Exposure of Sensitive Information Lead To Admin Account Take Over in notrinos/notrinoserp
Valid
Reported on
Aug 18th 2022
Description
The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the admin password.
Proof of Concept
Steps to reproduce
1- Login as AP officers account.
2- Click on Create Backup.
3- After the Backup is created click on View Backup, this will open a new tab showing the backup file.

4- Scroll down to `Data of table 0_users`, and you see the MD5 hash of the admin user.

5- Crack the MD5 hash using hashcat or any tool.

Impact
This will lead to privilege escalation from AP officers account to the System Administrator account. and gain more functionality such as Create/Update Companies. Install/Update Languages. Install/Activate Extensions. Install/Activate Themes. Install/Activate Chart of Accounts. Software Upgrade.
References
We are processing your report and will contact the
notrinos/notrinoserp
team within 24 hours.
9 months ago
We have contacted a member of the
notrinos/notrinoserp
team and are waiting to hear back
9 months ago
The researcher's credibility has increased: +7
Thanks Abdullah Baghuth for detecting this, the weak hash md5 now be changed to bcrypt:
https://github.com/notrinos/notrinoserp/commit/1b9903f4deea3289872793e60d730c63ecbf7b45
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation