43 lines
1.4 KiB
YAML
43 lines
1.4 KiB
YAML
id: avnil-pdf-generator-check
|
|
|
|
info:
|
|
name: useanvil.com Login Check
|
|
author: parthmalhotra,pdresearch
|
|
severity: critical
|
|
description: Checks for a valid avnil pdf generator account.
|
|
reference:
|
|
- https://owasp.org/www-community/attacks/Credential_stuffing
|
|
metadata:
|
|
max-request: 1
|
|
tags: cloud,creds-stuffing,login-check,avnil-pdf
|
|
|
|
self-contained: true
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST https://graphql.useanvil.com/ HTTP/1.1
|
|
Host: graphql.useanvil.com
|
|
Content-Length: 367
|
|
Content-Type: application/json
|
|
|
|
{"operationName":"LoginMutation","variables":{"email":"{{username}}","password":"{{password}}"},"query":"mutation LoginMutation($email: String, $password: String) {\n login(email: $email, password: $password) {\n eid\n firstName\n lastName\n email\n preferences {\n require2FA\n __typename\n }\n extra\n __typename\n }\n}\n"}
|
|
|
|
extractors:
|
|
- type: dsl
|
|
dsl:
|
|
- username
|
|
- password
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"email":"'
|
|
- '"eid":"'
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a0047304502206b4fbc67413049130a87be6c047ed7ae4cb323da4b195608526619668e467272022100986ad99ae0c941bfef37cbd6df9fa30798f45445eaf38a1be2696c142122e7a0:922c64590222798bb761d5b6d8e72950 |