Exploit/Advisories no image

Published on January 26th, 2022 📆 | 8521 Views ⚑

0

CosaNostra Builder WebPanel Insecure Cryptographic Storage – Torchsec


https://www.ispeech.org/text.to.speech

Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source: https://malvuln.com/advisory/61285c988de52b7c067fb2e703f2ab83_B.txt
Contact: malvuln13@gmail.com
Media: twitter.com/malvuln

Threat: CosaNostra Builder WebPanel
Vulnerability: Insecure Crypto
Description: The password for the panel is stored in MySQL database using an insecure MD5 hash algorithm and no salt. MD5 is a basic purpose fast hash (not slow) and not using salt allows attackers that gain access to the hash ability to conduct faster cracking attacks using pre-computed dictionaries.
Type: WebUI
MD5: 61285c988de52b7c067fb2e703f2ab83
Vuln ID: MVID-2022-0472
Disclosure: 01/24/2022

Exploit/PoC:
id user password
1 admin 21232f297a57a5a743894a0e4a801fc3





Default password is "admin".

Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).



Source link

Tagged with:



Comments are closed.