Skip to content

SolarWinds Orion Default Login

ID: solarwinds-default-admin

Severity: high

Author: dwisiswant0

Tags: solarwinds,default-login

SolarWinds Orion default admin credentials were discovered.

id: solarwinds-default-admin
info:
name: SolarWinds Orion Default Login
author: dwisiswant0
severity: high
description: SolarWinds Orion default admin credentials were discovered.
reference:
- https://github.com/solarwinds/OrionSDK/wiki/REST
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
max-request: 2
tags: solarwinds,default-login
# Optional:
# POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1
# {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337}
http:
- raw:
- |
GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username)}}
- |
GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username)}}
payloads:
username:
- admin
attack: pitchfork
matchers-condition: and
matchers:
- type: word
words:
- "Content-Type: application/json"
part: header
- type: regex
regex:
- "(totalRow|result|swi)s(:\\/\\/)?"
- "(Orion\\.|Poller(ID)?)s?"
condition: and
part: body
- type: status
status:
- 200
# digest: 4a0a00473045022038b1d6470ba1b09e5726c2a1ed430ce7bc27f8ffbffbfaf1ddc901300f93d421022100a91a593e3ebe40b8e3ec6608dd41b2dac5f1862c00f89acaef2080b29b6701fb:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/solarwinds/solarwinds-default-login.yaml"

View on Github