CVE-2013-7385
19.05.2014, 14:55
LiveZilla 5.1.2.1 and earlier includes the MD5 hash of the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which allows remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7033.Enginsight
| Vendor | Product | Version |
|---|---|---|
| livezilla | livezilla | 𝑥 ≤ 5.1.2.1 |
| livezilla | livezilla | 5.0.1.0 |
| livezilla | livezilla | 5.0.1.1 |
| livezilla | livezilla | 5.0.1.2 |
| livezilla | livezilla | 5.0.1.3 |
| livezilla | livezilla | 5.0.1.4 |
| livezilla | livezilla | 5.1.0.0 |
| livezilla | livezilla | 5.1.1.0 |
| livezilla | livezilla | 5.1.2.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration