Merge branch 'main' into princechaddha-patch-2

patch-1
Prince Chaddha 2023-05-11 14:04:17 +05:30 committed by GitHub
commit 355d9ff724
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5724 changed files with 20957 additions and 6017 deletions

View File

@ -23,7 +23,7 @@ jobs:
run: |
go env -w GO111MODULE=off
go get gopkg.in/yaml.v3
go run .github/scripts/yaml2json.go $GITHUB_WORKSPACE/cves/ cves.json
go run .github/scripts/yaml2json.go $GITHUB_WORKSPACE/http/cves/ cves.json
md5sum cves.json | cut -d' ' -f1 > cves.json-checksum.txt
- name: Commit files

View File

@ -1,15 +1,52 @@
file/keys/postman-api-key.yaml
headless/technologies/sap-spartacus.yaml
http/cves/2017/CVE-2017-17731.yaml
http/cves/2020/CVE-2020-27481.yaml
http/cves/2021/CVE-2021-27314.yaml
http/cves/2021/CVE-2021-27315.yaml
http/cves/2021/CVE-2021-27316.yaml
http/cves/2021/CVE-2021-27319.yaml
http/cves/2021/CVE-2021-27320.yaml
http/cves/2021/CVE-2021-30175.yaml
http/cves/2021/CVE-2021-44228.yaml
http/cves/2022/CVE-2022-24264.yaml
http/cves/2022/CVE-2022-24265.yaml
http/cves/2022/CVE-2022-24266.yaml
http/cves/2022/CVE-2022-24716.yaml
http/cves/2022/CVE-2022-27984.yaml
http/cves/2022/CVE-2022-27985.yaml
http/cves/2022/CVE-2022-3980.yaml
http/cves/2022/CVE-2022-42095.yaml
http/cves/2022/CVE-2022-42096.yaml
http/cves/2022/CVE-2022-4328.yaml
http/cves/2022/CVE-2022-45037.yaml
http/cves/2022/CVE-2022-45038.yaml
http/cves/2022/CVE-2022-46020.yaml
http/cves/2023/CVE-2023-1020.yaml
http/cves/2023/CVE-2023-1671.yaml
http/cves/2023/CVE-2023-20864.yaml
http/cves/2023/CVE-2023-25135.yaml
http/cves/2023/CVE-2023-26360.yaml
http/cves/2023/CVE-2023-27350.yaml
http/cves/2023/CVE-2023-27524.yaml
http/cves/2023/CVE-2023-29489.yaml
http/cves/2023/CVE-2023-29922.yaml
http/cves/2023/CVE-2023-30210.yaml
http/cves/2023/CVE-2023-30212.yaml
http/cves/2023/CVE-2023-31059.yaml
http/cves/2023/CVE-2023-32235.yaml
http/default-logins/powerjob-default-login.yaml
http/default-logins/umami/umami-default-login.yaml
http/exposed-panels/oracle-opera-login.yaml
http/exposed-panels/papercut-ng-panel.yaml
http/exposed-panels/proxmox-panel.yaml
http/exposed-panels/red-lion-panel.yaml
http/exposed-panels/sophos-web-appliance.yaml
http/exposures/tokens/postman/postman-key.yaml
http/misconfiguration/apache/apache-zeppelin-unauth.yaml
http/osint/mail-archive.yaml
http/technologies/wordpress/plugins/gdpr-cookie-compliance.yaml
http/vulnerabilities/apache/apache-druid-kafka-connect-rce.yaml
http/vulnerabilities/wordpress/advanced-booking-calendar-sqli.yaml
http/vulnerabilities/wordpress/wp-autosuggest-sql-injection.yaml
http/vulnerabilities/wordpress/wpml-xss.yaml

1745
cves.json

File diff suppressed because it is too large Load Diff

View File

@ -1 +1 @@
d41d8cd98f00b204e9800998ecf8427e
007505eab9adec1b628522c2675730ee

View File

@ -14,6 +14,8 @@ info:
cvss-score: 7.2
cwe-id: CWE-404
tags: dns,takeover,azure
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,caa
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -11,6 +11,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,cname
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,service
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -13,6 +13,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,takeover
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -14,6 +14,8 @@ info:
cvss-score: 0.0
cwe-id: CWE-200
tags: dns,dmarc
metadata:
max-request: 1
dns:
- name: "_dmarc.{{FQDN}}"

View File

@ -8,6 +8,8 @@ info:
classification:
cwe-id: CWE-200
tags: tech,waf,dns
metadata:
max-request: 2
dns:
- name: "{{FQDN}}"

View File

@ -11,6 +11,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,dnssec
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,ec2,aws
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -15,6 +15,7 @@ info:
cvss-score: 7.2
cwe-id: CWE-404
metadata:
max-request: 1
comments: |
Only CNAMEs with region specification are hijackable.
You need to claim the CNAME in AWS portal (https://aws.amazon.com/) or via AWS CLI to confirm the takeover.

View File

@ -11,6 +11,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,mx
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -8,6 +8,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,service
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -8,6 +8,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,ns
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -8,6 +8,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,ptr
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -9,6 +9,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,takeover
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,spf
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,txt
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -10,6 +10,8 @@ info:
classification:
cwe-id: CWE-200
tags: dns,service
metadata:
max-request: 1
dns:
- name: "{{FQDN}}"

View File

@ -0,0 +1,22 @@
id: postman-api-key
info:
name: Postman API Key
author: DhiyaneshDK
severity: info
reference:
- https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/rules/postman.yml
- https://learning.postman.com/docs/developer/intro-api/
metadata:
verified: "true"
tags: postman,keys,file,token
file:
- extensions:
- all
extractors:
- type: regex
part: body
regex:
- '\b(PMAK-[a-zA-Z0-9]{24}-[a-zA-Z0-9]{34})\b'

View File

@ -0,0 +1,32 @@
id: sap-spartacus
info:
name: SAP Spartacus detect
author: TechbrunchFR
severity: info
description: Spartacus is a lean, Angular-based JavaScript storefront for SAP Commerce Cloud that communicates exclusively through the Commerce REST API.
reference:
- https://github.com/SAP/spartacus
metadata:
verified: true
tags: tech,sap,hybris,angular,spartacus,headless
headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"
- action: waitload
matchers-condition: and
matchers:
- part: body
type: word
words:
- "<cx-storefront"
- part: body
type: word
words:
- "ng-version="

View File

@ -1 +1 @@
6.1.4
6.1.6

View File

@ -1 +1 @@
7.73
7.74

View File

@ -1 +1 @@
3.27.1
3.27.2

View File

@ -1 +1 @@
6.4.3
6.4.4

View File

@ -1 +1 @@
4.5.1
4.5.2

View File

@ -1 +1 @@
1.5.3.1
1.5.4

View File

@ -1 +1 @@
3.12.2
3.13.1

View File

@ -1 +1 @@
2.8.7
2.8.8

View File

@ -1 +1 @@
3.0.19
3.0.23

View File

@ -1 +1 @@
6.2.3
6.3

View File

@ -0,0 +1 @@
4.12.2

View File

@ -1 +1 @@
2.4.3
2.4.5

View File

@ -1 +1 @@
15.6.2
15.7.1

View File

@ -1 +1 @@
2.0.10
2.0.11

View File

@ -1 +1 @@
12.0
12.1

View File

@ -1 +1 @@
3.0.36
3.0.37

View File

@ -1 +1 @@
2.25.15
2.25.16

View File

@ -1 +1 @@
1.7.0
1.7.1

View File

@ -1 +1 @@
4.9.3
4.9.4

View File

@ -1 +1 @@
4.13.0
4.15.0

View File

@ -1 +1 @@
4.4.1
4.4.1.1

View File

@ -1 +1 @@
3.2.1
3.2.2

View File

@ -1 +1 @@
3.30.0
3.30.1

View File

@ -1 +1 @@
3.1.7
3.1.8

View File

@ -1 +1 @@
3.35
3.36

View File

@ -1 +1 @@
1.6.1
1.6.2

View File

@ -1 +1 @@
2.4.9
2.5.1

View File

@ -1 +1 @@
4.9.54
4.9.55

View File

@ -1 +1 @@
6.2.4
6.2.5

View File

@ -1 +1 @@
1.0.112
1.0.114

View File

@ -1 +1 @@
1.4.3
1.4.5

View File

@ -1 +1 @@
5.2.1
5.2.2

View File

@ -1 +1 @@
2.21.1
2.22.1

View File

@ -1 +1 @@
1.49.1
1.49.2

View File

@ -1 +1 @@
6.0.12
6.0.13

View File

@ -1 +1 @@
2.5.1
2.5.2

View File

@ -1 +1 @@
2.3.1
2.3.2

View File

@ -1 +1 @@
1.6
1.6.1

View File

@ -1 +1 @@
7.3.0
7.4.0

View File

@ -1 +1 @@
5.8.0
5.8.1

View File

@ -1 +1 @@
7.6.1
7.7.0

View File

@ -1 +1 @@
20.6
20.7

View File

@ -1 +1 @@
7.1.8
7.1.9

View File

@ -1 +1 @@
3.2.14
3.2.15

View File

@ -1 +1 @@
2.94.0
2.94.1

View File

@ -1 +1 @@
14.0.2
14.1

View File

@ -1 +1 @@
4.10.1
4.10.2

View File

@ -1 +1 @@
2.25.0
2.26.0

View File

@ -10,6 +10,7 @@ info:
- https://gitee.com/cute-guy/Penetration_Testing_POC/blob/master/%E6%B3%9B%E5%BE%AEe-mobile%20ognl%E6%B3%A8%E5%85%A5.md
- https://reconshell.com/vulnerability-research-list/
metadata:
max-request: 2
verified: true
fofa-query: app="泛微-eMobile"
tags: cnvd,cnvd2017,emobile,ognl,fanwei

View File

@ -12,6 +12,8 @@ info:
cvss-score: 8.6
cwe-id: CWE-22
tags: metinfo,cnvd,cvnd2018,lfi
metadata:
max-request: 1
http:
- method: GET

View File

@ -13,6 +13,8 @@ info:
cwe-id: CWE-284
remediation: Upgrade to the latest version of Xiuno BBS or switch to a supported product.
tags: xiuno,cnvd,cnvd2019
metadata:
max-request: 1
http:
- method: GET

View File

@ -14,6 +14,8 @@ info:
cwe-id: CWE-77
remediation: Upgrade to CatfishCMS version 4.8.54 or later.
tags: rce,cnvd,catfishcms,cnvd2019
metadata:
max-request: 1
http:
- method: GET

View File

@ -13,6 +13,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: zhiyuan,cnvd,cnvd2019,rce
metadata:
max-request: 2
http:
- raw:

View File

@ -12,6 +12,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: fanwei,cnvd,cnvd2019,rce
metadata:
max-request: 1
http:
- raw:

View File

@ -12,6 +12,8 @@ info:
cvss-score: 7.5
cwe-id: CWE-22
tags: xunchi,lfi,cnvd,cnvd2020
metadata:
max-request: 1
http:
- method: GET

View File

@ -15,6 +15,7 @@ info:
cvss-score: 9.9
cwe-id: CWE-434
metadata:
max-request: 2
verified: true
fofa-query: app="ShowDoc"
tags: cnvd,cnvd2020,showdoc,fileupload

View File

@ -14,6 +14,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: cnvd,cnvd2020,sangfor,rce
metadata:
max-request: 1
http:
- method: GET

View File

@ -9,6 +9,8 @@ info:
- https://www.cnvd.org.cn/flaw/show/CNVD-2020-56167
- https://securityforeveryone.com/tools/ruijie-smartweb-default-password-scanner
tags: ruijie,default-login,cnvd,cnvd2020
metadata:
max-request: 1
http:
- method: POST

View File

@ -8,6 +8,8 @@ info:
reference:
- https://blog.csdn.net/m0_46257936/article/details/113150699
tags: lfi,cnvd,cnvd2020,seeyon
metadata:
max-request: 1
http:
- method: GET

View File

@ -12,6 +12,7 @@ info:
cvss-score: 5.3
cwe-id: CWE-425
metadata:
max-request: 2
verified: true
shodan-query: http.title:"H5S CONSOLE"
tags: cnvd,cnvd2020,h5s,unauth,h5sconsole

View File

@ -12,6 +12,8 @@ info:
cvss-score: 8.6
cwe-id: CWE-22
tags: weiphp,lfi,cnvd,cnvd2020
metadata:
max-request: 3
http:
- raw:

View File

@ -12,6 +12,8 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-22
metadata:
max-request: 2
http:
- method: GET

View File

@ -14,6 +14,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: ruijie,cnvd,cnvd2021,rce
metadata:
max-request: 1
http:
- raw:

View File

@ -12,6 +12,8 @@ info:
cvss-score: 7.5
cwe-id: CWE-200
tags: config,exposure,cnvd,cnvd2021
metadata:
max-request: 1
http:
- method: GET

View File

@ -12,6 +12,7 @@ info:
cvss-score: 8.3
cwe-id: CWE-522
metadata:
max-request: 1
fofa-query: title="RG-UAC登录页面"
tags: ruijie,cnvd,cnvd2021,disclosure

View File

@ -7,6 +7,7 @@ info:
reference:
- https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
metadata:
max-request: 1
verified: true
shodan-query: title:"ShopXO企业级B2C电商系统提供商"
fofa-query: app="ShopXO企业级B2C电商系统提供商"

View File

@ -14,6 +14,8 @@ info:
cvss-score: 7.2
cwe-id: CWE-79
tags: empirecms,cnvd,cnvd2021,xss,domxss
metadata:
max-request: 1
http:
- method: GET

View File

@ -12,6 +12,8 @@ info:
cvss-score: 8.3
cwe-id: CWE-522
tags: ruijie,disclosure,cnvd,cnvd2021
metadata:
max-request: 1
http:
- method: GET

View File

@ -13,6 +13,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: eyoumail,rce,cnvd,cnvd2021
metadata:
max-request: 1
http:
- raw:

View File

@ -9,6 +9,7 @@ info:
- https://www.aisoutu.com/a/1432457
- https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
metadata:
max-request: 2
fofa-query: app="Landray OA system"
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

View File

@ -14,6 +14,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: cnvd,cnvd2021,beanshell,rce,yonyou
metadata:
max-request: 2
http:
- raw:

View File

@ -14,6 +14,8 @@ info:
cwe-id: CWE-434
remediation: Pan Wei has released an update to resolve this vulnerability.
tags: pan,micro,cnvd,cnvd2021,fileupload,intrusive
metadata:
max-request: 2
http:
- raw:

View File

@ -15,6 +15,8 @@ info:
cvss-score: 10.0
cwe-id: CWE-77
tags: cnvd,cnvd2020,sunflower,rce
metadata:
max-request: 2
http:
- raw:

View File

@ -14,6 +14,7 @@ info:
cvss-score: 10.0
cwe-id: CWE-89
metadata:
max-request: 1
verified: true
shodan-query: http.title:"zentao"
fofa-query: "Zentao"

View File

@ -15,6 +15,8 @@ info:
cvss-score: 5.0
remediation: Upgrade to the latest version.
tags: cve,cve2000,frontpage,microsoft,edb
metadata:
max-request: 1
http:
- method: GET

Some files were not shown because too many files have changed in this diff Show More