Default Credentials on Kinetic Core System Console - https://█████/kinetic/app/

Disclosed: 2023-05-15 15:03:31 By waterlord7788 To deptofdefense
Critical
Vulnerability Details
**Description:** The Kinetic Core System Console application has weak credentials of **admin/admin**. ## References [https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/02-Testing_for_Default_Credentials](https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/02-Testing_for_Default_Credentials) ## Impact Potential attackers could identify technologies being used underneath. This would allow for them to find potential exploits. In addition, the application is disclosing server logs, users in the database with their emails and names, system activity, and much more. Check the uploaded image for additional information. This information should not be available. With addition of sensitive data being shown, this is a serious issue. ## System Host(s) █████ ## Affected Product(s) and Version(s) Kinetic Core System Console - 2.1.0-SNAPSHOT ## CVE Numbers ## Steps to Reproduce 1. Browse to the [Login page](https://████/kinetic/app/). 2. Login using credentials of **admin/admin**. 3. You should now be logged into an admin account. ## Suggested Mitigation/Remediation Actions Change admin's password to something more secure.
Actions
View on HackerOne
Report Stats
  • Report ID: 1938693
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report