Vulnerability Description
Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obtain administrative privileges by sniffing the network.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Plone | Plone Cms | <= 3 |
Related Weaknesses (CWE)
References
- http://plone.org/documentation/how-to/secure-login-without-plain-text-passwordsExploit
- http://plone.org/products/plone/roadmap/48?Exploit
- http://securityreason.com/securityalert/3754
- http://www.procheckup.com/Hacking_Plone_CMS.pdf
- http://www.securityfocus.com/archive/1/489544/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41427
- http://plone.org/documentation/how-to/secure-login-without-plain-text-passwordsExploit
- http://plone.org/products/plone/roadmap/48?Exploit
- http://securityreason.com/securityalert/3754
- http://www.procheckup.com/Hacking_Plone_CMS.pdf
- http://www.securityfocus.com/archive/1/489544/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41427
FAQ
What is CVE-2008-1393?
CVE-2008-1393 is a vulnerability with a CVSS score of 10.0 (HIGH). Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obta...
How severe is CVE-2008-1393?
CVE-2008-1393 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1393?
Check the references section above for vendor advisories and patch information. Affected products include: Plone Plone Cms.