A generic Broken Authentication vulnerability was identified targeting the Administrator account. The account was protected by an extremely weak password, allowing an attacker to compromise credentials using an automated dictionary attack via Burp Suite Intruder.
/#/login.admin@juice-sh.op and a dummy password.POST login request using Burp Suite Proxy.password field.Wordlist Source: Top 100 Passwords (GitHub)
Compromised Credentials:
Email: admin@juice-sh.op
Password: admin123
Severity: Critical
The exploitation was successful due to two main factors:
admin123, a top-ranking password in common breach lists.