Description and References
parent
4beb5e8495
commit
0ee0c0870f
|
@ -5,11 +5,7 @@ info:
|
|||
severity: critical
|
||||
description: Struts is vulnerable to remote command injection attacks through incorrectly parsing an attacker’s invalid Content-Type HTTP header. The Struts vulnerability allows these commands to be executed under the privileges of the Web server.
|
||||
tags: cve,cve2017,struts,rce,apache
|
||||
|
||||
# This template supports the detection part only.
|
||||
# Do not test any website without permission
|
||||
# Exploit:- https://github.com/mazen160/struts-pwn
|
||||
|
||||
reference: https://github.com/mazen160/struts-pwn
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
|
@ -5,9 +5,7 @@ info:
|
|||
author: thomas_from_offensity
|
||||
severity: critical
|
||||
description: RCE - Buffer overflow in ScStoragePathFromUrl function (WebDAV service - IIS 6.0) - Windows Server 2003 R2
|
||||
|
||||
# this was implemented based on the "check"-method in:
|
||||
# https://github.com/danigargu/explodingcan/blob/master/explodingcan.py
|
||||
reference: https://github.com/danigargu/explodingcan/blob/master/explodingcan.py
|
||||
|
||||
requests:
|
||||
- method: OPTIONS
|
||||
|
|
|
@ -6,8 +6,7 @@ info:
|
|||
severity: medium
|
||||
description: A Cross-Site Scripting (XSS) was discovered in 'Magmi 0.7.22'. The vulnerability exists due to insufficient filtration of user-supplied data (prefix) passed to the 'magmi-git-master/magmi/web/ajax_gettime.php' URL.
|
||||
tags: cve,cve2017,magmi,xss
|
||||
|
||||
# Issues:-https://github.com/dweeves/magmi-git/issues/522
|
||||
reference: https://github.com/dweeves/magmi-git/issues/522
|
||||
# Download:-https://github.com/dweeves/magmi-git/releases/download/0.7.22/magmi_full_0.7.22.zip
|
||||
|
||||
requests:
|
||||
|
|
|
@ -12,10 +12,10 @@ info:
|
|||
# This template works by guessing user ID.
|
||||
# MantisBT before 1.3.10, 2.2.4, and 2.3.1, that can be downloaded on reference[1].
|
||||
|
||||
# References:
|
||||
# - [1] https://sourceforge.net/projects/mantisbt/files/mantis-stable/
|
||||
# - [2] http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt
|
||||
# - [3] https://www.exploit-db.com/exploits/41890
|
||||
reference: |
|
||||
- https://sourceforge.net/projects/mantisbt/files/mantis-stable/
|
||||
- http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt
|
||||
- https://www.exploit-db.com/exploits/41890
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
Loading…
Reference in New Issue