Vulnerabilities > CVE-2008-4165 - Cryptographic Issues vulnerability in Kolab Groupware Server 1.0.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
admin/user/create_user.php in Kolab Groupware Server 1.0.0 places a user password in an HTTP GET request, which allows local administrators, and possibly remote attackers, to obtain cleartext passwords by reading the ssl_access_log file or the referer string.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:193
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:193
- http://www.securityfocus.com/bid/31165
- http://www.securityfocus.com/bid/31165
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45124
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45124
- https://qa.mandriva.com/show_bug.cgi?id=43434
- https://qa.mandriva.com/show_bug.cgi?id=43434