
CVE-2014-3521 – luci: unauthorized administrative access granted to non-administrative users
https://notcve.org/view.php?id=CVE-2014-3521
16 Sep 2014 — The component in (1) /luci/homebase and (2) /luci/cluster menu in Red Hat Conga 0.12.2 allows remote authenticated users to bypass intended access restrictions via a crafted URL. El componente en (1) /luci/homebase y (2) /luci/cluster menu en Red Hat Conga 0.12.2 permite a usuarios remotos autenticados evadir las restricciones de acceso a través de una URL manipulada. It was discovered that various components in the luci site extension-related URLs were not properly restricted to administrative users. A rem... • http://rhn.redhat.com/errata/RHSA-2014-1194.html • CWE-264: Permissions, Privileges, and Access Controls CWE-862: Missing Authorization •

CVE-2013-6496 – conga: Multiple information leak flaws in various luci site extensions
https://notcve.org/view.php?id=CVE-2013-6496
16 Sep 2014 — Red Hat Conga 0.12.2 allows remote attackers to obtain sensitive information via a crafted request to the (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, or (5) logs Luci extension. Red Hat Conga 0.12.2 permite a atacantes remotos obtener información sensible a través de una solicitud manipulada en la extensión (1) homebase, (2) cluster, (3) storage, (4) portal_skins/custom, o (5) logs Luci. Multiple information leak flaws were found in the way conga processed luci site extension-related UR... • http://rhn.redhat.com/errata/RHSA-2014-1194.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2012-3359 – conga: insecure handling of luci web interface sessions
https://notcve.org/view.php?id=CVE-2012-3359
30 Mar 2014 — Luci in Red Hat Conga stores the user's username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout. Luci en Red Hat Conga almacena el nombre de usuario y la contraseña del usuario en una cadena codificada en Base64 en la cookie de sesión __ac, lo que permite a atacantes ganar privilegios m... • http://rhn.redhat.com/errata/RHSA-2013-0128.html • CWE-255: Credentials Management Errors •

CVE-2013-7347
https://notcve.org/view.php?id=CVE-2013-7347
30 Mar 2014 — Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-3359 for the base64-encoded storage of the user and password in a cookie. Luci en Red Hat Conga no fuerza debidamente el timeout de la sesión de usuario, lo que podría permitir a atacantes ganar acceso a la sesión mediante la lectura de la cookie de sesión __ac... • http://rhn.redhat.com/errata/RHSA-2013-0128.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-0720 – plone: unauthorized remote administrative access
https://notcve.org/view.php?id=CVE-2011-0720
03 Feb 2011 — Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors. Una vulnerabilidad no especificada en Plone versión 2.5 hasta 4.0, como se utiliza en Conga, luci, y posiblemente otros productos, permite a los atacantes remotos obtener acceso administrativo, leer o crear contenido arbitrario, y cambiar el aspecto del sitio por medio ... • http://osvdb.org/70753 • CWE-284: Improper Access Control •

CVE-2010-3852
https://notcve.org/view.php?id=CVE-2010-3852
05 Nov 2010 — The default configuration of Luci 0.22.4 and earlier in Red Hat Conga uses "[INSERT SECRET HERE]" as its secret key for cookies, which makes it easier for remote attackers to bypass repoze.who authentication via a forged ticket cookie. La configuración por defecto de Luci v0.22.4 y anteriores en Red Hat Conga utiliza "[INSERT SECRET HERE]" como su clave secreta para las cookies, lo que facilita a los atacantes remotos el saltarse la autenticación a través de una cookie repoze.who falsificada. • http://git.fedorahosted.org/git/?p=luci.git%3Ba=commit%3Bh=9e0bbf0c5faa198379d945474f7d55da5031cacf • CWE-287: Improper Authentication •

CVE-2007-4136 – ricci is vulnerable to a connect DoS attack
https://notcve.org/view.php?id=CVE-2007-4136
14 Nov 2007 — The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections. El demonio ricci en Red Hat Conga versión 0.10.0, permite a atacantes remotos causar una denegación de servicio (pérdida de conexiones nuevas) mediante un envío de datos o intento de conexiones de manera repetitiva. • http://rhn.redhat.com/errata/RHSA-2007-0640.html •

CVE-2007-1462
https://notcve.org/view.php?id=CVE-2007-1462
15 Mar 2007 — The luci server component in conga preserves the password between page loads for the Add System/Cluster task flow by storing the password in the Value attribute of a password entry field, which allows attackers to steal the password by performing a "view source" or other operation to obtain the web page. NOTE: there are limited circumstances under which such an attack is feasible. El componente de servidor luci en conga, conserva la contraseña entre cargas de página para el flujo de tarea Add System/Cluster... • http://osvdb.org/35086 •