Create prismaweb-credentials-disclosure.yaml

The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
patch-1
GwanYeong Kim 2022-02-24 21:18:13 +09:00
parent b692bf3470
commit ae0df7f69e
1 changed files with 28 additions and 0 deletions

View File

@ -0,0 +1,28 @@
id: prismaweb-credentials-disclosure
info:
name: PrismaWEB - Credentials Disclosure
author: gy741
severity: critical
description: The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script.
reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php
tags: prismaweb,disclosure
requests:
- method: GET
path:
- "{{BaseURL}}/user/scripts/login_par.js"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'txtChkUser'
- 'txtChkPassword'
condition: and
- type: status
status:
- 200