CosaNostra Builder WebPanel Insecure Cryptographic Storage

CosaNostra Builder WebPanel malware only uses straight MD5 to store passwords without any salt.


MD5 | 8e69d698a4ef01716d57c873f5bafeff

Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source: https://malvuln.com/advisory/61285c988de52b7c067fb2e703f2ab83_B.txt
Contact: [email protected]
Media: twitter.com/malvuln

Threat: CosaNostra Builder WebPanel
Vulnerability: Insecure Crypto
Description: The password for the panel is stored in MySQL database using an insecure MD5 hash algorithm and no salt. MD5 is a basic purpose fast hash (not slow) and not using salt allows attackers that gain access to the hash ability to conduct faster cracking attacks using pre-computed dictionaries.
Type: WebUI
MD5: 61285c988de52b7c067fb2e703f2ab83
Vuln ID: MVID-2022-0472
Disclosure: 01/24/2022

Exploit/PoC:
id user password
1 admin 21232f297a57a5a743894a0e4a801fc3

Default password is "admin".

Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).

Related Posts