Lucene search

K
huntr0xcybery51B32A1C-946B-4390-A212-B6C4B6E4115C
HistoryAug 18, 2022 - 10:42 a.m.

Exposure of Sensitive Information Lead To Admin Account Take Over

2022-08-1810:42:13
0xcybery
www.huntr.dev
13

0.001 Low

EPSS

Percentile

41.2%

Description

The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the admin password.

Proof of Concept

Steps to reproduce

1- Login as  AP officers account.
2- Click on Create Backup.
3- After the Backup is created click on View Backup, this will open a new tab showing the backup file.

cms1

4-  Scroll down to `Data of table 0_users`, and you see the MD5 hash of the admin user.

cms2

5- Crack the MD5 hash using hashcat or any tool.

cms3

0.001 Low

EPSS

Percentile

41.2%

Related for 51B32A1C-946B-4390-A212-B6C4B6E4115C