Share
## https://sploitus.com/exploit?id=PACKETSTORM:154873
Affected software: Tomedo Server 1.7.3  
Vulnerability type: Cleartext Transmission of Sensitive Information & Weak Cryptography for Passwords  
Vulnerable version: Tomedo Server 1.7.3  
Vulnerable component: Customer Tomedo Server that communicates with Vendor Tomedo Update Server  
Vendor report confidence: Confirmed  
Fixed version: Version later then 1.7.3  
Vendor notification: 20/09/19  
Solution date: 25/09/19  
CVE reference: CVE-2019-17393  
CVSS Score: 3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N   
Credits: Chris Hein, ProSec GmbH  
Communication Timeline:   
20th September 2019 Initial contact - no response  
25th September second contact attempt  
28th September Vendor responded and released an update  
14th October fulldisclosure   
  
Vulnerability Details:  
The Customer’s Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors.  
Basic authentication is used for the authentication what’s makes it possible to base64 decode the sniffed credentials and get hold of the username and password.  
  
Proof of concept:  
Capture the traffic between the Tomedo servers via a proxy or a MITM attack and base64 decode the credentials from the HTTP GET request.