From 1a14ff8c44716bac964ed39a4414b120a8034cc9 Mon Sep 17 00:00:00 2001 From: PD-Team <8293321+bauthard@users.noreply.github.com> Date: Tue, 19 Jan 2021 12:33:48 +0530 Subject: [PATCH] syntax update --- technologies/tech-detect.yaml | 5 ++--- vulnerabilities/thinkphp/thinkphp-2-rce.yaml | 3 +-- vulnerabilities/thinkphp/thinkphp-5022-rce.yaml | 3 +-- vulnerabilities/thinkphp/thinkphp-5023-rce.yaml | 3 +-- .../thinkphp/thinkphp-509-information-disclosure.yaml | 5 ++--- 5 files changed, 7 insertions(+), 12 deletions(-) diff --git a/technologies/tech-detect.yaml b/technologies/tech-detect.yaml index 626619380e..dcab4a8bff 100644 --- a/technologies/tech-detect.yaml +++ b/technologies/tech-detect.yaml @@ -2747,10 +2747,9 @@ requests: part: header words: - 'Server: monit' - + - type: word name: thinkphp words: - "ThinkPHP" - part: header - + part: header \ No newline at end of file diff --git a/vulnerabilities/thinkphp/thinkphp-2-rce.yaml b/vulnerabilities/thinkphp/thinkphp-2-rce.yaml index afa7ffce70..fed9db9cbf 100755 --- a/vulnerabilities/thinkphp/thinkphp-2-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-2-rce.yaml @@ -5,8 +5,7 @@ info: author: dr_set severity: critical description: ThinkPHP 2.x version and 3.0 in Lite mode Remote Code Execution. - - # reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/2-rce + reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/2-rce requests: - method: GET diff --git a/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml b/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml index a3b53096d2..3fde3a1ce7 100755 --- a/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-5022-rce.yaml @@ -5,8 +5,7 @@ info: author: dr_set severity: critical description: Thinkphp5 5.0.22/5.1.29 Remote Code Execution if the website doesn't have mandatory routing enabled (which is default). - - # reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/5-rce + reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/5-rce requests: - method: GET diff --git a/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml b/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml index d1a545672e..775c09b546 100755 --- a/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml +++ b/vulnerabilities/thinkphp/thinkphp-5023-rce.yaml @@ -5,8 +5,7 @@ info: author: dr_set severity: critical description: Thinkphp5 5.0(<5.0.24) Remote Code Execution. - - # reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/5.0.23-rce + reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/5.0.23-rce requests: - method: POST diff --git a/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml b/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml index 82ed0747f9..bb06b729d1 100755 --- a/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml +++ b/vulnerabilities/thinkphp/thinkphp-509-information-disclosure.yaml @@ -5,9 +5,8 @@ info: author: dr_set severity: critical description: Verbose SQL error message reveals sensitive information including database credentials. - - # reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection - + reference: https://github.com/vulhub/vulhub/tree/0a0bc719f9a9ad5b27854e92bc4dfa17deea25b4/thinkphp/in-sqlinjection + requests: - method: GET path: