CVE-2020-25987

MonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.
Configurations

Configuration 1 (hide)

cpe:2.3:a:monocms:monocms:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html - Exploit, Third Party Advisory, VDB Entry
References () https://monocms.com/download - Product, Vendor Advisory () https://monocms.com/download - Product, Vendor Advisory

Information

Published : 2020-10-06 13:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-25987

Mitre link : CVE-2020-25987

CVE.ORG link : CVE-2020-25987


JSON object : View

Products Affected

monocms

  • monocms
CWE
CWE-532

Insertion of Sensitive Information into Log File