Vulnerability Description
TowerBlog 0.6 and earlier stores the login data file under the web root, which allows remote attackers to obtain the MD5 checksums of the username and password via a direct request to the _dat/login file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Towerblog | Towerblog | 0.2 |
References
- http://marc.info/?l=bugtraq&m=111323802003019&w=2
- http://secunia.com/advisories/14884Vendor Advisory
- http://securitytracker.com/id?1013675PatchVendor Advisory
- http://www.osvdb.org/15425
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20039
- http://marc.info/?l=bugtraq&m=111323802003019&w=2
- http://secunia.com/advisories/14884Vendor Advisory
- http://securitytracker.com/id?1013675PatchVendor Advisory
- http://www.osvdb.org/15425
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20039
FAQ
What is CVE-2005-1055?
CVE-2005-1055 is a vulnerability with a CVSS score of 7.5 (HIGH). TowerBlog 0.6 and earlier stores the login data file under the web root, which allows remote attackers to obtain the MD5 checksums of the username and password via a direct request to the _dat/login f...
How severe is CVE-2005-1055?
CVE-2005-1055 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1055?
Check the references section above for vendor advisories and patch information. Affected products include: Towerblog Towerblog.