Some web applications have an administrative login section that allows administrating the application content. Default Login Location vulnerability means that an attacker is able to get control over such a section without authentication or via authorization with the default credentials. It is possible if managing interfaces are not properly protected from unauthorized access or the default password has not been changed (the credentials have not been removed).
This vulnerability allows an attacker to get access to:
User account provisioning
Website design and layout
The issue can be found in the source code on the server side.
Administrative section must have authentication. That means each action in that section should be authenticated.
URL for the login form should not be shown on your public website.
Default Login Location should be changed if possible.
Administrative section should be closed for search bots. Example of robots.txt:
Comments and links with the information about the default login form should be removed from the HTML code shown by the client application.
Remove the default credentials or change the password.