Vulnerabilities (CVE)

Filtered by vendor Jetstream Subscribe
Filtered by product Jetselect
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-13021 1 Jetstream 1 Jetselect 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
The administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.
CVE-2019-13023 1 Jetstream 1 Jetselect 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in all versions of Bond JetSelect. Within the JetSelect Application, the web interface hides RADIUS secrets, WPA passwords, and SNMP strings from 'non administrative' users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.