{"vuid":"VU#669156","idnumber":"669156","name":"Topline Systems Opportunity Form vulnerable to information disclosure","keywords":["Topline Systems","Opportunity Form","information disclosure"],"overview":"Topline Systems Opportunity Form contains an information disclosure vulnerability.","clean_desc":"CWE-200: Information Exposure Topline Systems Opportunity Form is a macro-enabled Excel spreadsheet that contains connection strings to a public-facing database. By running procedures included in the spreadsheet, user names, email addresses, and passwords are exposed in plain text.","impact":"A remote, authenticated attacker may gain access to user credentials and account data.","resolution":"Upgrade Topline Systems has updated the Opportunity Form, ending support for vulnerable versions and enforcing a mandatory password change for its users. Refer to the Vendor Information section below for the vendor's statement on these and other changes. Change passwords in other accounts While it is unknown whether any account data has been compromised, users of the Opportunity Form are advised to change passwords for all other accounts that use the same password, particularly for accounts containing sensitive information. For guidance about password security, refer to Choosing and Protecting Passwords.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Joel Land.","public":["http://cwe.mitre.org/data/definitions/200.html","https://www.us-cert.gov/ncas/tips/ST04-002","http://www.topline-systems.com/","https://sw.topline-systems.com/login.aspx"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-09-19T16:21:13Z","publicdate":"2015-02-05T00:00:00Z","datefirstpublished":"2015-02-05T15:41:47Z","dateupdated":"2015-02-06T14:16:55Z","revision":25,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:N/A:N","cvss_temporalscore":"3.3","cvss_environmentalscore":"1.328054934765","cvss_environmentalvector":"CDP:LM/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}