Dashboard Content Enhancements (#3958)

Dashboard Content Enhancements
patch-1
MostInterestingBotInTheWorld 2022-03-23 09:33:16 -04:00 committed by GitHub
parent 83ecf7060b
commit 5a0cea7a1d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 142 additions and 19 deletions

View File

@ -3,8 +3,16 @@ id: canal-default-login
info: info:
name: Alibaba Canal Default Login name: Alibaba Canal Default Login
author: pdteam author: pdteam
description: An Alibaba Canal default login was discovered.
severity: high severity: high
tags: alibaba,default-login tags: alibaba,default-login
reference:
- https://github.com/alibaba/canal/wiki/ClientAdapter
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -33,3 +41,5 @@ requests:
words: words:
- 'data":{"token"' - 'data":{"token"'
- '"code":20000' - '"code":20000'
# Enhanced by mp on 2022/03/22

View File

@ -4,8 +4,15 @@ info:
name: AlphaWeb XE Default Login name: AlphaWeb XE Default Login
author: Lark Lab author: Lark Lab
severity: medium severity: medium
description: An AlphaWeb XE default login was discovered.
tags: default-login tags: default-login
reference: https://wiki.zenitel.com/wiki/AlphaWeb reference:
- https://wiki.zenitel.com/wiki/AlphaWeb
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
cvss-score: 5.8
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -32,4 +39,6 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/22

View File

@ -3,8 +3,16 @@ id: ambari-default-login
info: info:
name: Apache Ambari Default Login name: Apache Ambari Default Login
author: pdteam author: pdteam
severity: medium description: An Apache Ambari default admin login was discovered.
severity: high
tags: ambari,default-login,apache tags: ambari,default-login,apache
reference:
- https://ambari.apache.org/1.2.0/installing-hadoop-using-ambari/content/ambari-chap3-1.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -24,3 +32,5 @@ requests:
- '"Users" : {' - '"Users" : {'
- 'AMBARI.' - 'AMBARI.'
condition: and condition: and
# Enhanced by mp on 2022/03/22

View File

@ -3,11 +3,18 @@ id: airflow-default-login
info: info:
name: Apache Airflow Default Login name: Apache Airflow Default Login
author: pdteam author: pdteam
severity: critical severity: high
tags: airflow,default-login,apache tags: airflow,default-login,apache
reference: https://airflow.apache.org/docs/apache-airflow/stable/start/docker.html description: An Apache Airflow default login was discovered.
reference:
- https://airflow.apache.org/docs/apache-airflow/stable/start/docker.html
metadata: metadata:
shodan-query: title:"Sign In - Airflow" shodan-query: title:"Sign In - Airflow"
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -54,3 +61,5 @@ requests:
- type: word - type: word
words: words:
- 'You should be redirected automatically to target URL: <a href="/">' - 'You should be redirected automatically to target URL: <a href="/">'
# Enhanced by mp on 2022/03/22

View File

@ -1,14 +1,22 @@
id: apisix-default-login id: apisix-default-login
info: info:
name: Apache Apisix Default Login name: Apache Apisix Default Admin Login
author: pdteam author: pdteam
severity: critical severity: high
tags: apisix,apache,default-login tags: apisix,apache,default-login
description: An Apache Apisix default admin login was discovered.
metadata: metadata:
shodan-query: title:"Apache APISIX Dashboard" shodan-query: title:"Apache APISIX Dashboard"
fofa-query: title="Apache APISIX Dashboard" fofa-query: title="Apache APISIX Dashboard"
product: https://apisix.apache.org product: https://apisix.apache.org
reference:
- https://apisix.apache.org/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -39,4 +47,6 @@ requests:
- '"data"' - '"data"'
- '"token"' - '"token"'
- '"code":0' - '"code":0'
condition: and condition: and
# Enhanced by mp on 2022/03/22

View File

@ -4,10 +4,17 @@ info:
name: Apollo Default Login name: Apollo Default Login
author: PaperPen author: PaperPen
severity: high severity: high
description: An Apollo default login was discovered.
metadata: metadata:
shodan-query: http.favicon.hash:11794165 shodan-query: http.favicon.hash:11794165
reference: https://github.com/apolloconfig/apollo reference:
- https://github.com/apolloconfig/apollo
tags: apollo,default-login tags: apollo,default-login
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -47,3 +54,5 @@ requests:
- "status_code_1 == 302 && status_code_2 == 200" - "status_code_1 == 302 && status_code_2 == 200"
- "contains(tolower(all_headers_2), 'application/json')" - "contains(tolower(all_headers_2), 'application/json')"
condition: and condition: and
# Enhanced by mp on 2022/03/22

View File

@ -1,10 +1,16 @@
id: arl-default-login id: arl-default-login
info: info:
name: ARL Default Login name: ARL Default Admin Login
author: pikpikcu author: pikpikcu
description: An ARL default admin login was discovered.
severity: high severity: high
tags: arl,default-login tags: arl,default-login
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -35,3 +41,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/03/22

