FKIE_CVE-2004-2578
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
phpGroupWare before 0.9.16.002 transmits the (1) header admin and (2) setup passwords in plaintext via cookies, which allows remote attackers to sniff passwords.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| phpgroupware | phpgroupware | 0.9.1 | |
| phpgroupware | phpgroupware | 0.9.2 | |
| phpgroupware | phpgroupware | 0.9.3 | |
| phpgroupware | phpgroupware | 0.9.4 | |
| phpgroupware | phpgroupware | 0.9.5 | |
| phpgroupware | phpgroupware | 0.9.6 | |
| phpgroupware | phpgroupware | 0.9.7 | |
| phpgroupware | phpgroupware | 0.9.8 | |
| phpgroupware | phpgroupware | 0.9.9 | |
| phpgroupware | phpgroupware | 0.9.9_pl1 | |
| phpgroupware | phpgroupware | 0.9.10 | |
| phpgroupware | phpgroupware | 0.9.12 | |
| phpgroupware | phpgroupware | 0.9.13 | |
| phpgroupware | phpgroupware | 0.9.14.003 | |
| phpgroupware | phpgroupware | 0.9.14.005 | |
| phpgroupware | phpgroupware | 0.9.14.006 | |
| phpgroupware | phpgroupware | 0.9.14.007 | |
| phpgroupware | phpgroupware | 0.9.16.000 | |
| phpgroupware | phpgroupware | 0.9.16.001 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB95867B-AE4F-4E28-97E1-2A3E0AB610A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8ECD56D0-FD6A-4E88-BC0B-86303EEBD02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E81F608D-A8D3-4896-B7E3-345F19B3AD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5E045F8C-DB82-42DA-A8E9-F04AF5AC4E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "74ABC52D-9402-4930-AA6E-4E6B52D9B22E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31E5E600-6022-40FE-9464-D2363DF6B61C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "91923C69-6429-4E54-B858-EE74FC2718D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "79BB2C94-DA87-4DEF-ADD0-4C0624940407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "95D453D0-AA3F-4515-A17D-7764873AEF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.9_pl1:*:*:*:*:*:*:*",
"matchCriteriaId": "C6F639E7-516F-4FBB-97D1-E00254F2D0E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CF0E1ECC-5181-41A4-8EB1-4FA58EC932B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "011F15E1-145A-4CB2-BC55-261CB9DF0AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE1DA09-E7A2-41EB-92DB-A4DA42EA0477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.003:*:*:*:*:*:*:*",
"matchCriteriaId": "9D030C9B-9A82-42A8-B7AA-EFA3B30FDFC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.005:*:*:*:*:*:*:*",
"matchCriteriaId": "4E8922FC-6D92-41E6-B228-951432FF631A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.006:*:*:*:*:*:*:*",
"matchCriteriaId": "2E215C57-88E0-4A41-BB54-6E53524113A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.007:*:*:*:*:*:*:*",
"matchCriteriaId": "68FB431C-DC8F-4E97-AA58-BA8DBB37766B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.000:*:*:*:*:*:*:*",
"matchCriteriaId": "1C011E73-A072-421D-8500-C414A5B67BF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.001:*:*:*:*:*:*:*",
"matchCriteriaId": "B21818A9-9E32-4535-A8DA-CB57D1004E2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpGroupWare before 0.9.16.002 transmits the (1) header admin and (2) setup passwords in plaintext via cookies, which allows remote attackers to sniff passwords."
}
],
"id": "CVE-2004-2578",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://web.archive.org/web/20040920024328/http://www.phpgroupware.org/"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/8354"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/10895"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16970"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://web.archive.org/web/20040920024328/http://www.phpgroupware.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/8354"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/10895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16970"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…