SAFE TEAM Regulus Customers Accounts Password Hash Disclosure
Medium Nessus Network Monitor Plugin ID 2272
SynopsisThe remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.
DescriptionThe remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a customer accounts information disclosure vulnerability. The 'Update your password' action from the 'custchoice.php' script permits any user to get the password hash for a given username or customer ID. The password hash, computed using DES 56 bit, is included in a hidden tag of the HTML file served by the web server. Therefore customer passwords can be easily derived from their hash using a dictionary-based brute force attack.
SolutionNo solution is known at this time.