diff --git a/default-logins/fuelcms/fuelcms-default-login.yaml b/default-logins/fuelcms/fuelcms-default-login.yaml new file mode 100644 index 0000000000..5eadd21786 --- /dev/null +++ b/default-logins/fuelcms/fuelcms-default-login.yaml @@ -0,0 +1,30 @@ +id: fuelcms-default-login + +info: + name: Fuel CMS Default Credentials + author: Adam Crosser + severity: high + tags: fuelcms,default-login + description: Fuel CMS default admin credentials were discovered. + reference: Checks thed + - https://docs.getfuelcms.com/general/security + +requests: + - raw: + - | + POST /fuel/login HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + user_name=admin&password=admin&Login=Login + + matchers-condition: and + matchers: + - type: status + status: + - 302 + + - type: word + words: + - "/fuel/dashboard" + part: header diff --git a/technologies/fuelcms-detect.yaml b/technologies/fuelcms-detect.yaml new file mode 100644 index 0000000000..8f174bba0d --- /dev/null +++ b/technologies/fuelcms-detect.yaml @@ -0,0 +1,23 @@ +id: fuelcms-detect + +info: + name: Fuel CMS Detect + author: Adam Crosser + severity: info + tags: tech,fuelcms + +requests: + - method: GET + path: + - "{{BaseURL}}/fuel/login" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "/fuel/modules" + + - type: status + status: + - 200