First published: Thu Mar 20 2008(Updated: )
Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obtain administrative privileges by sniffing the network.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Plone | <3.0 | 3.0 |
Plone CMS | <=3 | |
Plone CMS | <=3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1393 is considered a high severity vulnerability due to the ease with which attackers can gain administrative privileges.
To fix CVE-2008-1393, upgrade Plone CMS to version 3.0.6 or later, which addresses the insecure handling of admin credentials.
The risks include unauthorized access to the Plone CMS admin interface, leading to potential data breaches and site compromise.
CVE-2008-1393 affects Plone CMS versions prior to 3.0.6, specifically 3.0.5 and earlier versions.
CVE-2008-1393 compromises user security by exposing admin credentials in a way that can be intercepted, allowing attackers to gain unauthorized access.