<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>20112</bug_id>
          
          <creation_ts>2009-05-20 08:38:53 +0400</creation_ts>
          <short_desc>[SA35157] OCS Inventory NG Web Interface User Account Enumeration Weakness</short_desc>
          <delta_ts>2009-11-24 20:48:52 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>ocsinventory-server</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          <blocked>21309</blocked>
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir V. Kamarzin">vvk</reporter>
          <assigned_to name="zidex@altlinux.org">zidex</assigned_to>
          <cc>combr</cc>
    
    <cc>crux</cc>
    
    <cc>pavel.zilke</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>91549</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir V. Kamarzin">vvk</who>
    <bug_when>2009-05-20 08:38:53 +0400</bug_when>
    <thetext>VERIFY ADVISORY:
http://secunia.com/advisories/35157/

DESCRIPTION:
A weakness has been reported in OCS Inventory NG, which can be
exploited by malicious people to potentially identify valid user
accounts.

The application&apos;s web interface returns different error messages
depending on whether an unsuccessful login attempt is performed with
a valid or invalid username. This can be exploited to potentially
identify valid usernames via multiple login attempts.

The weakness is reported in version 1.01. Other versions may also be
affected.

SOLUTION:
Edit the source code to ensure that a unique error message is
returned when an unsuccessful login attempt is made.

PROVIDED AND/OR DISCOVERED BY:
Reported by Will Aoki in a Debian bug report.

ORIGINAL ADVISORY:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529344</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>103543</commentid>
    <comment_count>1</comment_count>
    <who name="Pavel Zilke">pavel.zilke</who>
    <bug_when>2009-11-24 20:48:52 +0300</bug_when>
    <thetext>Ошибка исправлена в версии 1.02.1-alt1</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>