Miggo Logo

CVE-2020-35296: ThinkAdmin Admin Panel Access using Default Credentials

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.77073%
Published
5/24/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
zoujingli/thinkadmincomposer= 6.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from hard-coded credentials in the initialization process. While no specific code is shown, the documentation explicitly states default admin/admin credentials are set during installation. Database migrations (php think migrate:run) are the standard mechanism for initializing application data in ThinkAdmin. The lack of a patch version and maintainer's installation instructions confirm this remains unaddressed in v6. The migration script's up() method would be responsible for creating the initial admin user with hard-coded credentials.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T*ink**min v* **s ****ult **ministr*tor *r***nti*ls, w*i** *llows *tt**k*rs to **in unr*stri*t** **ministr*tior **s**o*r* ****ss.

Reasoning

T** vuln*r**ility st*ms *rom **r*-*o*** *r***nti*ls in t** initi*liz*tion pro**ss. W*il* no sp**i*i* *o** is s*own, t** *o*um*nt*tion *xpli*itly st*t*s ****ult **min/**min *r***nti*ls *r* s*t *urin* inst*ll*tion. **t***s* mi*r*tions (`p*p t*ink mi*r*