SAFE TEAM Regulus Staff Accounts Password Hash Disclosure

medium Nessus Network Monitor Plugin ID 2271

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a staff accounts information disclosure vulnerability. Any user may query the 'staffile' from the web server and be served. This file contains information about the staff accounts including password hashes which are computed using DES 56 bit. Therefore staff users passwords can be easily derived from their hash using a dictionary-based brute force attack.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 2271

Family: CGI

Published: 9/9/2004

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Reference Information

BID: 11132