First published: Tue Jul 09 2019(Updated: )
In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WESEEK GROWI | <3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.