M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users.
References
| Link | Resource |
|---|---|
| https://mmonit.com/ | Product |
| https://www.exploit-db.com/exploits/49081 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/mmonit-password-disclosure | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-28 18:16
Updated : 2026-02-03 15:42
NVD link : CVE-2020-36968
Mitre link : CVE-2020-36968
CVE.ORG link : CVE-2020-36968
JSON object : View
Products Affected
tildeslash
- m\/monit
CWE
CWE-522
Insufficiently Protected Credentials
