CVE-2020-36968
BaseFortify
Publication date: 2026-01-28
Last updated on: 2026-02-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tildeslash | m\/monit | 3.7.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if unauthorized or authenticated users can access the administrative API endpoints /api/1/admin/users/list and /api/1/admin/users/get to retrieve user password hashes. You can test this by sending authenticated HTTP requests to these endpoints and observing if MD5 password hashes are returned. For example, using curl commands with valid credentials: curl -u username:password https://<mmonit-server>/api/1/admin/users/list curl -u username:password https://<mmonit-server>/api/1/admin/users/get
Can you explain this vulnerability to me?
This vulnerability in M/Monit 3.7.4 allows authenticated attackers to retrieve user password hashes by exploiting an administrative API endpoint. Specifically, attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of user password hashes, which could allow attackers to attempt to crack these hashes and gain unauthorized access to user accounts. This compromises user credential confidentiality and potentially leads to further unauthorized access within the system.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the administrative API endpoints /api/1/admin/users/list and /api/1/admin/users/get to only trusted and necessary users, ensuring strong authentication and authorization controls are in place, and monitoring API access logs for suspicious activity. Additionally, consider updating or patching M/Monit to a version where this vulnerability is fixed if available.