Skip to content

Commit

Permalink
20240515
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed May 15, 2024
1 parent ab72919 commit 7ce1364
Show file tree
Hide file tree
Showing 47,107 changed files with 666,918 additions and 2,069,626 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20240514
20240515
47,731 changes: 12,063 additions & 35,668 deletions poc.txt

Large diffs are not rendered by default.

File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

This file was deleted.

58 changes: 58 additions & 0 deletions poc/apache/askapache-firefox-adsense.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: askapache-firefox-adsense

info:
name: >
AskApache Firefox Adsense <= 3.0 - Cross-Site Request Forgery
author: topscoder
severity: medium
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/57d863b9-d544-4af5-afbe-268635a8dd98?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/askapache-firefox-adsense/"
google-query: inurl:"/wp-content/plugins/askapache-firefox-adsense/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,askapache-firefox-adsense,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/askapache-firefox-adsense/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "askapache-firefox-adsense"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 3.0')
File renamed without changes.
File renamed without changes.
File renamed without changes.
58 changes: 0 additions & 58 deletions poc/api/acf-to-rest-api-1e33553896157651d598bc5cf39ab65c.yaml

This file was deleted.

58 changes: 58 additions & 0 deletions poc/api/acf-to-rest-api.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: acf-to-rest-api

info:
name: >
ACF to REST API <= 3.2.0 - Insecure direct object reference via permalinks manipulation
author: topscoder
severity: low
description: >
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/738e5946-65e4-4403-bb23-f84910289a45?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/acf-to-rest-api/"
google-query: inurl:"/wp-content/plugins/acf-to-rest-api/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,acf-to-rest-api,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/acf-to-rest-api/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "acf-to-rest-api"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 3.2.0')

This file was deleted.

58 changes: 58 additions & 0 deletions poc/api/address-autocomplete-using-google-place-api-plugin.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: address-autocomplete-using-google-place-api-plugin

info:
name: >
Address Autocomplete Using Google Place Api <= 1.0.0 - Cross-Site Request Forgery
author: topscoder
severity: high
description: >
The Address Autocomplete plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the gaaf_google_autocomplete_settings_tab function. This makes it possible for unauthenticated attackers to change plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f6c94024-20fb-4cc1-a093-1b9974e61220?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id:
metadata:
fofa-query: "wp-content/plugins/address-autocomplete-using-google-place-api/"
google-query: inurl:"/wp-content/plugins/address-autocomplete-using-google-place-api/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,address-autocomplete-using-google-place-api,high

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/address-autocomplete-using-google-place-api/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "address-autocomplete-using-google-place-api"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.0.0')
Loading

0 comments on commit 7ce1364

Please sign in to comment.