WebNMS is an industry-leading used to build network management applications architecture. Storage of the password using a vulnerable confused with the encryption algorithm, combined with File Download vulnerability to obtain the password in plain text.
./ conf/securitydbData.xml the file is stored in the login user name and password. And the password obfuscation algorithm can be easily decrypted. Use CVE-2016-6601 File Download vulnerability to download files: GET /servlets/FetchFile?fileName=conf/securitydbData.xml The default content in the root user’s password decrypted for the public.
The decryption algorithm in the poc code verification.
Download the official Windows trial version software testing by: http://www.webnms.com/webnms/14107380/WebNMS_Framework_5_STD_Windows.exe