnerabilities > CVE-2005-3630 - Unspecified vulnerability in Redhat Fedora Core 1.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN redhat
nessus
Summary
Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such as the password from adm.conf via an IFRAME element, probably involving an Apache httpd.conf configuration that orders "allow" directives before "deny" directives.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Nessus
NASL family | CGI abuses |
NASL id | FEDORA_DS_PASS_DISCLOSURE.NASL |
description | The remote host appears to be running Fedora Directory Server, a directory server implementation for Fedora Core. The Administration Server, which is used to manage Fedora DS, allows an unauthenticated attacker to retrieve the admin password hash through a simple GET request. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20952 |
published | 2006-02-21 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20952 |
title | Fedora Directory Server Crafted IFRAME adm.conf Admin Server Password Disclosure |
code |
|
References
- http://directory.fedora.redhat.com/wiki/FDS10Announcement
- http://directory.fedora.redhat.com/wiki/FDS10Announcement
- http://secunia.com/advisories/18939
- http://secunia.com/advisories/18939
- http://www.securityfocus.com/bid/16729
- http://www.securityfocus.com/bid/16729
- https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=121994
- https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=121994
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174837
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174837