parent
83ecf7060b
commit
5a0cea7a1d
|
@ -3,8 +3,16 @@ id: canal-default-login
|
||||||
info:
|
info:
|
||||||
name: Alibaba Canal Default Login
|
name: Alibaba Canal Default Login
|
||||||
author: pdteam
|
author: pdteam
|
||||||
|
description: An Alibaba Canal default login was discovered.
|
||||||
severity: high
|
severity: high
|
||||||
tags: alibaba,default-login
|
tags: alibaba,default-login
|
||||||
|
reference:
|
||||||
|
- https://github.com/alibaba/canal/wiki/ClientAdapter
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -33,3 +41,5 @@ requests:
|
||||||
words:
|
words:
|
||||||
- 'data":{"token"'
|
- 'data":{"token"'
|
||||||
- '"code":20000'
|
- '"code":20000'
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -4,8 +4,15 @@ info:
|
||||||
name: AlphaWeb XE Default Login
|
name: AlphaWeb XE Default Login
|
||||||
author: Lark Lab
|
author: Lark Lab
|
||||||
severity: medium
|
severity: medium
|
||||||
|
description: An AlphaWeb XE default login was discovered.
|
||||||
tags: default-login
|
tags: default-login
|
||||||
reference: https://wiki.zenitel.com/wiki/AlphaWeb
|
reference:
|
||||||
|
- https://wiki.zenitel.com/wiki/AlphaWeb
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
|
||||||
|
cvss-score: 5.8
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -32,4 +39,6 @@ requests:
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -3,8 +3,16 @@ id: ambari-default-login
|
||||||
info:
|
info:
|
||||||
name: Apache Ambari Default Login
|
name: Apache Ambari Default Login
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: medium
|
description: An Apache Ambari default admin login was discovered.
|
||||||
|
severity: high
|
||||||
tags: ambari,default-login,apache
|
tags: ambari,default-login,apache
|
||||||
|
reference:
|
||||||
|
- https://ambari.apache.org/1.2.0/installing-hadoop-using-ambari/content/ambari-chap3-1.html
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -24,3 +32,5 @@ requests:
|
||||||
- '"Users" : {'
|
- '"Users" : {'
|
||||||
- 'AMBARI.'
|
- 'AMBARI.'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -3,11 +3,18 @@ id: airflow-default-login
|
||||||
info:
|
info:
|
||||||
name: Apache Airflow Default Login
|
name: Apache Airflow Default Login
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: critical
|
severity: high
|
||||||
tags: airflow,default-login,apache
|
tags: airflow,default-login,apache
|
||||||
reference: https://airflow.apache.org/docs/apache-airflow/stable/start/docker.html
|
description: An Apache Airflow default login was discovered.
|
||||||
|
reference:
|
||||||
|
- https://airflow.apache.org/docs/apache-airflow/stable/start/docker.html
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: title:"Sign In - Airflow"
|
shodan-query: title:"Sign In - Airflow"
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -54,3 +61,5 @@ requests:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- 'You should be redirected automatically to target URL: <a href="/">'
|
- 'You should be redirected automatically to target URL: <a href="/">'
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -1,14 +1,22 @@
|
||||||
id: apisix-default-login
|
id: apisix-default-login
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache Apisix Default Login
|
name: Apache Apisix Default Admin Login
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: critical
|
severity: high
|
||||||
tags: apisix,apache,default-login
|
tags: apisix,apache,default-login
|
||||||
|
description: An Apache Apisix default admin login was discovered.
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: title:"Apache APISIX Dashboard"
|
shodan-query: title:"Apache APISIX Dashboard"
|
||||||
fofa-query: title="Apache APISIX Dashboard"
|
fofa-query: title="Apache APISIX Dashboard"
|
||||||
product: https://apisix.apache.org
|
product: https://apisix.apache.org
|
||||||
|
reference:
|
||||||
|
- https://apisix.apache.org/
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -39,4 +47,6 @@ requests:
|
||||||
- '"data"'
|
- '"data"'
|
||||||
- '"token"'
|
- '"token"'
|
||||||
- '"code":0'
|
- '"code":0'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -4,10 +4,17 @@ info:
|
||||||
name: Apollo Default Login
|
name: Apollo Default Login
|
||||||
author: PaperPen
|
author: PaperPen
|
||||||
severity: high
|
severity: high
|
||||||
|
description: An Apollo default login was discovered.
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: http.favicon.hash:11794165
|
shodan-query: http.favicon.hash:11794165
|
||||||
reference: https://github.com/apolloconfig/apollo
|
reference:
|
||||||
|
- https://github.com/apolloconfig/apollo
|
||||||
tags: apollo,default-login
|
tags: apollo,default-login
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -47,3 +54,5 @@ requests:
|
||||||
- "status_code_1 == 302 && status_code_2 == 200"
|
- "status_code_1 == 302 && status_code_2 == 200"
|
||||||
- "contains(tolower(all_headers_2), 'application/json')"
|
- "contains(tolower(all_headers_2), 'application/json')"
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -1,10 +1,16 @@
|
||||||
id: arl-default-login
|
id: arl-default-login
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: ARL Default Login
|
name: ARL Default Admin Login
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
|
description: An ARL default admin login was discovered.
