44 lines
1.1 KiB
YAML
44 lines
1.1 KiB
YAML
id: ricoh-default-login
|
|
|
|
info:
|
|
name: Ricoh Default Login
|
|
author: gy741
|
|
severity: high
|
|
description: Ricoh default admin credentials were discovered.
|
|
reference:
|
|
- https://ricoh-printer.co/default-username-and-password-for-ricoh-web-image-monitor/
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
|
|
cvss-score: 8.3
|
|
cwe-id: CWE-522
|
|
metadata:
|
|
max-request: 1
|
|
tags: ricoh,default-login
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /web/guest/tw/websys/webArch/login.cgi HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Cookie: cookieOnOffChecker=on;
|
|
|
|
wimToken=&userid_work=&userid={{base64(username)}}&password_work=&password=&open=
|
|
|
|
payloads:
|
|
username:
|
|
- admin
|
|
attack: pitchfork
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- 'wimsesid=[0-9]+'
|
|
part: header
|
|
|
|
- type: status
|
|
status:
|
|
- 302
|
|
|
|
# digest: 490a0046304402205f1bd4059a6971b29531d16085fd70128e711082039224c7a09df177efae92e502206a2179161b61c2edd0419ce743f386a7ad9ccec0e2b79622f70ba6a9f6bd3f78:922c64590222798bb761d5b6d8e72950
|