Vulnerability Details : CVE-2011-1500
PreferencesPithosDialog.py in Pithos 0.3.7 does not properly restrict permissions for the .config/pithos.ini file in a user's home directory, which allows local users to obtain Pandora credentials by reading this file.
Products affected by CVE-2011-1500
- cpe:2.3:a:kevinmehall:pithos:0.3.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1500
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1500
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2011-1500
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1500
-
http://openwall.com/lists/oss-security/2011/04/08/2
oss-security - CVE request for pithos information disclosure
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66661
Pithos pithos.ini information disclosure CVE-2011-1500 Vulnerability Report
-
http://openwall.com/lists/oss-security/2011/04/08/4
oss-security - Re: CVE request for pithos information disclosure
-
http://www.securityfocus.com/bid/47300
Pithos 'pithos.ini' Local Information Disclosure Vulnerability
-
https://bugs.launchpad.net/pithos/+bug/733307
Bug #733307 “password stored in plaintext in $HOME/.config/pitho...” : Bugs : Pithos
Jump to