Skip to content

Jeedom - Default Login

ID: jeedom-default-login

Severity: high

Author: ritikchaddha

Tags: jeedom,default-login,misconfig

Jeedom default login has been detected.

id: jeedom-default-login
info:
name: Jeedom - Default Login
author: ritikchaddha
severity: high
description: |
Jeedom default login has been detected.
classification:
cpe: cpe:2.3:a:jeedom:jeedom:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: jeedom
product: jeedom
shodan-query: title:"Jeedom"
tags: jeedom,default-login,misconfig
variables:
username: admin
password: admin
http:
- raw:
- |
POST /core/ajax/user.ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
action=login&username={{username}}&password={{password}}&twoFactorCode=&storeConnection=0
- |
GET /index.php?v=d&p=dashboard HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body_1
words:
- 'state":"ok'
- 'result":'
condition: and
- type: word
part: body_2
words:
- "logout=1"
- "Plugins</span>"
condition: and
# digest: 490a004630440220740df66832ef277273ca1401661edd3914261a1c4d18f4d686eb1df996715987022056e320c108d6168a2c8244e797765cc7c2f71d687c56aff5f45a178a24de7ad1:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/jeedom/jeedom-default-login.yaml"

View on Github