Note-A-Day archive directory information disclosure
|noteaday-archive-information-disclosure (24270)||Medium Risk|
Note-A-Day fails to protect the archive directory in htaccess. A remote attacker could obtain this file using a specially-crafted URL request to obtain usernames and encrypted passwords including the administrator password, which could be used to gain unauthorized access to the application.
Upgrade to the latest version of Note-A-Day (3.0 or later), available from the Note-A-Day Web site. See References.
- eVuln Advisory EV0044: Note-A-Day Weblog Sensitive Information Disclosure.
- The Note-A-Day Weblog Web site: Info - Download - View Source.
- CVE-2006-0404: Note-A-Day Weblog 2.2 stores sensitive data under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to archive/.phpass-admin, which contains encrypted passwords.
- OSVDB ID: 22699: Note-A-Day Weblog /archive Directory Direct Request User Credential Disclosure
- SA18566: Note-A-Day Weblog Exposure of User Credentials
- SECTRACK ID: 1015539: Note-A-Day Lets Remote Users Access Authentication Information
- Note-A-Day Note-A-Day 2.1
Jan 20, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this