MonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
https://monocms.com/download | Product Vendor Advisory |
http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
https://monocms.com/download | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://monocms.com/download - Product, Vendor Advisory |
Information
Published : 2020-10-06 13:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-25987
Mitre link : CVE-2020-25987
CVE.ORG link : CVE-2020-25987
JSON object : View
Products Affected
monocms
- monocms
CWE
CWE-532
Insertion of Sensitive Information into Log File