First published: Thu Mar 15 2007(Updated: )
The luci server component in conga preserves the password between page loads for the Add System/Cluster task flow by storing the password in the Value attribute of a password entry field, which allows attackers to steal the password by performing a "view source" or other operation to obtain the web page. NOTE: there are limited circumstances under which such an attack is feasible.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | ||
Conga |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1462 has a moderate severity level due to the potential for password exposure.
To fix CVE-2007-1462, ensure that sensitive data, such as passwords, are not stored in the Value attribute of form fields.
CVE-2007-1462 affects the Conga software component specifically.
Yes, attackers can exploit CVE-2007-1462 remotely through web browser interactions.
CVE-2007-1462 can lead to unauthorized access to user passwords, compromising user data security.