Exposure Of Admin Username & Password
Critical
M
MTN Group
Submitted None
Actions:
Reported by
coyemerald
Vulnerability Details
Technical details and impact analysis
Hello Team,
Ther an exposure of your username and password on this subdomain https://engage2.mtnonline.com/nc/
Exposed Credentials
uid: "mtnng",
passwd: "bd31568138edbfc0552a1ecc6886ea5c",
Steps To Reproduce:
Visit https://engage2.mtnonline.com/nc/
Now, press CTRL+U to view the source code of this page,
Look for this code
console.log(message);
}
}
(function (){
const plid = 73;
const mtnContainer = document.getElementById("mtn20238");
const mtnUri = mtnContainer.childNodes[0].getAttribute("href");
mtnContainer.addEventListener("click", ()=>fetch(mtnUri).catch(()=>{}));
window.mobucksApi.placeAd({
containerElementId: "mtn20238",
uid: "mtnng",
passwd: "bd31568138edbfc0552a1ecc6886ea5c",
plid:plid,
}, () => {
typeof mtnNoBanner == "function" && mtnNoBanner(plid,mtnContainer);
## Impact
The exposed password is in md5 which I was able to decrypt easily
uid: mtnng
hash = bd31568138edbfc0552a1ecc6886ea
plain password: v0d@c0mS@
And as an attacker, this can be abused in lots of ways such as exposing some client's info
https://adsmobucks.mtnbusiness.com.ng/feed?uid=mtnng&passwd=bd31568138edbfc0552a1ecc6886ea5c&plid=8
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Insecure Storage of Sensitive Information