View File

@ -1,11 +1,19 @@
id: digitalrebar-default-login id: digitalrebar-default-login
info: info:
name: RackN Digital Rebar provision default login name: RackN Digital Rebar Default Login
author: c-sh0 author: c-sh0
severity: high severity: high
reference: https://docs.rackn.io/en/latest/doc/faq-troubleshooting.html?#what-are-the-default-passwords description: A RackN Digital Rebar default login was discovered.
reference:
- https://docs.rackn.io/en/latest/doc/faq-troubleshooting.html?#what-are-the-default-passwords
- https://rackn.com/
tags: rackn,digitalrebar,default-login tags: rackn,digitalrebar,default-login
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -38,3 +46,5 @@ requests:
- 'Name' - 'Name'
- 'Secret' - 'Secret'
condition: and condition: and
# Enhanced by mp on 2022/03/22

View File

@ -1,12 +1,20 @@
id: mantisbt-default-credential id: mantisbt-default-credential
info: info:
name: MantisBT Default Credential name: MantisBT Default Admin Login
author: For3stCo1d author: For3stCo1d
severity: high severity: high
description: A MantisBT default admin login was discovered.
reference:
- https://mantisbt.org/
metadata: metadata:
shodan-query: title:"MantisBT" shodan-query: title:"MantisBT"
tags: mantisbt,default-login tags: mantisbt,default-login
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -34,4 +42,6 @@ requests:
- type: status - type: status
status: status:
- 302 - 302
# Enhanced by mp on 2022/03/22

View File

@ -4,10 +4,17 @@ info:
name: StackStorm Default Login name: StackStorm Default Login
author: PaperPen author: PaperPen
severity: high severity: high
description: A StackStorm default admin login was discovered.
metadata: metadata:
fofa-query: app="stackstorm" fofa-query: app="stackstorm"
reference: https://github.com/StackStorm/st2-docker reference:
- https://github.com/StackStorm/st2-docker
tags: stackstorm,default-login tags: stackstorm,default-login
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cve-id:
cwe-id: CWE-522
requests: requests:
- raw: - raw:
@ -35,4 +42,6 @@ requests:
- type: status - type: status
status: status:
- 201 - 201
# Enhanced by mp on 2022/03/22

View File

@ -1,11 +1,18 @@
id: caa-fingerprint id: caa-fingerprint
info: info:
name: CAA Fingerprint name: CAA Record
author: pdteam author: pdteam
description: A CAA record was discovered. A CAA record is used to specify which certificate authorities (CAs) are allowed to issue certificates for a domain.
severity: info severity: info
reference: https://support.dnsimple.com/articles/caa-record/#whats-a-caa-record reference:
- https://support.dnsimple.com/articles/caa-record/#whats-a-caa-record
tags: dns,caa tags: dns,caa
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cve-id:
cwe-id: CWE-200
dns: dns:
- name: "{{FQDN}}" - name: "{{FQDN}}"
@ -22,4 +29,6 @@ dns:
regex: regex:
- 'issue "(.*)"' - 'issue "(.*)"'
- 'issuewild "(.*)"' - 'issuewild "(.*)"'
- 'iodef "(.*)"' - 'iodef "(.*)"'
# Enhanced by mp on 2022/03/22

View File

@ -4,7 +4,15 @@ info:
name: ActiveAdmin Admin Dasboard Exposure name: ActiveAdmin Admin Dasboard Exposure
author: pdteam author: pdteam
severity: info severity: info
description: An ActiveAdmin Admin dashboard was discovered.
tags: panel,activeadmin tags: panel,activeadmin
reference:
- https://activeadmin.info/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cve-id:
cwe-id: CWE-200
requests: requests:
- method: GET - method: GET
@ -16,3 +24,5 @@ requests:
- "active_admin_content" - "active_admin_content"
- "active_admin-" - "active_admin-"
condition: and condition: and
# Enhanced by mp on 2022/03/22

View File

@ -4,7 +4,15 @@ info:
name: Apache ActiveMQ Exposure name: Apache ActiveMQ Exposure
author: pdteam author: pdteam
severity: info severity: info
description: An Apache ActiveMQ implementation was discovered.
reference:
- https://activemq.apache.org/
tags: panel,activemq,apache tags: panel,activemq,apache
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cve-id:
cwe-id: CWE-200
requests: requests:
- method: GET - method: GET
@ -17,3 +25,5 @@ requests:
- '<h2>Welcome to the Apache ActiveMQ!</h2>' - '<h2>Welcome to the Apache ActiveMQ!</h2>'
- '<title>Apache ActiveMQ</title>' - '<title>Apache ActiveMQ</title>'
condition: and condition: and
# Enhanced by mp on 2022/03/22