Team Board 1.x and 2.x stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for data/team.mdb.
References
| Link | Resource |
|---|---|
| http://packetstorm.linuxsecurity.com/0902-exploits/teamboard-ddxss.txt | Exploit |
| http://secunia.com/advisories/33839 | Vendor Advisory |
| http://www.osvdb.org/51752 | Exploit |
| https://www.exploit-db.com/exploits/7982 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-03-06 06:50
Updated : 2017-09-29 01:34
NVD link : CVE-2009-0760
Mitre link : CVE-2009-0760
CVE.ORG link : CVE-2009-0760
JSON object : View
Products Affected
team5
- team_board
CWE
CWE-264
Permissions, Privileges, and Access Controls
