icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

SAFE TEAM Regulus Customers Accounts Password Hash Disclosure

Medium

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a customer accounts information disclosure vulnerability. The 'Update your password' action from the 'custchoice.php' script permits any user to get the password hash for a given username or customer ID. The password hash, computed using DES 56 bit, is included in a hidden tag of the HTML file served by the web server. Therefore customer passwords can be easily derived from their hash using a dictionary-based brute force attack.

Solution

No solution is known at this time.