-
Notifications
You must be signed in to change notification settings - Fork 320
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
ab72919
commit 7ce1364
Showing
47,107 changed files
with
666,918 additions
and
2,069,626 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
20240514 | ||
20240515 |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
58 changes: 0 additions & 58 deletions
58
poc/apache/askapache-firefox-adsense-3ee736065c571005f3aa44af407146c3.yaml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
id: askapache-firefox-adsense | ||
|
||
info: | ||
name: > | ||
AskApache Firefox Adsense <= 3.0 - Cross-Site Request Forgery | ||
author: topscoder | ||
severity: medium | ||
description: > | ||
reference: | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/57d863b9-d544-4af5-afbe-268635a8dd98?source=api-scan | ||
classification: | ||
cvss-metrics: | ||
cvss-score: | ||
cve-id: | ||
metadata: | ||
fofa-query: "wp-content/plugins/askapache-firefox-adsense/" | ||
google-query: inurl:"/wp-content/plugins/askapache-firefox-adsense/" | ||
shodan-query: 'vuln:' | ||
tags: cve,wordpress,wp-plugin,askapache-firefox-adsense,medium | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/askapache-firefox-adsense/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "askapache-firefox-adsense" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 3.0') |
File renamed without changes.
File renamed without changes.
File renamed without changes.
58 changes: 0 additions & 58 deletions
58
poc/api/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
id: acf-to-rest-api | ||
|
||
info: | ||
name: > | ||
ACF to REST API <= 3.2.0 - Insecure direct object reference via permalinks manipulation | ||
author: topscoder | ||
severity: low | ||
description: > | ||
reference: | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/738e5946-65e4-4403-bb23-f84910289a45?source=api-scan | ||
classification: | ||
cvss-metrics: | ||
cvss-score: | ||
cve-id: | ||
metadata: | ||
fofa-query: "wp-content/plugins/acf-to-rest-api/" | ||
google-query: inurl:"/wp-content/plugins/acf-to-rest-api/" | ||
shodan-query: 'vuln:' | ||
tags: cve,wordpress,wp-plugin,acf-to-rest-api,low | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/acf-to-rest-api/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "acf-to-rest-api" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 3.2.0') |
58 changes: 0 additions & 58 deletions
58
poc/api/address-autocomplete-using-google-place-api-60d12634c1b8de8d81af0efb8a90411b.yaml
This file was deleted.
Oops, something went wrong.
58 changes: 58 additions & 0 deletions
58
poc/api/address-autocomplete-using-google-place-api-plugin.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
id: address-autocomplete-using-google-place-api-plugin | ||
|
||
info: | ||
name: > | ||
Address Autocomplete Using Google Place Api <= 1.0.0 - Cross-Site Request Forgery | ||
author: topscoder | ||
severity: high | ||
description: > | ||
The Address Autocomplete plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the gaaf_google_autocomplete_settings_tab function. This makes it possible for unauthenticated attackers to change plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. | ||
reference: | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c94024-20fb-4cc1-a093-1b9974e61220?source=api-prod | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | ||
cvss-score: 8.8 | ||
cve-id: | ||
metadata: | ||
fofa-query: "wp-content/plugins/address-autocomplete-using-google-place-api/" | ||
google-query: inurl:"/wp-content/plugins/address-autocomplete-using-google-place-api/" | ||
shodan-query: 'vuln:' | ||
tags: cve,wordpress,wp-plugin,address-autocomplete-using-google-place-api,high | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/address-autocomplete-using-google-place-api/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "address-autocomplete-using-google-place-api" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 1.0.0') |
Oops, something went wrong.