Spider Sales weak encryption
|spidersales-weak-encryption (15370)||Low Risk|
Spider Sales could allow a remote attacker to obtain sensitive information. Spider Sales uses a weak encryption scheme. A local attacker could exploit this vulnerability by obtaining the private and public keys to decrypt sensitive information stored in the database.
No remedy available as of July 1, 2014.
- Full-Disclosure Mailing List, Wed Mar 03 2004 - 06:10:51 CST: Spider Sales shopping cart software multiple security vulnerabilities .
- BID-9799: SpiderSales Shopping Cart Multiple Vulnerabilities
- CVE-2004-0350: SpiderSales shopping cart does not enforce a minimum length for the private key, which can make it easier for local users to obtain the private key by factoring.
- CVE-2004-0351: Spider Sales shopping cart stores the private key in the same database and table as the public key, which allows local users with access to the database to decrypt data.
- OSVDB ID: 6316: Spider Sales Public/Private Keys Insecure Storage
- OSVDB ID: 6317: Spider Sales Non-Enforced Key Length Allows Key Expoure
- Spider Sales Spider Sales
Mar 03, 2004
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this