Update Nuclei Detection Templates for National Vulnerability Database Correlation (#7490)

* Update Confluence Version

* Added Application Category

* Updated Grafana Template

* Updated WordPress Template

* Update grafana-detect.yaml

* Update jenkins-detect.yaml

* Update Jira Detection Template

* Update Tomcat Template

* Update Atlassian Crowd Template

* misc update

* workflow fix

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
patch-1
Adam Crosser 2023-06-24 17:25:54 -05:00 committed by GitHub
parent 1d2c8776a8
commit 1b47ea7c3f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 48 additions and 16 deletions

View File

@ -2,7 +2,7 @@ id: atlassian-crowd-panel
info: info:
name: Atlassian Crowd Login Panel name: Atlassian Crowd Login Panel
author: organiccrap author: organiccrap,AdamCrosser
severity: info severity: info
description: An Atlassian Crowd login panel was discovered. description: An Atlassian Crowd login panel was discovered.
reference: reference:
@ -12,6 +12,9 @@ info:
tags: panel,atlassian tags: panel,atlassian
metadata: metadata:
max-request: 1 max-request: 1
vendor: atlassian
product: crowd
category: sso
http: http:
- method: GET - method: GET
@ -24,4 +27,10 @@ http:
- <title>Atlassian Crowd - Login</title> - <title>Atlassian Crowd - Login</title>
part: body part: body
# Enhanced by mp on 2022/03/20 extractors:
- type: regex
name: version
group: 1
regex:
- 'value="Version:&nbsp;([\d.]+)'
part: body

View File

@ -2,7 +2,7 @@ id: grafana-detect
info: info:
name: Grafana Login Panel - Detect name: Grafana Login Panel - Detect
author: organiccrap author: organiccrap,AdamCrosser
severity: info severity: info
description: Grafana login panel was detected. description: Grafana login panel was detected.
classification: classification:
@ -12,22 +12,30 @@ info:
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: title:"Grafana" shodan-query: title:"Grafana"
tags: panel,grafana vendor: grafana
product: grafana
category: devops
tags: panel,grafana,detect
http: http:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/login" - "{{BaseURL}}/login"
matchers: matchers:
- type: word - type: word
part: body
words: words:
- "<title>Grafana</title>" - "<title>Grafana</title>"
part: body
extractors: extractors:
- type: regex - type: regex
name: version
part: body part: body
group: 1 group: 1
regex: regex:
- '\"version\"\:\"([0-9.]+)\"}' - '\"version\"\:\"([0-9.]+)\"}'
# Enhanced by md on 2022/11/16 - type: kval
kval:
- version

View File

@ -2,12 +2,14 @@ id: tomcat-detect
info: info:
name: Tomcat Detection name: Tomcat Detection
author: philippedelteil,dhiyaneshDk author: philippedelteil,dhiyaneshDk,AdamCrosser
severity: info severity: info
description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version. description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version.
metadata: metadata:
max-request: 3 max-request: 3
shodan-query: title:"Apache Tomcat" shodan-query: title:"Apache Tomcat"
vendor: apache
product: tomcat
tags: tech,tomcat,apache tags: tech,tomcat,apache
http: http:
@ -33,6 +35,7 @@ http:
extractors: extractors:
- type: regex - type: regex
name: version
group: 1 group: 1
regex: regex:
- '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)' - '(?i)Apache Tomcat.*([0-9]\.[0-9]+\.[0-9]+)'

View File

@ -2,7 +2,7 @@ id: jenkins-detect
info: info:
name: Jenkins Detection name: Jenkins Detection
author: philippdelteil,daffainfo,c-sh0 author: philippdelteil,daffainfo,c-sh0,AdamCrosser
severity: info severity: info
reference: reference:
- https://www.jenkins.io/doc/book/using/remote-access-api/#RemoteaccessAPI-DetectingJenkinsversion - https://www.jenkins.io/doc/book/using/remote-access-api/#RemoteaccessAPI-DetectingJenkinsversion
@ -11,7 +11,10 @@ info:
metadata: metadata:
max-request: 2 max-request: 2
shodan-query: http.favicon.hash:81586312 shodan-query: http.favicon.hash:81586312
tags: tech,jenkins vendor: jenkins
product: jenkins
category: devops
tags: tech,jenkins,detect
http: http:
- method: GET - method: GET
@ -36,5 +39,10 @@ http:
extractors: extractors:
- type: kval - type: kval
name: version
kval: kval:
- x_jenkins - x_jenkins
- type: kval
kval:
- version

View File

@ -1,17 +1,20 @@
id: jira-detect id: jira-detect
info: info:
name: Jira Login Panel - Detect name: Jira Detect
author: pdteam,philippedelteil author: pdteam,philippedelteil,AdamCrosser
severity: info severity: info
description: Jira login panel was detected. description: Jira login panel was detected.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0 cvss-score: 0.0
cwe-id: CWE-200 cwe-id: CWE-200
tags: panel,jira tags: tech,panel,jira,atlassian
metadata: metadata:
max-request: 3 max-request: 3
vendor: atlassian
product: jira
category: productivity
http: http:
- method: GET - method: GET
@ -34,5 +37,3 @@ http:
group: 1 group: 1
regex: regex:
- 'title="JiraVersion" value="([0-9.]+)' - 'title="JiraVersion" value="([0-9.]+)'
# Enhanced by md on 2022/11/21

View File

@ -2,12 +2,15 @@ id: wordpress-detect
info: info:
name: WordPress Detect name: WordPress Detect
author: pdteam,daffainfo,ricardomaia,topscoder author: pdteam,daffainfo,ricardomaia,topscoder,AdamCrosser
severity: info severity: info
metadata: metadata:
max-request: 4 max-request: 4
verified: true verified: true
shodan-query: http.component:"WordPress" shodan-query: http.component:"WordPress"
vendor: wordpress
product: wordpress
category: cms
tags: tech,wordpress,cms,wp tags: tech,wordpress,cms,wp
http: http:

View File

@ -6,6 +6,6 @@ info:
description: A simple workflow that runs all Jira related nuclei templates on a given target. description: A simple workflow that runs all Jira related nuclei templates on a given target.
workflows: workflows:
- template: http/exposed-panels/jira-detect.yaml - template: http/technologies/jira-detect.yaml
subtemplates: subtemplates:
- tags: jira - tags: jira