Tag
#auth
DiCal-RED version 4009 has a password that is stored in the file /etc/deviceconfig as a plain MD5 hash, i.e. without any salt or computational cost function.
DiCal-RED version 4009 provides an FTP service on TCP port 21. This service allows anonymous access, i.e. logging in as the user "anonymous" with an arbitrary password. Anonymous users get read access to the whole file system of the device, including files that contain sensitive configuration information, such as /etc/deviceconfig. The respective process on the system runs as the system user "ftp". Therefore, a few files with restrictive permissions are not accessible via FTP.
DiCal-RED version 4009 provides a Telnet service on TCP port 23. This service grants access to an interactive shell as the system's root user and does not require authentication.
PlantUML version 1.2024.6 suffers from a cross site scripting vulnerability.
Crime Complaints Reporting Management System version 1.0 suffers from a remote shell upload vulnerability.
Courier Management System version 1.0 suffers from a cross site request forgery vulnerability.
Company Visitor Management version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
CMSsite version 1.0 suffers from a remote shell upload vulnerability.
CMS RIMI version 1.3 suffers from cross site request forgery and arbitrary file upload vulnerabilities.
Client Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.