Skip to content
cdxy edited this page Jan 9, 2024 · 16 revisions

scalpel🗡

Scalpel is a command line scanner that can deeply parse parameters in HTTP requests to generate more accurate http messages based on Poc. Currently, HTTP passive proxy mode is supported for scanning. Users can customize POC, and we can also expose the POC repository on Github.

Legal Disclaimer

This tool is only for legally authorized security testing and research behavior, do not scan unauthorized targets. If you do anything illegal in the process of using this tool, you will bear the corresponding consequences and we will not bear any legal or joint and several liability. If you need to test the availability of this tool, please build your own target environment.

In order to avoid malicious use, all poc included in this project are theoretical judgments of vulnerabilities, there is no vulnerability exploitation process, and real attacks and vulnerabilities will not be launched against the target.

Before installing and using this tool, you must read carefully and fully understand the terms and conditions. Restrictions, exemption clauses or other terms related to your material rights and interests may be highlighted in the form of bold, underlining and so on. Your use or your acceptance of this Agreement in any other express or implied manner shall be deemed to have been read and agreed to by you.

Detection module

The detection module is constantly updated to support the detection of more vulnerabilities.

  • CVE

  • XSS

  • SQL injection

  • Command / code injection

  • CRLF injection

  • A series of vulnerabilities in seeyou software

  • Springboot series vulnerabilities

  • Thinkphp series vulnerabilities

  • ...

Functional features

Scalpel supports depth parameter injection, which has a powerful data parsing and mutation algorithm. It can parse common data formats (json, xml, form, etc.) into tree structure, and then mutate the tree according to the rules in poc, including the mutation of leaf nodes and tree structure. After the mutation is complete, the tree structure is restored to the original data format.

To solve the problem in the process of HTTP application vulnerability Fuzz, the traditional "plaintext parameter transfer mode of form" gradually turns into "complex, nested-coded parameter transfer", which can not directly inject or replace the parameter content and can not go deep into the underlying vulnerability trigger point.

Quick to use

Scalpel uses proxy mode for passive scanning, taking the Windows system as an example:

.\scalpel-windows-amd64.exe poc -l 127.0.0.1:8888 -f poc.yaml -o vuln.html

For more information on downloading, running and configuring Scalpel, please see Wiki

POC

The compilation of POC

See the POC Authoring Guide for details.https://github.com/StarCrossPortal/scalpel/wiki/POC%E7%BC%96%E5%86%99%E6%8C%87%E5%8D%97

Contribution to the POC

Contributors submit a POC to the github repository in the form of PR. Please search the repository's poc folder and Github Pull request before submitting to ensure that the POC has not been submitted.

