Korean
<< Back
VID 21517
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The paFileDB program, according to its version number, has a password hash disclosure vulnerability. paFileDB is a Web-based file download management program developed by PHP Arena that uses a MySQL database. paFileDB versions 3.1 and earlier could allow a remote attacker to view the password hash of other accounts, including the administrator. If the administrator is currently logon the system, a remote attacker could access the sessions directory and view the administrator's hashed password. This issue only exists if session authentication is used rather than cookie authentication.

* Note: This check solely relied on the version number of the paFileDB program installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://echo.or.id/adv/adv09-y3dips-2004.txt
http://www.securitytracker.com/alerts/2004/Dec/1012421.html

* Platforms Affected:
PHP Arena, paFileDB versions 3.1 and earlier
Linux Any version
Microsoft Windows Any version
Unix Any version
Recommendation No upgrade or patch available as of March 2005.

Upgrade to the new version of paFileDB (3.2 or later), when new version fixed this problem becomes available from the PHP Arena Web site at http://www.phparena.net/
Related URL CVE-2004-1219 (CVE)
Related URL 11818 (SecurityFocus)
Related URL 18364 (ISS)