
CVE-2013-6223: Local Password Disclosure in LiveZilla
Date: 2013-12-05 08:37:451. Introduction
Advisory ID: | Cure-2013-1008 |
Advisory URL: | https://www.curesec.com/de/veroeffentlichungen/advisories.html |
Affected Product: | LiveZilla version 5.0.1.4 |
Affected Systems: | Linux/Windows |
Fixed in: | 5.1.1.0 |
Fixed Version Link: | https://www.livezilla.net/downloads/pubfiles/LiveZilla_5.1.1.0_Full.exe |
Vendor Contact: | support@livezilla.net |
Vulnerability Type: | Local Password Disclosure |
Remote Exploitable: | No |
Reported to vendor: | 18.10.2013 |
Disclosed to public: | 28.11.2013 |
Release mode: | Coordinated release |
CVE: | CVE-2013-6223 |
Credentials: | crt@curesec.com |
2. Vulnerability Description
An 1click file that allows an admin to log into LiveZilla using a mouse click is saved in a xml representation. This xml file includes the admin username and password in plaintext. Base64 is not an encryption mechanism. If an attacker is able to get access to a 1click file he can easily open the file and discover username and password for an administrator.

Mitigation
Administrators passwords should not be stored in files as plaintext. The 1click design should be changed so that as an example the 1click file asks the administrator for a password before opening. This way it can be assured that the administrator password is not disclosed to attackers.
3. Proof of Concept Codes:
Just open the xml based onclick file.
4. Solution:
Upgrade to Version 5.1.1.0:
http://www.livezilla.net/downloads/pubfiles/LiveZilla_5.1.1.0_Full.exe
5. Report Timeline
18.10.2013 | Informed Vendor about Issue |
12.11.2013 | Vendor informed Curesec about patched version |
28.11.2013 | Disclosed to public. |
Download article:
