To be clear, not all companies are like this.

  • KamikazeRusher@lemm.ee
    link
    fedilink
    arrow-up
    5
    ·
    3 months ago

    Unfortunately this is a product not many care for nor know about, and I had a personal working relationship with this vendor, so even if it were “leaked anonymously” they could point back at me and make things a living hell.

    At this point it’s been almost five years. They made their stance known. The exploit isn’t one that can be done completely remote without some internal knowledge to the setup of the equipment. It’s old news and they’re better off fading away in obscurity. I just won’t bother to try helping them make their products better and more secure.

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      3 months ago

      If it makes you feel any better, you’re not alone. Would be a few more hoops to jump through to connect it to me, but as far as I know my company is the only customer left using this particular piece of software. The vebdor let go all their support staff and devs for it over a year ago. It’s also highly likely that my company has a significantly customized version of this software.

      Files shipped with the client install include functions to not only encrypt passwords (expected) but to decrypt them as well. If anyone got into the users table of the db it’s all over.

      Edit: Also to be fair, I don’t truly know if this would be considered a problem. If someone has the users table you’re probably fucked in a lot of other ways too.