First published: Mon Mar 30 2009(Updated: )
LightNEasy/lightneasy.php in LightNEasy No database version 1.2 allows remote attackers to obtain the hash of the administrator password via the setup "do" action to LightNEasy.php, which is cleared from $_GET but later accessed using $_REQUEST.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lightneasy | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6537 is considered a medium severity vulnerability due to its potential to expose sensitive administrator password hashes.
To fix CVE-2008-6537, it is recommended to upgrade to a newer version of LightNEasy that addresses this vulnerability.
The impact of CVE-2008-6537 includes the potential for remote attackers to gain access to the administrator password hash, compromising system security.
Users of LightNEasy version 1.2 without a database are affected by CVE-2008-6537.
CVE-2008-6537 exploits the setup "do" action in lightneasy.php, allowing manipulation of parameters via $_REQUEST.