Update payloads and attack type

patch-1
Nybble04 2023-07-11 16:25:45 +04:00 committed by GitHub
parent fee7f0b529
commit b262a7d62a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 36 additions and 29 deletions

View File

@ -2,11 +2,12 @@ id: tomcat-default-login
info: info:
name: Apache Tomcat Manager Default Login name: Apache Tomcat Manager Default Login
author: pdteam,sinKettu author: pdteam,sinKettu,nybble04
severity: high severity: high
description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations. description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations.
reference: reference:
- https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/ - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/
- https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt
metadata: metadata:
max-request: 18 max-request: 18
shodan-query: title:"Apache Tomcat" shodan-query: title:"Apache Tomcat"
@ -21,46 +22,52 @@ http:
payloads: payloads:
username: username:
- tomcat
- admin
- ovwebusr
- j2deployer
- cxsdk
- ADMIN - ADMIN
- xampp
- tomcat
- QCC - QCC
- admin - admin
- root
- role1
- role
- tomcat
- admin
- role1
- both - both
- admin - cxsdk
- demo
- j2deployer
- manager
- ovwebusr
- role
- role1
- root
- server_admin
- tomcat
- xampp
password: password:
- tomcat - ADMIN
- admin
- OvW*busr1 - OvW*busr1
- Password1
- QLogic66
- admanager
- admin
- adrole1
- adroot
- ads3cret
- adtomcat
- advagrant
- changethis
- demo
- j2deployer - j2deployer
- kdsxc - kdsxc
- ADMIN - manager
- xampp - owaspbwa
- s3cret - password
- QLogic66 - password1
- tomcat - r00t
- root
- role1 - role1
- changethis - root
- changethis - s3cret
- j5Brn9
- tomcat - tomcat
- tomcat - toor
- 123456 - vagrant
- xampp
attack: pitchfork # Available options: sniper, pitchfork and clusterbomb attack: clusterbomb # Available options: sniper, pitchfork and clusterbomb
matchers-condition: and matchers-condition: and
matchers: matchers: