nuclei-templates/default-logins/nagios/nagios-default-login.yaml

45 lines
903 B
YAML
Raw Normal View History

2021-09-21 11:46:53 +00:00
id: nagios-default-login
2021-04-05 04:10:34 +00:00
info:
2021-09-22 10:37:07 +00:00
name: Nagios Default Login
2021-04-05 16:16:24 +00:00
author: iamthefrogy
2021-04-05 04:10:34 +00:00
severity: high
description: Nagios default admin credentials were discovered.
reference:
- https://www.nagios.org
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
tags: nagios,default-login
2021-04-05 04:10:34 +00:00
requests:
- raw:
- |
GET /nagios/side.php HTTP/1.1
2021-10-10 01:21:50 +00:00
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
payloads:
username:
- nagiosadmin
- root
password:
- nagiosadmin
- nagiosxi
attack: pitchfork
2021-04-05 04:10:34 +00:00
matchers-condition: and
matchers:
- type: status
2021-10-08 18:31:53 +00:00
status:
2021-04-05 04:10:34 +00:00
- 200
2021-10-08 18:31:53 +00:00
2021-04-05 04:10:34 +00:00
- type: word
words:
- 'Current Status'
- 'Reports'
2021-04-11 11:37:22 +00:00
condition: and
# Enhanced by mp on 2022/03/10