Vulnerability Details : CVE-2020-29550
An issue was discovered in URVE Build 24.03.2020. The password of an integration user account (used for the connection of the MS Office 365 Integration Service) is stored in cleartext in configuration files as well as in the database. The following files contain the password in cleartext: Profiles/urve/files/sql_db.backup, Server/data/pg_wal/000000010000000A000000DD, Server/data/base/16384/18617, and Server/data/base/17202/8708746. This causes the password to be displayed as cleartext in the HTML code as roomsreservationimport_password in /urve/roomsreservationimport/roomsreservationimport/update-HTML5.
Products affected by CVE-2020-29550
- cpe:2.3:a:urve:urve:24.03.2020:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-29550
0.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-29550
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-29550
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-29550
-
https://urve.co.uk/system-rezerwacji-sal
System rezerwacji sal z ekranem dotykowym - zarządzanie salami - LOBOVendor Advisory
-
http://packetstormsecurity.com/files/160726/URVE-Software-Build-24.03.2020-Information-Disclosure.html
URVE Software Build 24.03.2020 Information Disclosure ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-042.txt
Exploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2020/Dec/49
Full Disclosure: SYSS-2020-042 Urve - Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)Exploit;Mailing List;Third Party Advisory
Jump to