MonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.
References
Link | Resource |
---|---|
https://monocms.com/download | Product Vendor Advisory |
http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-10-06 06:15
Updated : 2020-10-07 12:28
NVD link : CVE-2020-25987
Mitre link : CVE-2020-25987
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
monocms
- monocms