Skip to content

Commit 591e510

Browse files
committed
add many pocs
1 parent b4b90ae commit 591e510

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+602
-53
lines changed

pkg/config/banner.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import (
77
"github.com/zan8in/gologger"
88
)
99

10-
const Version = "2.5.3"
10+
const Version = "2.5.5"
1111

1212
func ShowBanner(u *upgrade.Upgrade) {
1313
gologger.Print().Msgf("\n|\tA F R O G\t>\t%s\t-\t%s\n\n", EngineV(u), PocV(u))
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: 3com-nj2000-default-login
2+
3+
info:
4+
name: 3COM NJ2000 - Default Login
5+
author: daffainfo
6+
severity: high
7+
verified: true
8+
description: |
9+
3COM NJ2000 contains a default login vulnerability. Default admin login password of 'password' was found. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
10+
SHODAN: http.title:"ManageEngine Password"
11+
FOFA: body="NJ2000"
12+
reference:
13+
- https://www.manualslib.com/manual/204158/3com-Intellijack-Nj2000.html?page=12
14+
tags: default-login,3com,nj2000
15+
created: 2023/06/17
16+
17+
rules:
18+
r0:
19+
request:
20+
method: POST
21+
path: /login.html
22+
body: password=password
23+
expression: |
24+
response.status == 200 &&
25+
response.body.ibcontains(b'<title>3Com Corporation Web Interface</title>') &&
26+
response.body.bcontains(b'<frame name="mainFrame" src="blank.html">')
27+
expression: r0()

pocs/afrog-pocs/default-pwd/apisix-default-password.yaml

+15-12
Original file line numberDiff line numberDiff line change
@@ -6,22 +6,25 @@ info:
66
severity: high
77
verified: true
88
description: |
9-
Apache APISIX Dashboard default admin credentials were discovered.
10-
fofa: icon_hash="358172742" || title="Apache APISIX Dashboard"
9+
Apache APISIX Dashboard default admin credentials were discovered.
10+
FOFA: icon_hash="358172742" || title="Apache APISIX Dashboard"
11+
SHODAN: title:"Apache APISIX Dashboard"
12+
FOFA: title="Apache APISIX Dashboard"
13+
tags: apisix,apache,default-login
14+
created: 2023/06/17
1115

1216
rules:
13-
r3:
14-
request:
15-
method: GET
16-
path: /user/login?redirect=/
17-
expression: response.body.ibcontains(b'<title>Apache APISIX Dashboard</title>')
18-
stop_if_mismatch: true
1917
r0:
2018
request:
2119
method: POST
2220
path: /apisix/admin/user/login
23-
Content-Type: application/json;charset=UTF-8
21+
headers:
22+
Authorization:
23+
Content-Type: application/json;charset=UTF-8
2424
body: '{"username":"admin","password":"admin"}'
25-
expression: response.content_type.contains("application/json") && response.body.bcontains(b'"code":0')&& response.body.bcontains(b'"message":""')
26-
stop_if_match: true
27-
expression: r3() && r0()
25+
expression: |
26+
response.status == 200 &&
27+
response.body.bcontains(b'"code":0') &&
28+
response.body.bcontains(b'"data"') &&
29+
response.body.bcontains(b'"token"')
30+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: hp-switch-default-login
2+
3+
info:
4+
name: HP 1820-8G Switch J9979A Default Login
5+
author: pussycat0x
6+
severity: high
7+
description: |
8+
HP 1820-8G Switch J9979A default admin login credentials were discovered.
9+
FOFA: HP 1820-8G Switch J9979A
10+
reference:
11+
- https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US
12+
tags: default-login,hp
13+
created: 2023/06/17
14+
15+
rules:
16+
r0:
17+
request:
18+
method: POST
19+
path: /htdocs/login/login.lua
20+
body: username=admin&password=
21+
expression: |
22+
response.status == 200 &&
23+
response.body.bcontains(b'"redirect": "/htdocs/pages/main/main.lsp"') &&
24+
response.body.bcontains(b'"error": ""')
25+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: inspur-clusterengine-default-login
2+
3+
info:
4+
name: Inspur Clusterengine 4 - Default Admin Login
5+
author: ritikchaddha
6+
severity: high
7+
verified: true
8+
description: |
9+
Inspur Clusterengine version 4 default admin login credentials were successful.
10+
FOFA: title="TSCEV4.0"
11+
reference:
12+
- https://blog.csdn.net/qq_36197704/article/details/115665793
13+
tags: default-login,inspur,clusterengine
14+
created: 2023/06/17
15+
16+
rules:
17+
r0:
18+
request:
19+
method: POST
20+
path: /login
21+
body: op=login&username=admin|pwd&password=123456
22+
follow_redirects: true
23+
expression: |
24+
response.status == 200 &&
25+
response.body.bcontains(b'"exitcode":0') &&
26+
response.raw_header.bcontains(b'username=admin|pwd')
27+
expression: r0()

pocs/afrog-pocs/default-pwd/ns-icg-default-password.yaml

+10-4
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,19 @@ info:
55
author: pikpikcu
66
severity: high
77
verified: true
8-
description: fofa "NS-ICG"
8+
description: |
9+
Netentsec NS-ICG contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
10+
FOFA: "NS-ICG"
11+
reference:
12+
- https://www.cnvd.org.cn/flaw/show/CNVD-2016-08603
13+
tags: nsicg,default-login
14+
created: 2023/06/17
915

1016
rules:
1117
r0:
1218
request:
1319
method: POST
14-
path: /user/login/checkPermit
15-
body: usrname=ns25000&pass=ns25000
16-
expression: response.status == 200 && response.body.bcontains(b'{"agreed":true}')
20+
path: /user/login/login
21+
body: usrname=ns25000&pass=ns25000&signinfo=&ukey_user_flag=0&SlotSerialNumber=&agree=
22+
expression: response.status == 302 && response.raw_header.bcontains(b'/user/main/')
1723
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: openemr-default-login
2+
3+
info:
4+
name: OpenEMR - Default Admin Discovery
5+
author: Geekby
6+
severity: high
7+
verified: true
8+
description: |
9+
OpenEMR default admin credentials were discovered.
10+
FOFA: app="OpenEMR"
11+
SHODAN: http.html:"OpenEMR"
12+
reference:
13+
- https://github.com/openemr/openemr-devops/tree/master/docker/openemr/6.1.0/#openemr-official-docker-image
14+
tags: openemr,default-login
15+
created: 2023/06/17
16+
17+
rules:
18+
r0:
19+
request:
20+
method: POST
21+
path: /interface/main/main_screen.php?auth=login&site=default
22+
body: new_login_session_management=1&languageChoice=1&authUser=admin&clearPass=pass&languageChoice=10
23+
expression: |
24+
response.status == 302 &&
25+
response.raw_header.bcontains(b'main.php?token_main=') &&
26+
response.raw_header.bcontains(b'OpenEMR')
27+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: powerjob-default-login
2+
3+
info:
4+
name: PowerJob - Default Login
5+
author: j4vaovo
6+
severity: high
7+
verified: true
8+
description: |
9+
PowerJob default login credentials were discovered.
10+
SHODAN: http.title:"PowerJob"
11+
FOFA: title="PowerJob"
12+
reference:
13+
- https://www.yuque.com/powerjob/guidence/trial
14+
tags: powerjob,default-login
15+
created: 2023/06/17
16+
17+
rules:
18+
r0:
19+
request:
20+
method: POST
21+
path: /appInfo/assert
22+
headers:
23+
Content-Type: application/json
24+
body: |
25+
{"appName":"powerjob-worker-samples","password":"powerjob123"}
26+
expression: |
27+
response.status == 200 &&
28+
response.body.bcontains(b'{"success":true,"data":') &&
29+
response.headers["content-type"].contains('application/json')
30+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
id: rainloop-default-login
2+
3+
info:
4+
name: Rainloop WebMail - Default Admin Login
5+
author: For3stCo1d
6+
severity: high
7+
verified: true
8+
description: |
9+
Rainloop WebMail default admin login credentials were successful.
10+
FOFA: app="RAINLOOP-WebMail"
11+
reference:
12+
- https://github.com/RainLoop/rainloop-webmail/issues/28
13+
tags: default-login,rainloop,webmail,foss
14+
created: 2023/06/17
15+
16+
rules:
17+
r0:
18+
request:
19+
method: GET
20+
path: /?/AdminAppData@no-mobile-0/0/15503332983847185/
21+
expression: response.raw.bcontains(b'token":"')
22+
output:
23+
search: '"\"token\":\"(?P<token>.*?)\"".bsubmatch(response.body)'
24+
token: search["token"]
25+
r1:
26+
request:
27+
method: POST
28+
path: /?/Ajax/&q[]=/0/
29+
body: |
30+
Login=admin&Password=12345&Action=AdminLogin&XToken={{token}}
31+
