Description
TowerBlog 0.6 and earlier stores the login data file under the web root, which allows remote attackers to obtain the MD5 checksums of the username and password via a direct request to the _dat/login file.
Product(s):
- Towerblog Towerblog 0.2
- Towerblog Towerblog 0.4 r1
- Towerblog Towerblog 0.6
- TowerBlog 0.6 R1
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1055, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1055 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.