SAFE TEAM Regulus Customers Accounts Password Hash Disclosure

medium Nessus Network Monitor Plugin ID 2272

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host seems to be running Regulus, a web accounting software implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95 are prone to a customer accounts information disclosure vulnerability. The 'Update your password' action from the 'custchoice.php' script permits any user to get the password hash for a given username or customer ID. The password hash, computed using DES 56 bit, is included in a hidden tag of the HTML file served by the web server. Therefore customer passwords can be easily derived from their hash using a dictionary-based brute force attack.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 2272

Family: CGI

Published: 9/9/2004

Updated: 3/6/2019

Reference Information

BID: 11133