The Address Book 1.04e MySQL Database export.php information disclosure
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.4 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic has been found in The Address Book 1.04e. The affected element is an unknown function of the file export.php of the component MySQL Database. This manipulation causes information disclosure. This vulnerability is tracked as CVE-2006-4578. No exploit exists.
Details
A vulnerability was found in The Address Book 1.04e. It has been declared as critical. Affected by this vulnerability is some unknown processing of the file export.php of the component MySQL Database. The manipulation with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
export.php in The Address Book 1.04e writes username and password hash information into a publicly accessible file when dumping the MySQL database contents, which allows remote attackers to obtain sensitive information.
The weakness was disclosed 01/03/2007 with Secunia Research (Website). The advisory is shared at secunia.com. This vulnerability is known as CVE-2006-4578 since 09/06/2006. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1592 for this issue.
By approaching the search of inurl:export.php it is possible to find vulnerable targets with Google Hacking.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (31244), SecurityFocus (BID 21870†), OSVDB (32563†) and Secunia (SA21694†). The entries VDB-34121, VDB-34120, VDB-34119 and VDB-34118 are pretty similar. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.4
VulDB Base Score: 7.3
VulDB Temp Score: 6.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
Timeline
09/06/2006 🔍12/31/2006 🔍
01/03/2007 🔍
01/03/2007 🔍
01/04/2007 🔍
03/12/2015 🔍
10/02/2017 🔍
Sources
Advisory: secunia.com⛔Organization: Secunia Research
Status: Not defined
CVE: CVE-2006-4578 (🔍)
GCVE (CVE): GCVE-0-2006-4578
GCVE (VulDB): GCVE-100-34117
X-Force: 31244 - The Address Book MySQL export.php password information disclosure
SecurityFocus: 21870 - The Address Book Multiple Remote Vulnerabilities
Secunia: 21694
OSVDB: 32563 - The Address Book export.php User Credential Disclosure
See also: 🔍
Entry
Created: 03/12/2015 22:21Updated: 10/02/2017 10:44
Changes: 03/12/2015 22:21 (53), 10/02/2017 10:44 (6)
Complete: 🔍
Cache ID: 216:ABA:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.