HoneyPress through 2016-09-27 can be fingerprinted by attackers because of the ingrained unique www.atxsec.com and ayylmao.wpengine.com hostnames within the fake WordPress templates. This allows attackers to discover and avoid this honeypot system.
References
Link | Resource |
---|---|
https://github.com/dustyfresh/HoneyPress/issues/1 | Third Party Advisory |
Configurations
Information
Published : 2019-05-01 07:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-11633
Mitre link : CVE-2019-11633
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
honeypress_project
- honeypress