[32674] in bugtraq
Plaintext Vulnerability in Alan Ward Acart
daemon@ATHENA.MIT.EDU (parag0d@phreaker.net)
Thu Dec 4 12:04:39 2003
Date: 4 Dec 2003 06:08:08 -0000
Message-ID: <20031204060808.23073.qmail@sf-www2-symnsj.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: <parag0d@phreaker.net>
To: bugtraq@securityfocus.com
Vulnerability: Plaintext Vulnerability
Description: All of the data in this database is stored in plain text (not encrypted), including usernames, passwords, credit card numbers, addresses, etc. Many times the database is placed into a web accessible folder (by default)
Exploit: None Required
Solution: The developer needs to implement some type of encryption standard in order to protect the data stored in the database.
Credit: CyberArmy Application and Code Auditing Team
Parag0d
The developer was contacted about this matter, but never gave any response