[原文]TowerBlog 0.6 and earlier stores the login data file under the web root, which allows remote attackers to obtain the MD5 checksums of the username and password via a direct request to the _dat/login file.
TowerBlog contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when malicious user requests the '_dat/login' file, which will disclose encrypted usernames and passwords resulting in a loss of confidentiality.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): restrict and/or deny access to the _dat/login file.
TowerBlog is reported prone to a weakness that may allow remote attackers to disclose user credentials.
It is reported that user password hashes are stored in a file that resides in the Web root allowing arbitrary attackers to access and disclose the sensitive information.
An attacker may then carry out brute force attacks against the password hashes to ultimately disclose user credentials. This may lead to other attacks against the system and potentially allow the attacker to compromise an affected computer.
TowerBlog 0.6 is reported to be affected. Other versions may be affected as well.
An exploit is not required.
This issue may have been addresses in TowerBlog 0.6-r2. This cannot be confirmed at the moment. Please contact the vendor for more information.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com <mailto:firstname.lastname@example.org>.