HoneyPress through 2016-09-27 can be fingerprinted by attackers because of the ingrained unique www.atxsec.com and ayylmao.wpengine.com hostnames within the fake WordPress templates. This allows attackers to discover and avoid this honeypot system.
References
Link | Resource |
---|---|
https://github.com/dustyfresh/HoneyPress/issues/1 | Third Party Advisory |
https://github.com/dustyfresh/HoneyPress/issues/1 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dustyfresh/HoneyPress/issues/1 - Third Party Advisory |
Information
Published : 2019-05-01 14:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11633
Mitre link : CVE-2019-11633
CVE.ORG link : CVE-2019-11633
JSON object : View
Products Affected
honeypress_project
- honeypress
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor