Description
A vulnerability was determined in TaleLin Lin-CMS up to 0.6.0. This affects an unknown part of the file /tests/config.py of the component Tests Folder. This manipulation of the argument username/password causes password in configuration file. The attack is possible to be carried out remotely. The complexity of an attack is rather high. It is indicated that the exploitability is difficult. The exploit has been publicly disclosed and may be utilized.
Problem types
Password in Configuration File
Product status
0.2
0.3
0.4
0.5
0.6.0
Timeline
| 2025-12-27: | Advisory disclosed |
| 2025-12-27: | VulDB entry created |
| 2025-12-27: | VulDB entry last update |
Credits
m3x1 (VulDB User)
References
vuldb.com/?id.338528 (VDB-338528 | TaleLin Lin-CMS Tests Folder config.py password in configuration file)
vuldb.com/?ctiid.338528 (VDB-338528 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.721893 (Submit #721893 | https://doc.cms.talelin.com/ Lin-CMS 0.6.0 weak password)
github.com/...4020a4a642af4c50912f762937292228641/lin-cms.md