Magento brute force attempt

Details of BNVL-2019-0035

What does the BNVL label mean?

BitNinja Server Security’s BNVL identifiers are intended for use to identify publicly known information security vulnerabilities in publicly released software packages. This project was designed to collect and analyze attack information from the BitNinja network after cluster analysis by the AI-powered Attack Vector Miner. More than 100 vulnerability types have been discovered with this project so far, so we decided to publish this platform to help to keep Linux server owners up-to-date.

Important! All listed BNVL vulnerabilities are protected by BitNinja PRO, so please check your configurations if your infrastructure is affected by any of them.

Syntax for BNVL labels:

BNVL prefix + Year + Arbitrary Digits


Name : 
Magento brute force attempt
Related Links: https://support.hypernode.com/knowledgebase/how-to-protect-your-magento-store-against-brute-force/ 

CVE ID: Na

Description: 

Each Magento shop comes standard with several sections for administrative purposes (also called “back-end” or “admin panel”). These are by default located at /admin, /downloader and various /rss endpoints (such as /rss/catalog/notifystock/) and can be abused in several ways.

First, if these sections are at their default locations, hackers can easily find them and launch a brute-force attack. In such an attack, random passwords are tried automatically, until one succeeds. While it appears to be a cumbersome method, simple passwords like “admin123” or “qwerty” can be guessed within minutes.

Patterns: /downloader/index.php