| VID |
21517 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The paFileDB program, according to its version number, has a password hash disclosure vulnerability. paFileDB is a Web-based file download management program developed by PHP Arena that uses a MySQL database. paFileDB versions 3.1 and earlier could allow a remote attacker to view the password hash of other accounts, including the administrator. If the administrator is currently logon the system, a remote attacker could access the sessions directory and view the administrator's hashed password. This issue only exists if session authentication is used rather than cookie authentication.
* Note: This check solely relied on the version number of the paFileDB program installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://echo.or.id/adv/adv09-y3dips-2004.txt http://www.securitytracker.com/alerts/2004/Dec/1012421.html
* Platforms Affected: PHP Arena, paFileDB versions 3.1 and earlier Linux Any version Microsoft Windows Any version Unix Any version |
| Recommendation |
No upgrade or patch available as of March 2005.
Upgrade to the new version of paFileDB (3.2 or later), when new version fixed this problem becomes available from the PHP Arena Web site at http://www.phparena.net/ |
| Related URL |
CVE-2004-1219 (CVE) |
| Related URL |
11818 (SecurityFocus) |
| Related URL |
18364 (ISS) |
|