MonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
| https://monocms.com/download | Product Vendor Advisory |
| http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html | Exploit Third Party Advisory VDB Entry |
| https://monocms.com/download | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 05:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/159430/MonoCMS-Blog-1.0-File-Deletion-CSRF-Hardcoded-Credentials.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://monocms.com/download - Product, Vendor Advisory |
Information
Published : 2020-10-06 13:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-25987
Mitre link : CVE-2020-25987
CVE.ORG link : CVE-2020-25987
JSON object : View
Products Affected
monocms
- monocms
CWE
CWE-532
Insertion of Sensitive Information into Log File
