Vulnerability Description
clogin.php in Benchmark Designs' WHM AutoPilot 2.4.5 and earlier allows remote attackers to obtain plaintext username and password credentials by using the clogin_e and base64_encode functions to encode the desired user ID in the c parameter, then read the plaintext values in the resulting form.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Whm Autopilot | Whm Autopilot | 2.4.5 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1310.htmlVendor Advisory
- http://secunia.com/advisories/12200PatchVendor Advisory
- http://securitytracker.com/id?1010833ExploitVendor Advisory
- http://www.osvdb.org/8279
- http://www.securityfocus.com/bid/10846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16849
- http://archives.neohapsis.com/archives/fulldisclosure/2004-07/1310.htmlVendor Advisory
- http://secunia.com/advisories/12200PatchVendor Advisory
- http://securitytracker.com/id?1010833ExploitVendor Advisory
- http://www.osvdb.org/8279
- http://www.securityfocus.com/bid/10846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16849
FAQ
What is CVE-2004-2524?
CVE-2004-2524 is a vulnerability with a CVSS score of 5.0 (MEDIUM). clogin.php in Benchmark Designs' WHM AutoPilot 2.4.5 and earlier allows remote attackers to obtain plaintext username and password credentials by using the clogin_e and base64_encode functions to enco...
How severe is CVE-2004-2524?
CVE-2004-2524 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2524?
Check the references section above for vendor advisories and patch information. Affected products include: Whm Autopilot Whm Autopilot.