Skip to content

IBM Maximo Login Panel - Detect

ID: ibm-maximo-login

Severity: info

Author: ritikchaddha,righettod

Tags: maximo,panel,ibm,login,detect

IBM Maximo login panel was detected.

id: ibm-maximo-login
info:
name: IBM Maximo Login Panel - Detect
author: ritikchaddha,righettod
severity: info
description: IBM Maximo login panel was detected.
reference:
- https://www.ibm.com/support/pages/what-default-username-and-password-websphere-application-server-community-edition-and-how-add-users-admin-group
- https://www.ibm.com/products/maximo
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
cpe: cpe:2.3:a:ibm:maximo_asset_management:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: ibm
product: maximo_asset_management
shodan-query: http.favicon.hash:-399298961
fofa-query: icon_hash=-399298961
tags: maximo,panel,ibm,login,detect
http:
- method: GET
path:
- "{{BaseURL}}/maximo/webclient/login/login.jsp?appservauth=true"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- "maximo-icon.png"
- "IBM"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)Copyright\s+IBM\s+Corp\.\s+([0-9-]+)'
# digest: 490a0046304402200c22ba478272f54096ecd56e96180fb3b255323cfa02ea4dcf0d9c7e0ff3663502206a414072b3bd6a1b290d323ce7185908740a4d31dd8f5d87fad4fc804da8acfc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/ibm/ibm-maximo-login.yaml"

View on Github