发布时间 :2005-04-10 00:00:00
修订时间 :2017-07-10 21:32:30

[原文]TowerBlog 0.6 and earlier stores the login data file under the web root, which allows remote attackers to obtain the MD5 checksums of the username and password via a direct request to the _dat/login file.

[CNNVD]TowerBlog 用户密码信息泄露漏洞(CNNVD-200504-013)

        TowerBlog 0.6及更早版本在root目录下储存登录数据文件,远程攻击者可以通过直接请求_dat/login文件,获得用户名和密码的消息摘要算法5(MD5)校验码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050410 TowerBlog <= 0.6 Admin Account View [x0n3-h4ck]
(UNKNOWN)  XF  towerblog-datlogin-information-disclosure(20039)

- 漏洞信息

TowerBlog 用户密码信息泄露漏洞
高危 访问验证错误
2005-04-10 00:00:00 2005-10-20 00:00:00
        TowerBlog 0.6及更早版本在root目录下储存登录数据文件,远程攻击者可以通过直接请求_dat/login文件,获得用户名和密码的消息摘要算法5(MD5)校验码。

- 公告与补丁


- 漏洞信息

TowerBlog _dat/login Admin Credential Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

TowerBlog contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when malicious user requests the '_dat/login' file, which will disclose encrypted usernames and passwords resulting in a loss of confidentiality.

- 时间线

2005-04-10 Unknow
2005-04-10 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): restrict and/or deny access to the _dat/login file.

- 相关参考

- 漏洞作者

- 漏洞信息

TowerBlog User Credential Exposure Weakness
Access Validation Error 13090
Yes No
2005-04-11 12:00:00 2009-07-12 12:56:00
Discovery is credited to CorryL.

- 受影响的程序版本

TowerBlog TowerBlog 0.6 -r1
TowerBlog TowerBlog 0.6
TowerBlog TowerBlog 0.4 -r1
TowerBlog TowerBlog 0.2

- 漏洞讨论

TowerBlog is reported prone to a weakness that may allow remote attackers to disclose user credentials.

It is reported that user password hashes are stored in a file that resides in the Web root allowing arbitrary attackers to access and disclose the sensitive information.

An attacker may then carry out brute force attacks against the password hashes to ultimately disclose user credentials. This may lead to other attacks against the system and potentially allow the attacker to compromise an affected computer.

TowerBlog 0.6 is reported to be affected. Other versions may be affected as well.

- 漏洞利用

An exploit is not required.

- 解决方案

This issue may have been addresses in TowerBlog 0.6-r2. This cannot be confirmed at the moment. Please contact the vendor for more information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考