Create prismaweb-credentials-disclosure.yaml
The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script. Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>patch-1
parent
b692bf3470
commit
ae0df7f69e
|
@ -0,0 +1,28 @@
|
|||
id: prismaweb-credentials-disclosure
|
||||
|
||||
info:
|
||||
name: PrismaWEB - Credentials Disclosure
|
||||
author: gy741
|
||||
severity: critical
|
||||
description: The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script.
|
||||
reference:
|
||||
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php
|
||||
tags: prismaweb,disclosure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/user/scripts/login_par.js"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'txtChkUser'
|
||||
- 'txtChkPassword'
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue