nuclei-templates/http/default-logins/magnolia-default-login.yaml

80 lines
1.9 KiB
YAML

id: magnolia-default-login
info:
name: Magnolia CMS Default Login - Detect
author: pussycat0x
severity: high
description: Magnolia CMS default login credentials were detected.
reference:
- https://www.magnolia-cms.com/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
metadata:
verified: true
max-request: 3
shodan-query: html:"Magnolia is a registered trademark"
tags: magnolia,default-login
http:
- raw:
- |
GET /.magnolia/admincentral HTTP/1.1
Host: {{Hostname}}
- |
POST /.magnolia/admincentral HTTP/1.1
Host: {{Hostname}}
Cookie: csrf={{csrf}};JSESSIONID={{session}}
Content-Type: application/x-www-form-urlencoded
Origin: {{BaseURL}}
Referer: {{BaseURL}}/.magnolia/admincentral
mgnlUserId={{username}}&mgnlUserPSWD={{password}}&csrf={{csrf}}
- |
GET /.magnolia/admincentral/PUSH?v-uiId=1 HTTP/1.1
Host: {{Hostname}}
Cookie: csrf={{csrf}}; JSESSIONID={{session}}
payloads:
username:
- superuser
password:
- superuser
attack: pitchfork
extractors:
- type: kval
name: csrf
part: header
internal: true
kval:
- csrf
- type: kval
name: session
internal: true
part: header
kval:
- JSESSIONID
matchers-condition: and
matchers:
- type: word
part: body_3
words:
- '"changes":'
- '"resources":'
condition: and
- type: word
part: header_3
words:
- 'application/json'
- type: status
status:
- 200
# digest: 4a0a00473045022100b938f14e51de5ee0a0d2d142296df5777733e0847e6c16c55551db6052c13fee02203da011ca2aa2c8b7f19f7b7da75aa84415789a57cf582387bfa79d778a16f9d8:922c64590222798bb761d5b6d8e72950