reference

Currently scalpel has integrated 100+ vulnerability POC

Category CVE Number Vulnerability Name Support
CVE(2022) CVE-2022-0540 Jira authentication bypasses vulnerability
CVE (2022) CVE-2022-22954 VMware Workspace One Access SSTIRCE vulnerability
CVE (2022) CVE-2022-26134 Confluence OGNLRCE vulnerability
CVE (2022) CVE-2022-34590 SQL injection vulnerability of hospital management system
CVE (2022) CVE-2022-35151 KK File View v4.1.0 contains multiple cross-site scripting (XSS) vulnerabilities
CVE (2022) CVE-2022-35413 Wapples hard-coded vulnerability
CVE(2022) CVE-2022-35914 GLPI injection vulnerability
CVE (2022) CVE-2022-36642 Telos Alliance Omnia MPX Node Information Disclosure Vulnerability
CVE (2022) CVE-2022-36883 Jenkins Authentication Bypass Vulnerability
CVE (2022) CVE-2022-37299 Shirne CMS controller.php directory traversal vulnerability
CVE (2021) CVE-2021-26086 Atlassian Jira Server File Reading Vulnerability
CVE (2021) CVE-2021-29622 Prometheus redirection vulnerability
CVE (2021) CVE-2021-30497 Avalanche directory traversal vulnerability
CVE (2021) CVE-2021-33807 Carta Disgespage directory traversal vulnerability
CVE (2021) CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE (2021) CVE-2021-35380 Solari Di Udine Term Talk Server directory traversal vulnerability
CVE (2021) CVE-2021-35464 Java deserialization vulnerability of Forge Rock AM server
CVE (2021) CVE-2021-35587 Oracle Access Manager Authentication Bypass Vulnerability
CVE (2021) CVE-2021-37538 SmartDatasoft Smart Blog for Prestashop SQL Injection Vulnerability
CVE (2021) CVE-2021-37704 PhpFastCache Information Disclosure Vulnerability
CVE(2021) CVE-2021-39211 GLPI Information Disclosure Vulnerability
CVE (2021) CVE-2021-39226 Grafana vulnerability
CVE (2021) CVE-2021-39327 Bullet Proof Security WordPress Information Disclosure Vulnerability
CVE (2021) CVE-2021-40149 E1Zoom Information Disclosure Vulnerability
CVE (2021) CVE-2021-40859 Auerswald Compact 5500r backdoor vulnerability
CVE (2021) CVE-2021-40875 Gurock TestRail Senses Information Disclosure Vulnerability
CVE (2021) CVE-2021-41192 Redash spoofing session vulnerability
CVE (2021) CVE-2021-41266 Minio Authentication Bypass Vulnerability
CVE (2021) CVE-2021-41381 Payara Microcommunity directory traversal vulnerability
CVE (2021) CVE-2021-41649 Puneethreddyhc SQL injection vulnerability
CVE (2021) CVE-2021-43496 Clustering directory traversal vulnerability
CVE (2021) CVE-2021-43798 Grafana directory traversal vulnerability
CVE(2021) CVE-2021-44077 Zoho Remote Code Execution Vulnerability
CVE (2021) CVE-2021-44152 Reprise RLM ultra vires vulnerability
CVE (2021) CVE-2021-44427 SQL Injection Vulnerability in Rosario Student Information System
CVE(2021) CVE-2021-44515 Zoho Remote Code Execution Vulnerability
CVE (2021) CVE-2021-44529 IV Anti EPM Cloud Service Device RCE Vulnerability
CVE (2021) CVE-2021-46381 D-LINK DAP-1620 directory traversal vulnerability
CVE (2021) CVE-2021-46417 Franklin Fueling Systems Coli BR Information Disclosure Vulnerability
CVE (2021) CVE-2021-46422 Telesquare SDT-CW 3b1 command injection vulnerability
CVE (2020) CVE-2020-12478 Eampass injection vulnerability
CVE (2020) CVE-2020-13700 WordPress ACF-to-rest-API information disclosure vulnerability
CVE (2020) CVE-2020-13937 Apache Kylin security vulnerability
CVE (2020) CVE-2020-14181 Atlassian Jira Information Disclosure Vulnerability
CVE (2020) CVE-2020-14408 Agent Jo Cockpit cross-site scripting vulnerability
CVE(2020) CVE-2020-15148 Yii code problem vulnerability
CVE (2020) CVE-2020-35338 Mobile View Point Wireless Multiplex Terminal Trust Management Vulnerability
CVE (2020) CVE-2020-35476 OpenTS DB command injection vulnerability
CVE (2020) CVE-2020-35489 WordPress Contact-Form-7 Code Problem Vulnerability
CVE (2020) CVE-2020-35736 lift off gate one path traversal vulnerability
CVE (2020) CVE-2020-36112 Project Worlds Online Book Store Project in PHP SQL Injection Vulnerability
CVE (2020) CVE-2020-36289 Atlassian Jira Server and Atlassian JIRA Data Center Information Disclosure Vulnerability
CVE (2020) CVE-2020-26948 Embry Server Code Problem Vulnerability
