Weak Admin Password

A generic Broken Authentication vulnerability was identified targeting the Administrator account. The account was protected by an extremely weak password, allowing an attacker to compromise credentials using an automated dictionary attack via Burp Suite Intruder.

  1. Navigate to the login page at /#/login.
  2. Enter admin@juice-sh.op and a dummy password.
  3. Intercept the POST login request using Burp Suite Proxy.
  4. Send the request to Intruder and define the payload marker on the password field.
  5. Retrieve the password list from the GitHub repository and load it into the payload configuration.
  6. Execute the attack.
  7. Identify the successful login by sorting for HTTP Status 200 OK (or distinct response length).

Wordlist Source: Top 100 Passwords (GitHub)

Compromised Credentials:

Email: admin@juice-sh.op
Password: admin123

Severity: Critical

The exploitation was successful due to two main factors: