Goby/json/Polycom-RSS-2000-Default-Cr...

65 lines
1.9 KiB
JSON

{
"Name": "Polycom RSS 2000 Default Credentials",
"Description": "The Polycom RSS 2000 administrator 'Administrator' has a password that is set to the default value of 'polycom'. As a result, anyone with access to the Cisco port can trivially gain full access to the machine via arbitrary remote code execution. ",
"Product": "Polycom-RSS2000",
"Homepage": "https://www.poly.com/",
"DisclosureDate": "2012-04-23",
"Author": "gobysec@gmail.com",
"FofaQuery": "title=\"Polycom RSS 2000\"",
"GobyQuery": "title=\"Polycom RSS 2000\"",
"Level": "3",
"Impact": "Remote attacker can use this default to control the server.",
"Recommendation": "It is imperative to change default manufacturer passwords and restrict network access to critical and important systems.",
"References": [
"https://fofa.so/"
],
"HasExp": false,
"ExpParams": [],
"ExpTips": {
"Type": "Tips",
"Content": ""
},
"ScanSteps": [
"OR",
{
"Request": {
"data": "lang=en&lang_index=0&username=Administrator&password=%C3%93%C3%8C%C3%8F%C3%9A%C3%80%C3%8C%C3%8E",
"data_type": "text",
"follow_redirect": false,
"header": {
"Content-Type": "application/x-www-form-urlencoded"
},
"method": "POST",
"uri": "/login.php"
},
"ResponseTest": {
"checks": [
{
"bz": "",
"operation": "contains",
"type": "item",
"value": "main.admin.php",
"variable": "$head"
}
],
"operation": "AND",
"type": "group"
},
"SetVariable": []
}
],
"ExploitSteps": null,
"Tags": [
"defaultaccount", "iot"
],
"CVEIDs": null,
"CVSSScore": "10.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": ["Polycom-RSS2000"]
},
"Disable": false
}