The host is running Burden and is prone to authentication bypass vulnerability.
Successful exploitation will allow attackers to login as admin without providing credentials. Impact Level: Application
Upgrade to Burden 1.8.1 or later, For updates refer to https://github.com/joshf/Burden/releases/tag/1.8.1
The flaw is due to insufficient authentication when handling 'burden_user_rememberme' cookie parameter. A remote unauthenticated user can set 'burden_user_rememberme' cookie to '1' and gain administrative access to the application.
Burden version 1.8 and prior.
Send the crafted HTTP GET request and check is it possible to login or not