Description
In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-10705 | In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host. |
References
| Link | Providers |
|---|---|
| https://sion-evans.com/blog/CVE-2019-20150.html |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:39:08.957Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2019-20150
No data.
Status : Modified
Published: 2020-08-20T13:15:11.843
Modified: 2024-11-21T04:38:06.607
Link: CVE-2019-20150
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD