diff --git a/.new-additions b/.new-additions
index 52198e50d3..4949982198 100644
--- a/.new-additions
+++ b/.new-additions
@@ -22,3 +22,4 @@ vulnerabilities/other/royalevent/royalevent-management-xss.yaml
vulnerabilities/other/royalevent/royalevent-stored-xss.yaml
vulnerabilities/wordpress/new-user-approve-xss.yaml
vulnerabilities/wordpress/sym404.yaml
+vulnerabilities/wordpress/wpify-woo-czech-xss.yaml
diff --git a/cves/2021/CVE-2021-22054.yaml b/cves/2021/CVE-2021-22054.yaml
index 36a8f127db..4b06bbfe67 100644
--- a/cves/2021/CVE-2021-22054.yaml
+++ b/cves/2021/CVE-2021-22054.yaml
@@ -28,10 +28,10 @@ requests:
- type: word
words:
- - "
Interactsh Server
"
+ - "Interactsh Server"
- type: status
status:
- 200
-# Enhanced by mp on 2022/06/27
+# Enhanced by mp on 2022/06/27
\ No newline at end of file
diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml
index afd1efd5cb..9d125a94f8 100644
--- a/cves/2021/CVE-2021-22873.yaml
+++ b/cves/2021/CVE-2021-22873.yaml
@@ -15,7 +15,10 @@ info:
cvss-score: 6.1
cve-id: CVE-2021-22873
cwe-id: CWE-601
- tags: cve,cve2021,redirect
+ metadata:
+ shodan-query: http.favicon.hash:106844876
+ verified: "true"
+ tags: cve,cve2021,redirect,revive
requests:
- method: GET
@@ -30,12 +33,8 @@ requests:
stop-at-first-match: true
redirects: true
max-redirects: 2
- matchers-condition: and
matchers:
- - type: status
- status:
- - 200
- - type: word
- words:
- - " Interactsh Server
"
- part: body
+ - type: regex
+ part: header
+ regex:
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2021/CVE-2021-27748.yaml b/cves/2021/CVE-2021-27748.yaml
index 1a23744d9e..32df97fa56 100644
--- a/cves/2021/CVE-2021-27748.yaml
+++ b/cves/2021/CVE-2021-27748.yaml
@@ -12,6 +12,9 @@ info:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748
classification:
cve-id: CVE-2021-27748
+ metadata:
+ verified: true
+ shodan-query: http.html:"IBM WebSphere Portal"
tags: cve,cve2021,hcl,ibm,ssrf,websphere
requests:
@@ -28,9 +31,8 @@ requests:
- type: word
words:
- - " Interactsh Server
"
+ - "Interactsh Server"
- type: status
status:
- - 200
-# Enhanced by mp on 2022/06/27
+ - 200
\ No newline at end of file
diff --git a/file/keys/private-key.yaml b/file/keys/private-key.yaml
index 3e779effd4..d1f6cd83f5 100644
--- a/file/keys/private-key.yaml
+++ b/file/keys/private-key.yaml
@@ -13,12 +13,12 @@ file:
extractors:
- type: regex
regex:
- - "\"BEGIN OPENSSH PRIVATE KEY\""
- - "\"BEGIN PRIVATE KEY\""
- - "\"BEGIN RSA PRIVATE KEY\""
- - "\"BEGIN DSA PRIVATE KEY\""
- - "\"BEGIN EC PRIVATE KEY\""
- - "\"BEGIN PGP PRIVATE KEY BLOCK\""
- - "\"ssh-rsa\""
- - "\"ssh-dsa\""
- - "\"ssh-ed25519\""
+ - "BEGIN OPENSSH PRIVATE KEY"
+ - "BEGIN PRIVATE KEY"
+ - "BEGIN RSA PRIVATE KEY"
+ - "BEGIN DSA PRIVATE KEY"
+ - "BEGIN EC PRIVATE KEY"
+ - "BEGIN PGP PRIVATE KEY BLOCK"
+ - "ssh-rsa"
+ - "ssh-dsa"
+ - "ssh-ed25519"
diff --git a/technologies/interactsh-server.yaml b/technologies/interactsh-server.yaml
index 85ecba7080..b1211c9822 100644
--- a/technologies/interactsh-server.yaml
+++ b/technologies/interactsh-server.yaml
@@ -4,6 +4,9 @@ info:
name: Interactsh Server
author: pdteam
severity: info
+ metadata:
+ verified: true
+ shodan-query: http.html:"Interactsh Server"
tags: tech,interactsh
requests:
@@ -11,14 +14,19 @@ requests:
path:
- "{{BaseURL}}"
+ matchers-condition: and
matchers:
- type: word
words:
- - " Interactsh Server
"
+ - "Interactsh Server"
+
+ - type: status
+ status:
+ - 200
extractors:
- type: regex
group: 1
regex:
- '(.*)<\/b> server'
- - 'from (.*)<\/b>'
\ No newline at end of file
+ - 'from (.*)<\/b>'
diff --git a/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml b/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml
new file mode 100644
index 0000000000..404a977143
--- /dev/null
+++ b/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml
@@ -0,0 +1,35 @@
+id: wpify-woo-czech-xss
+
+info:
+ name: WPify Woo Czech < 3.5.7 - Reflected Cross-Site Scripting (XSS)
+ author: Akincibor
+ severity: medium
+ description: The plugin uses the Vies library v2.2.0, which has a sample file outputting $_SERVER['PHP_SELF'] in an attribute without being escaped first, leading to a Reflected Cross-Site Scripting. The issue is only exploitable when the web server has the PDO driver installed, and write access to the example directory (otherwise an exception will be raised before the payload is output)..
+ reference:
+ - https://wpscan.com/vulnerability/5c66c32b-22f2-4b59-a6b2-b8da944cdc3c
+ metadata:
+ verified: true
+ tags: wp,wordpress,xss,wp-plugin,wpify
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/wpify-woo/deps/dragonbe/vies/examples/async_processing/queue.php/">'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - '">'
+ - 'Add a new VAT ID to the queue'
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200