expression: |
32+
response.status == 200 &&
33+
response.body.bcontains(b'"Action":"AdminLogin"') &&
34+
response.body.bcontains(b'"Result":true')
35+
expression: r0() && r1()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
id: stackstorm-default-login
2+
3+
info:
4+
name: StackStorm Default Login
5+
author: PaperPen
6+
severity: high
7+
verified: true
8+
description: |
9+
A StackStorm default admin login was discovered.
10+
FOFA: app="stackstorm"
11+
reference:
12+
- https://github.com/StackStorm/st2-docker
13+
tags: stackstorm,default-login
14+
created: 2023/06/17
15+
16+
set:
17+
basic: base64("st2admin:Ch@ngeMe")
18+
rules:
19+
r0:
20+
request:
21+
method: POST
22+
path: /auth/tokens
23+
headers:
24+
Content-Type: application/json
25+
Authorization: Basic {{basic}}
26+
expression: |
27+
response.status == 201 &&
28+
response.body.bcontains(b'"user":') &&
29+
response.body.bcontains(b'"token":') &&
30+
response.body.bcontains(b'"expiry":')
31+
expression: r0()
32+
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
id: acemanager-login
2+
3+
info:
4+
name: ACEmanager Detection
5+
author: pussycat0x
6+
severity: info
7+
verified: true
8+
description: |
9+
ACEManager was detected. ACEManager is a configuration and diagnostic tool for the Sierra Wireless AirLink Raven modems.
10+
FOFA: app="ACEmanager"
11+
tags: panel,login,tech,acemanager
12+
created: 2023/06/17
13+
14+
rules:
15+
r0:
16+
request:
17+
method: GET
18+
path: /
19+
expression: |
20+
response.status == 200 &&
21+
response.body.ibcontains(b'<title>::: ACEmanager :::</title>')
22+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: acrolinx-dashboard
2+
3+
info:
4+
name: Acrolinx Dashboard
5+
author: ffffffff0x
6+
severity: info
7+
verified: true
8+
description: |
9+
An Acrolinx Analytics dashboard was detected.
10+
FOFA: title=="Acrolinx Dashboard"
11+
SHODAN: http.title:"Acrolinx Dashboard"
12+
GOOGLE: inurl:"Acrolinx Dashboard"
13+
reference:
14+
- https://docs.acrolinx.com/coreplatform/latest/en/analytics/acrolinx-analytics-dashboards
15+
tags: acrolinx,panel
16+
created: 2023/06/17
17+
18+
rules:
19+
r0:
20+
request:
21+
method: GET
22+
path: /dashboard.html
23+
expression: |
24+
response.status == 200 &&
25+
(response.body.ibcontains(b'<title>Acrolinx Dashboard</title>') ||
26+
response.body.ibcontains(b'Acrolinx</title>'))
27+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
id: adminset-panel
2+
3+
info:
4+
name: Adminset Login Panel
5+
author: ffffffff0x
6+
severity: info
7+
verified: true
8+
description: |
9+
An Adminset login panel was detected.
10+
FOFA: app="AdminSet"
11+
reference:
12+
- https://github.com/guhongze/adminset/
13+
tags: adminset,panel
14+
created: 2023/06/17
15+
16+
rules:
17+
r0:
18+
request:
19+
method: GET
20+
path: /
21+
follow_redirects: true
22+
expression: response.status == 200 && response.body.ibcontains(b'<title>AdminSet Login</title>')
23+
expression: r0()
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
id: casemanager-panel
2+
3+
info:
4+
name: CaseManager Login Panel - Detect
5+
author: ffffffff0x
6+
severity: info
7+
verified: true
8+
description: |
9+
CaseManager login panel was detected.
10+
FOFA: title="CaseManager"
11+
tags: casemanager,panel
12+
created: 2023/06/17
13+
14+
rules:
15+
r0:
16+
request:
17+
method: GET
18+
path: /login
19+
expression: response.status == 200 && response.body.ibcontains(b'<title>CaseManager</title>')
20+
expression: r0()

0 commit comments

Comments
 (0)