CVE (2020) CVE-2020-27361 Akkadian Provisioning Manager Security Vulnerability
CVE (2020) CVE-2020-27467 LFI-Process Wire CMS Path Traversing Vulnerability
CVE(2020) CVE-2020-27866 Vulnerability of several Netgear products
CVE (2020) CVE-2020-27982 IceWarp Mail Server cross-site scripting vulnerability
CVE (2020) CVE-2020-29395 WordPress plugin cross-site scripting vulnerability
CVE (2020) CVE-2020-24312 WordPress plugin mndpsingh287wp file manager information disclosure vulnerability
CVE (2020) CVE-2020-24550 Elastic Episerver Find input validation error vulnerability
CVE (2020) CVE-2020-24571 Nexus QA Nexus DB path traversal vulnerability
CVE (2020) CVE-2020-24949 PHP-Fusion security vulnerability
CVE(2020) CVE-2020-26073 Cisco? SD-WAN vManage information disclosure vulnerability
CVE (2020) CVE-2020-26876 WordPress security vulnerability
CVE (2020) CVE-2020-16139 Cisco 7937g input validation error vulnerability
CVE (2020) CVE-2020-17453 WSO2 Management Console cross-site scripting vulnerability
CVE (2020) CVE-2020-17519 Apache Flink vulnerability
CVE (2020) CVE-2020-19625 Sheila 1227 Gridx vulnerability
CVE (2020) CVE-2020-20300 vulnerability of weiphp SQL injection
CVE (2020) CVE-2020-23015 DEISO OPN Sense input validation error vulnerability
CVE (2019) CVE-2019-0230 Apache Struts Remote Code Execution Vulnerability
CVE (2019) CVE-2019-2578 Oracle Unauthorized Access Vulnerability
CVE (2019) CVE-2019-2588 Oracle Fusion Middleware Unauthorized Access Vulnerability
CVE (2019) CVE-2019-3912 Lab Key Server Community Edition Redirection Vulnerability
CVE (2019) CVE-2019-6715 WordPress Arbitrary File Reading Vulnerability
CVE(2019) CVE-2019-8449 Jira Information Disclosure Vulnerability
CVE (2019) CVE-2019-8903 Total.js platform path traversal vulnerability
CVE (2019) CVE-2019-10092 Apache HTTP Server cross-site scripting problem
CVE (2019) CVE-2019-10232 Teclib GLPI SQL injection vulnerability
CVE (2019) CVE-2019-10717 BlogEngine.NET directory traversal vulnerability
CVE (2019) CVE-2019-11248 Kubernetes Healthz port public
CVE(2019) CVE-2019-11581 Jira template injection vulnerability
CVE (2019) CVE-2019-12583 zyxeluag, USG and ZyWall devices are not authorized to access
CVE (2019) CVE-2019-12962 Vulnerability of Livezilla Server XSS
CVE (2019) CVE-2019-13101 D-LINK DIR-600M Information Disclosure Vulnerability
CVE (2019) CVE-2019-13462 Lansweeper SQL injection vulnerability
CVE (2019) CVE-2019-14322 Pallets Werkzeug Error Handling Drive Name
CVE (2019) CVE-2019-14974 SugarCRM Enterprise XSS Vulnerability
CVE (2019) CVE-2019-15858 WordPress XSS Vulnerability
CVE (2019) CVE-2019-16313 FW8 Router ROM Information Disclosure Vulnerability
CVE (2019) CVE-2019-16996 METINFO 7.0.0 beta SQL injection vulnerability
CVE (2019) CVE-2019-17382 Zabbix login bypass vulnerability
CVE (2019) CVE-2019-17418 MetInfo SQL Injection Vulnerability
CVE (2019) CVE-2019-17503 Kirona Dynamic Resource Scheduling (DRS) Information Disclosure Vulnerability
CVE (2019) CVE-2019-18393 Ignite real-time OpenFire directory traversal vulnerability
CVE (2019) CVE-2019-18922 AT-S107V.1.1.3 directory traversal vulnerability
CVE (2019) CVE-2019-19368 Rumpus FTP Web XSS vulnerability
CVE (2019) CVE-2019-19781 Citrix ADC and Gateway Directory Traversing Vulnerability
CVE (2019) CVE-2019-20085 TVT NVMS-1000 device directory traversal vulnerability
CVE (2019) CVE-2019-20933 Influx DB Authentication Bypass Vulnerability
UFIDA yongyou-ERP-NC- directory traversal vulnerability
UFIDA Yong You-NC-RCE
UFIDA yongyou- local file contains vulnerability
Spring Boot Spring Boot-Actuators-Jolokia-XXE Vulnerability
Zhiyuan Zhiyuan File Upload Vulnerability
Zhiyuan Zhiyuan -oa-info-leak vulnerability
Ruijie Ruijie Gateway Command Execution Vulnerability
ThinkPHP thinkphp-509-information-disclosure
Universal Arbitrary file reading vulnerability

The POC will be updated continuously

Problem feedback

Thank you first of all for taking the time to make scalpel easier to use👍

If you have any false positives and other questions, you can give feedback in the following ways

  1. GitHub issue https://github.com/StarCrossPortal/scalpel/issues
Clone this wiki locally