nuclei-templates/http/default-logins/emqx/emqx-default-login.yaml

40 lines
1012 B
YAML

id: emqx-default-login
info:
name: Emqx Default Admin Login
author: For3stCo1d
severity: high
description: Emqx default admin credentials were discovered.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
max-request: 1
shodan-query: http.favicon.hash:"-670975485"
tags: emqx,default-login
http:
- raw:
- |
POST /api/v4/auth HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
{"username":"{{user}}","password":"{{pass}}"}
attack: pitchfork
payloads:
user:
- admin
pass:
- public
matchers:
- type: dsl
dsl:
- body == "{\"code\":0}"
- status_code == 200
condition: and
# digest: 490a00463044022067a7a08f872aa1f62f87f108d972c676355070d8b86f894d700f0572112c906c022019e869488e8a654f286b8c2c31915c948525b5bcdeadd817534ffad8e6e67734:922c64590222798bb761d5b6d8e72950