parent
58d0e08739
commit
0896fc82f9
|
@ -4,10 +4,7 @@ info:
|
|||
name: Oracle Content Server XSS
|
||||
author: madrobot
|
||||
severity: medium
|
||||
description:
|
||||
The vulnerability can be used to include
|
||||
HTML- or JavaScript code to the affected web page. The code is executed
|
||||
in the browser of users if they visit the manipulated site.
|
||||
description: The vulnerability can be used to include HTML or JavaScript code to the affected web page. The code is executed in the browser of users if they visit the manipulated site.
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -3,7 +3,7 @@ info:
|
|||
author: "Random Robbie"
|
||||
name: "Struts2 RCE "
|
||||
severity: critical
|
||||
description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attacker’s invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server.
|
||||
description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attacker’s invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server.
|
||||
|
||||
# This template supports the detection part only.
|
||||
# Do not test any website without permission
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Nuxeo Authentication Bypass Remote Code Execution
|
||||
author: madrobot
|
||||
severity: high
|
||||
description: Nuxeo Authentication Bypass Remote Code Execution < 103 using a SSTI
|
||||
description: Nuxeo Authentication Bypass Remote Code Execution < 103 using a SSTI
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
|
|
|
@ -15,9 +15,9 @@ info:
|
|||
requests:
|
||||
- payloads:
|
||||
command:
|
||||
- "systeminfo" # Windows
|
||||
- "lsb_release -a" # Linux
|
||||
- "sysctl kern.ostype" # macOS
|
||||
- "systeminfo" # Windows
|
||||
- "lsb_release -a" # Linux
|
||||
- "sysctl kern.ostype" # macOS
|
||||
port:
|
||||
- "80"
|
||||
- "443"
|
||||
|
|
Loading…
Reference in New Issue