diff --git a/.new-additions b/.new-additions index 52198e50d3..4949982198 100644 --- a/.new-additions +++ b/.new-additions @@ -22,3 +22,4 @@ vulnerabilities/other/royalevent/royalevent-management-xss.yaml vulnerabilities/other/royalevent/royalevent-stored-xss.yaml vulnerabilities/wordpress/new-user-approve-xss.yaml vulnerabilities/wordpress/sym404.yaml +vulnerabilities/wordpress/wpify-woo-czech-xss.yaml diff --git a/cves/2021/CVE-2021-22054.yaml b/cves/2021/CVE-2021-22054.yaml index 36a8f127db..4b06bbfe67 100644 --- a/cves/2021/CVE-2021-22054.yaml +++ b/cves/2021/CVE-2021-22054.yaml @@ -28,10 +28,10 @@ requests: - type: word words: - - "

Interactsh Server

" + - "Interactsh Server" - type: status status: - 200 -# Enhanced by mp on 2022/06/27 +# Enhanced by mp on 2022/06/27 \ No newline at end of file diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml index afd1efd5cb..9d125a94f8 100644 --- a/cves/2021/CVE-2021-22873.yaml +++ b/cves/2021/CVE-2021-22873.yaml @@ -15,7 +15,10 @@ info: cvss-score: 6.1 cve-id: CVE-2021-22873 cwe-id: CWE-601 - tags: cve,cve2021,redirect + metadata: + shodan-query: http.favicon.hash:106844876 + verified: "true" + tags: cve,cve2021,redirect,revive requests: - method: GET @@ -30,12 +33,8 @@ requests: stop-at-first-match: true redirects: true max-redirects: 2 - matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word - words: - - "

Interactsh Server

" - part: body + - type: regex + part: header + regex: + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2021/CVE-2021-27748.yaml b/cves/2021/CVE-2021-27748.yaml index 1a23744d9e..32df97fa56 100644 --- a/cves/2021/CVE-2021-27748.yaml +++ b/cves/2021/CVE-2021-27748.yaml @@ -12,6 +12,9 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27748 classification: cve-id: CVE-2021-27748 + metadata: + verified: true + shodan-query: http.html:"IBM WebSphere Portal" tags: cve,cve2021,hcl,ibm,ssrf,websphere requests: @@ -28,9 +31,8 @@ requests: - type: word words: - - "

Interactsh Server

" + - "Interactsh Server" - type: status status: - - 200 -# Enhanced by mp on 2022/06/27 + - 200 \ No newline at end of file diff --git a/file/keys/private-key.yaml b/file/keys/private-key.yaml index 3e779effd4..d1f6cd83f5 100644 --- a/file/keys/private-key.yaml +++ b/file/keys/private-key.yaml @@ -13,12 +13,12 @@ file: extractors: - type: regex regex: - - "\"BEGIN OPENSSH PRIVATE KEY\"" - - "\"BEGIN PRIVATE KEY\"" - - "\"BEGIN RSA PRIVATE KEY\"" - - "\"BEGIN DSA PRIVATE KEY\"" - - "\"BEGIN EC PRIVATE KEY\"" - - "\"BEGIN PGP PRIVATE KEY BLOCK\"" - - "\"ssh-rsa\"" - - "\"ssh-dsa\"" - - "\"ssh-ed25519\"" + - "BEGIN OPENSSH PRIVATE KEY" + - "BEGIN PRIVATE KEY" + - "BEGIN RSA PRIVATE KEY" + - "BEGIN DSA PRIVATE KEY" + - "BEGIN EC PRIVATE KEY" + - "BEGIN PGP PRIVATE KEY BLOCK" + - "ssh-rsa" + - "ssh-dsa" + - "ssh-ed25519" diff --git a/technologies/interactsh-server.yaml b/technologies/interactsh-server.yaml index 85ecba7080..b1211c9822 100644 --- a/technologies/interactsh-server.yaml +++ b/technologies/interactsh-server.yaml @@ -4,6 +4,9 @@ info: name: Interactsh Server author: pdteam severity: info + metadata: + verified: true + shodan-query: http.html:"Interactsh Server" tags: tech,interactsh requests: @@ -11,14 +14,19 @@ requests: path: - "{{BaseURL}}" + matchers-condition: and matchers: - type: word words: - - "

Interactsh Server

" + - "Interactsh Server" + + - type: status + status: + - 200 extractors: - type: regex group: 1 regex: - '(.*)<\/b> server' - - 'from (.*)<\/b>' \ No newline at end of file + - 'from (.*)<\/b>' diff --git a/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml b/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml new file mode 100644 index 0000000000..404a977143 --- /dev/null +++ b/vulnerabilities/wordpress/wpify-woo-czech-xss.yaml @@ -0,0 +1,35 @@ +id: wpify-woo-czech-xss + +info: + name: WPify Woo Czech < 3.5.7 - Reflected Cross-Site Scripting (XSS) + author: Akincibor + severity: medium + description: The plugin uses the Vies library v2.2.0, which has a sample file outputting $_SERVER['PHP_SELF'] in an attribute without being escaped first, leading to a Reflected Cross-Site Scripting. The issue is only exploitable when the web server has the PDO driver installed, and write access to the example directory (otherwise an exception will be raised before the payload is output).. + reference: + - https://wpscan.com/vulnerability/5c66c32b-22f2-4b59-a6b2-b8da944cdc3c + metadata: + verified: true + tags: wp,wordpress,xss,wp-plugin,wpify + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/wpify-woo/deps/dragonbe/vies/examples/async_processing/queue.php/">' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '">' + - 'Add a new VAT ID to the queue' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200