I did a search but did not find any post explicitly dealing with this subject. If I missed it, sorry.
A coworker discovered that the login page sends the password to zabbix via plaintext. I have not had a need for this before, so it meant nothing to me. However, it has recently been brought to my attention that this will be important in the future so I thought I would ask the forum about it.
Has this been acknowledged before?
Can this be easily implemented in 1.6 or will we have to wait till 1.8?
Should I submit a bug report or is this even important to anyone else?
Thanks!
[EDIT] Thought I would clarify how we verified it was sent.
We simply opened firefox then on the command line we ran:
We used firefox to login to the zabbix frontend and afterwards stopped tshark. We used wireshark to analyze the output. We filtered out by the protocol HTTP and looked at the info: POST /zabbix/index.php?login=1 HTTP/1.1. When we looked into the packet, the username and password were clearly readable. This is data that can easily be scripted for.
A coworker discovered that the login page sends the password to zabbix via plaintext. I have not had a need for this before, so it meant nothing to me. However, it has recently been brought to my attention that this will be important in the future so I thought I would ask the forum about it.
Has this been acknowledged before?
Can this be easily implemented in 1.6 or will we have to wait till 1.8?
Should I submit a bug report or is this even important to anyone else?
Thanks!
[EDIT] Thought I would clarify how we verified it was sent.
We simply opened firefox then on the command line we ran:
Code:
tshark -ieth0 -w /tmp/output.cap
Comment