LiveZilla before 5.1.2.1 includes the operator password in plaintext in Javascript code that is generated by lz/mobile/chat.php, which might allow remote attackers to obtain sensitive information and gain privileges by accessing the loginName and loginPassword variables using an independent cross-site scripting (XSS) attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Livezilla | Livezilla | * | 5.1.2.0 (including) |
Livezilla | Livezilla | 5.0.1.0 (including) | 5.0.1.0 (including) |
Livezilla | Livezilla | 5.0.1.1 (including) | 5.0.1.1 (including) |
Livezilla | Livezilla | 5.0.1.2 (including) | 5.0.1.2 (including) |
Livezilla | Livezilla | 5.0.1.3 (including) | 5.0.1.3 (including) |
Livezilla | Livezilla | 5.0.1.4 (including) | 5.0.1.4 (including) |
Livezilla | Livezilla | 5.1.0.0 (including) | 5.1.0.0 (including) |
Livezilla | Livezilla | 5.1.1.0 (including) | 5.1.1.0 (including) |