SAFE TEAM Regulus Customers Accounts Password Hash Disclosure

Medium Nessus Network Monitor Plugin ID 2272


The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.


The remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a customer accounts information disclosure vulnerability. The 'Update your password' action from the 'custchoice.php' script permits any user to get the password hash for a given username or customer ID. The password hash, computed using DES 56 bit, is included in a hidden tag of the HTML file served by the web server. Therefore customer passwords can be easily derived from their hash using a dictionary-based brute force attack.


No solution is known at this time.

Plugin Details

Severity: Medium

ID: 2272

File Name: 2272.prm

Family: CGI

Published: 2004/09/09

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:U/RC:ND


Base Score: 5.3

Temporal Score: 5.3


Temporal Vector: CVSS3#E:H/RL:U/RC:X

Reference Information

BID: 11133