ELOG before 2.5.7 allows remote attackers to bypass authentication and download a configuration file that contains a sensitive write password via a modified URL.
                
            References
                    | Link | Resource | 
|---|---|
| http://midas.psi.ch/elogs/Forum/941 | Vendor Advisory | 
| http://sourceforge.net/project/shownotes.php?group_id=40505&release_id=304880 | Patch | 
| http://www.securityfocus.com/bid/12556 | Patch | 
| http://midas.psi.ch/elogs/Forum/941 | Vendor Advisory | 
| http://sourceforge.net/project/shownotes.php?group_id=40505&release_id=304880 | Patch | 
| http://www.securityfocus.com/bid/12556 | Patch | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2005-05-02 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0440
Mitre link : CVE-2005-0440
CVE.ORG link : CVE-2005-0440
JSON object : View
Products Affected
                stefan_ritt
- elog_web_logbook
CWE
                