Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

SAFE TEAM Regulus Customers Accounts Password Hash Disclosure



The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.


The remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a customer accounts information disclosure vulnerability. The 'Update your password' action from the 'custchoice.php' script permits any user to get the password hash for a given username or customer ID. The password hash, computed using DES 56 bit, is included in a hidden tag of the HTML file served by the web server. Therefore customer passwords can be easily derived from their hash using a dictionary-based brute force attack.


No solution is known at this time.