lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <b7cf276d5c4220d07fca1fc0bdd769e7@mail.privatemail.com> Date: Sun, 30 Aug 2020 08:37:20 +0000 From: devsecweb--- via Fulldisclosure <fulldisclosure@...lists.org> To: fulldisclosure@...lists.org Subject: [FD] Bagisto: Default credentials for admin interface Vendor: Bagisto (https://bagisto.com/) Affected version: All Introduction: Bagisto is an open source shop system based on PHP and Laravel framework Vulnerability description: All Bagisto installations use a default user name ("admin@...mple.com (mailto:admin@...mple.com)") and password ("admin123") until it's changed manually by the shop administrator. Proof: https://github.com/bagisto/bagisto#on-local (https://github.com/bagisto/bagisto#on-local) There are installations in the wild which still uses default credentials for admin login. Solution: Change the password of the admin user in the Bagisto shop backend to a secure password. Sent with PrivateMail _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/