Exposure of Sensitive Information Lead To Admin Account Take Over in notrinos/notrinoserp


Reported on

Aug 18th 2022


The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the admin password.

Proof of Concept

Steps to reproduce

1- Login as  AP officers account.
2- Click on Create Backup.
3- After the Backup is created click on View Backup, this will open a new tab showing the backup file.


4-  Scroll down to `Data of table 0_users`, and you see the MD5 hash of the admin user.


5- Crack the MD5 hash using hashcat or any tool.



This will lead to privilege escalation from AP officers account to the System Administrator account. and gain more functionality such as Create/Update Companies. Install/Update Languages. Install/Activate Extensions. Install/Activate Themes. Install/Activate Chart of Accounts. Software Upgrade.


We are processing your report and will contact the notrinos/notrinoserp team within 24 hours. 2 years ago
A GitHub Issue asking the maintainers to create a SECURITY.md exists 2 years ago
We have contacted a member of the notrinos/notrinoserp team and are waiting to hear back 2 years ago
Phương validated this vulnerability a year ago
0xcybery has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Phương marked this as fixed in 0.7 with commit 1b9903 a year ago
Phương has been awarded the fix bounty
Phương gave praise a year ago
Thanks Abdullah Baghuth for detecting this, the weak hash md5 now be changed to bcrypt: https://github.com/notrinos/notrinoserp/commit/1b9903f4deea3289872793e60d730c63ecbf7b45
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation