Goby/json/Glodon-T-platform-default-c...

144 lines
5.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Glodon T platform default credentials vulnerability",
"Description": "<p>Glodon is a system management software of Glodon Technology Co., Ltd. </p><p>Glodon T platform is used to inherit and manage Glodon's products. Glodon T platform web console has a default credential through which an attacker can take over the target system.</p>",
"Product": "GLODON console",
"Homepage": "https://www.glodon.com/",
"DisclosureDate": "2022-03-08",
"Author": "i_am_ben@qq.com",
"FofaQuery": "body=\"src=\\\"/Scripts/DD_belatedPNG.js\" && body=\"url: \\\"/Console/Account/LogOn\\\"\"",
"GobyQuery": "body=\"src=\\\"/Scripts/DD_belatedPNG.js\" && body=\"url: \\\"/Console/Account/LogOn\\\"\"",
"Level": "2",
"Impact": "<p>Glodon T platform is used to inherit and manage Glodon's products. Glodon T platform web console has a default credential through which an attacker can take over the target system.</p>",
"Recommendation": "<p>1. Modify the default password. The password should preferably contain uppercase and lowercase letters, numbers and special characters, and the number of digits should be greater than 8. </p><p>2. If not necessary, prohibit public network access to the system. </p><p>3. Set access policies and whitelist access through security devices such as firewalls. </p>",
"Translation": {
"CN": {
"Name": "GLODON T 控制台默认凭据",
"Product": "Glodon console",
"Description": "<p>Glodon是广联达科技股份有限公司一款系统管理软件。</p><p>Glodon web控制台存在一个默认凭据恶意攻击者使用该凭据可接管目标Glodon web控制台使⽤管理员权限操作核⼼的功能</p>",
"Recommendation": "<p>1、修改默认⼝令密码最好包含⼤⼩写字⺟、数字和特殊字符等且位数⼤于8位。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p><p>3、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p>",
"Impact": "<p>Glodon web控制台存在一个默认凭据恶意攻击者使用该凭据可接管目标Glodon web控制台使⽤管理员权限操作核⼼的功能。</p>",
"VulType": [
"默认凭据"
],
"Tags": [
"默认凭据"
]
},
"EN": {
"Name": "Glodon T platform default credentials vulnerability",
"Product": "GLODON console",
"Description": "<p>Glodon is a system management software of Glodon Technology Co., Ltd. </p><p>Glodon T platform is used to inherit and manage Glodon's products. Glodon T platform web console has a default credential through which an attacker can take over the target system.</p>",
"Recommendation": "<p>1. Modify the default password. The password should preferably contain uppercase and lowercase letters, numbers and special characters, and the number of digits should be greater than 8. </p><p>2. If not necessary, prohibit public network access to the system. </p><p>3. Set access policies and whitelist access through security devices such as firewalls. </p>",
"Impact": "<p>Glodon T platform is used to inherit and manage Glodon's products. Glodon T platform web console has a default credential through which an attacker can take over the target system.</p>",
"VulType": [
"default credential"
],
"Tags": [
"default credential"
]
}
},
"GifAddress": "",
"References": [
"https://www.glodon.com/en/products"
],
"RealReferences": [
"https://www.glodon.com/en/products"
],
"HasExp": true,
"ExpParams": [],
"Is0day": false,
"ExpTips": {
"Type": "Default Credentials",
"Content": "Glodon T platform web console has a default credential through which an attacker can take over the target system."
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"VulType": [
"default credential"
],
"Tags": [
"default credential"
],
"CVEIDs": [],
"CVSSScore": "7.5",
"CNNVDIDs": [],
"AttackSurfaces": {
"Application": [
"Glodon console"
],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"Disable": false,
"CNNVD": [],
"CNVD": []
}