|
||||||
severity: high
|
severity: high
|
||||||
tags: arl,default-login
|
tags: arl,default-login
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -35,3 +41,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -1,11 +1,19 @@
|
||||||
id: digitalrebar-default-login
|
id: digitalrebar-default-login
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: RackN Digital Rebar provision default login
|
name: RackN Digital Rebar Default Login
|
||||||
author: c-sh0
|
author: c-sh0
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://docs.rackn.io/en/latest/doc/faq-troubleshooting.html?#what-are-the-default-passwords
|
description: A RackN Digital Rebar default login was discovered.
|
||||||
|
reference:
|
||||||
|
- https://docs.rackn.io/en/latest/doc/faq-troubleshooting.html?#what-are-the-default-passwords
|
||||||
|
- https://rackn.com/
|
||||||
tags: rackn,digitalrebar,default-login
|
tags: rackn,digitalrebar,default-login
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -38,3 +46,5 @@ requests:
|
||||||
- 'Name'
|
- 'Name'
|
||||||
- 'Secret'
|
- 'Secret'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -1,12 +1,20 @@
|
||||||
id: mantisbt-default-credential
|
id: mantisbt-default-credential
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: MantisBT Default Credential
|
name: MantisBT Default Admin Login
|
||||||
author: For3stCo1d
|
author: For3stCo1d
|
||||||
severity: high
|
severity: high
|
||||||
|
description: A MantisBT default admin login was discovered.
|
||||||
|
reference:
|
||||||
|
- https://mantisbt.org/
|
||||||
metadata:
|
metadata:
|
||||||
shodan-query: title:"MantisBT"
|
shodan-query: title:"MantisBT"
|
||||||
tags: mantisbt,default-login
|
tags: mantisbt,default-login
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -34,4 +42,6 @@ requests:
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 302
|
- 302
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -4,10 +4,17 @@ info:
|
||||||
name: StackStorm Default Login
|
name: StackStorm Default Login
|
||||||
author: PaperPen
|
author: PaperPen
|
||||||
severity: high
|
severity: high
|
||||||
|
description: A StackStorm default admin login was discovered.
|
||||||
metadata:
|
metadata:
|
||||||
fofa-query: app="stackstorm"
|
fofa-query: app="stackstorm"
|
||||||
reference: https://github.com/StackStorm/st2-docker
|
reference:
|
||||||
|
- https://github.com/StackStorm/st2-docker
|
||||||
tags: stackstorm,default-login
|
tags: stackstorm,default-login
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
||||||
|
cvss-score: 8.3
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-522
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -35,4 +42,6 @@ requests:
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 201
|
- 201
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -1,11 +1,18 @@
|
||||||
id: caa-fingerprint
|
id: caa-fingerprint
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: CAA Fingerprint
|
name: CAA Record
|
||||||
author: pdteam
|
author: pdteam
|
||||||
|
description: A CAA record was discovered. A CAA record is used to specify which certificate authorities (CAs) are allowed to issue certificates for a domain.
|
||||||
severity: info
|
severity: info
|
||||||
reference: https://support.dnsimple.com/articles/caa-record/#whats-a-caa-record
|
reference:
|
||||||
|
- https://support.dnsimple.com/articles/caa-record/#whats-a-caa-record
|
||||||
tags: dns,caa
|
tags: dns,caa
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-200
|
||||||
|
|
||||||
dns:
|
dns:
|
||||||
- name: "{{FQDN}}"
|
- name: "{{FQDN}}"
|
||||||
|
@ -22,4 +29,6 @@ dns:
|
||||||
regex:
|
regex:
|
||||||
- 'issue "(.*)"'
|
- 'issue "(.*)"'
|
||||||
- 'issuewild "(.*)"'
|
- 'issuewild "(.*)"'
|
||||||
- 'iodef "(.*)"'
|
- 'iodef "(.*)"'
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -4,7 +4,15 @@ info:
|
||||||
name: ActiveAdmin Admin Dasboard Exposure
|
name: ActiveAdmin Admin Dasboard Exposure
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
description: An ActiveAdmin Admin dashboard was discovered.
|
||||||
tags: panel,activeadmin
|
tags: panel,activeadmin
|
||||||
|
reference:
|
||||||
|
- https://activeadmin.info/
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-200
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -16,3 +24,5 @@ requests:
|
||||||
- "active_admin_content"
|
- "active_admin_content"
|
||||||
- "active_admin-"
|
- "active_admin-"
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
|
@ -4,7 +4,15 @@ info:
|
||||||
name: Apache ActiveMQ Exposure
|
name: Apache ActiveMQ Exposure
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: info
|
severity: info
|
||||||
|
description: An Apache ActiveMQ implementation was discovered.
|
||||||
|
reference:
|
||||||
|
- https://activemq.apache.org/
|
||||||
tags: panel,activemq,apache
|
tags: panel,activemq,apache
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cve-id:
|
||||||
|
cwe-id: CWE-200
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -17,3 +25,5 @@ requests:
|
||||||
- '<h2>Welcome to the Apache ActiveMQ!</h2>'
|
- '<h2>Welcome to the Apache ActiveMQ!</h2>'
|
||||||
- '<title>Apache ActiveMQ</title>'
|
- '<title>Apache ActiveMQ</title>'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/03/22
|
||||||
|
|
Loading…
Reference in New Issue