Dashboard Content Enhancements (#4111)

Dashboard Content Enhancements
patch-1
MostInterestingBotInTheWorld 2022-04-11 10:42:35 -04:00 committed by GitHub
parent 6bf96047ca
commit 45174dee16
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
16 changed files with 113 additions and 41 deletions

View File

@ -1,17 +1,19 @@
id: CVE-2018-1000533 id: CVE-2018-1000533
info: info:
name: GitList < 0.6.0 RCE name: GitList < 0.6.0 Remote Code Execution
author: pikpikcu author: pikpikcu
severity: critical severity: critical
description: klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. description: "klaussilveira GitList version <= 0.6 contains a passing incorrectly sanitized input via the `searchTree` function that can result in remote code execution."
reference: https://github.com/vulhub/vulhub/tree/master/gitlist/CVE-2018-1000533 reference:
tags: rce,git,cve,cve2018,gitlist - https://github.com/vulhub/vulhub/tree/master/gitlist/CVE-2018-1000533
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000533
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2018-1000533 cve-id: CVE-2018-1000533
cwe-id: CWE-20 cwe-id: CWE-20
tags: rce,git,cve,cve2018,gitlist
requests: requests:
- raw: - raw:
@ -40,3 +42,5 @@ requests:
words: words:
- "root:/root:/bin/bash" - "root:/root:/bin/bash"
part: body part: body
# Enhanced by mp on 2022/04/08

View File

@ -1,11 +1,10 @@
id: CVE-2018-18069 id: CVE-2018-18069
info: info:
name: Wordpress unauthenticated stored xss name: WordPress sitepress-multilingual-cms 3.6.3 - Cross-Site Scripting
author: nadino author: nadino
severity: medium severity: medium
description: process_forms in the WPML (aka sitepress-multilingual-cms) plugin through 3.6.3 for WordPress has XSS via any locale_file_name_ parameter (such as locale_file_name_en) in an authenticated theme-localization.php request to wp-admin/admin.php. description: "WordPress plugin sitepress-multilingual-cms 3.6.3 is vulnerable to cross-site scripting in process_forms via any locale_file_name_ parameter (such as locale_file_name_en) in an authenticated theme-localization.php request to wp-admin/admin.php."
tags: cve,cve2018,wordpress,xss,plugin
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10 cvss-score: 6.10
@ -13,6 +12,8 @@ info:
cwe-id: CWE-79 cwe-id: CWE-79
reference: reference:
- https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/ - https://0x62626262.wordpress.com/2018/10/08/sitepress-multilingual-cms-plugin-unauthenticated-stored-xss/
- https://nvd.nist.gov/vuln/detail/CVE-2018-18069
tags: cve,cve2018,wordpress,xss,plugin
requests: requests:
- method: POST - method: POST
@ -25,3 +26,5 @@ requests:
- type: dsl - type: dsl
dsl: dsl:
- 'contains(tolower(all_headers), "text/html") && contains(set_cookie, "_icl_current_admin_language") && contains(body, "\"><script>alert(0);</script>")' - 'contains(tolower(all_headers), "text/html") && contains(set_cookie, "_icl_current_admin_language") && contains(body, "\"><script>alert(0);</script>")'
# Enhanced by mp on 2022/04/08

View File

@ -1,18 +1,20 @@
id: CVE-2020-10546 id: CVE-2020-10546
info: info:
name: rConfig 3.9.4 SQLi name: rConfig 3.9.4 SQL Injection
author: madrobot author: madrobot
severity: critical severity: critical
description: rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. description: "rConfig 3.9.4 and previous versions have unauthenticated compliancepolicies.inc.php SQL injection. Because nodes' passwords are stored in cleartext by default, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices."
reference: reference:
- https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py - https://github.com/theguly/exploits/blob/master/CVE-2020-10546.py
- https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/
tags: cve,cve2020,rconfig,sqli - https://nvd.nist.gov/vuln/detail/CVE-2020-10546
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2020-10546 cve-id: CVE-2020-10546
cwe-id: CWE-89,CWE-522 cwe-id: CWE-89,CWE-522
tags: cve,cve2020,rconfig,sqli
requests: requests:
- method: GET - method: GET
@ -27,3 +29,5 @@ requests:
words: words:
- "[project-discovery]" - "[project-discovery]"
part: body part: body
# Enhanced by mp on 2022/04/07

View File

@ -1,18 +1,19 @@
id: CVE-2020-10547 id: CVE-2020-10547
info: info:
name: rConfig 3.9.4 SQLi name: rConfig 3.9.4 SQL Injection
author: madrobot author: madrobot
severity: critical severity: critical
description: rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. description: "rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because nodes' passwords are stored by default in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices."
reference: reference:
https://github.com/theguly/exploits/blob/master/CVE-2020-10547.py https://github.com/theguly/exploits/blob/master/CVE-2020-10547.py
https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/
tags: cve,cve2020,rconfig,sqli
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2020-10547 cve-id: CVE-2020-10547
cwe-id: CWE-89,CWE-522 cwe-id: CWE-89,CWE-522
tags: cve,cve2020,rconfig,sqli
requests: requests:
- method: GET - method: GET
@ -27,3 +28,5 @@ requests:
words: words:
- "[project-discovery]" - "[project-discovery]"
part: body part: body
# Enhanced by mp on 2022/04/07

View File

@ -1,18 +1,20 @@
id: CVE-2020-10548 id: CVE-2020-10548
info: info:
name: rConfig 3.9.4 SQLi name: rConfig 3.9.4 - SQL Injection
author: madrobot author: madrobot
severity: critical severity: critical
description: rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices. description: "rConfig 3.9.4 and previous versions have unauthenticated devices.inc.php SQL injection. Because nodes' passwords are stored in cleartext by default, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices."
reference: reference:
- https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py - https://github.com/theguly/exploits/blob/master/CVE-2020-10548.py
- https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/ - https://theguly.github.io/2020/09/rconfig-3.9.4-multiple-vulnerabilities/
tags: cve,cve2020,rconfig,sqli - https://nvd.nist.gov/vuln/detail/CVE-2020-10548
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2020-10548 cve-id: CVE-2020-10548
cwe-id: CWE-89,CWE-522 cwe-id: CWE-89,CWE-522
tags: cve,cve2020,rconfig,sqli
requests: requests:
- method: GET - method: GET
@ -27,3 +29,5 @@ requests:
words: words:
- "[project-discovery]" - "[project-discovery]"
part: body part: body
# Enhanced by mp on 2022/04/07

View File

@ -9,14 +9,12 @@ info:
reference: reference:
- https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/
- https://nvd.nist.gov/vuln/detail/CVE-2020-24312 - https://nvd.nist.gov/vuln/detail/CVE-2020-24312
tags: cve,cve2020,wordpress,backups,plugin
# Note: Manually check content
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.50 cvss-score: 7.50
cve-id: CVE-2020-24312 cve-id: CVE-2020-24312
cwe-id: CWE-552 cwe-id: CWE-552
tags: cve,cve2020,wordpress,backups,plugin
requests: requests:
- method: GET - method: GET
@ -35,3 +33,5 @@ requests:
- 'wp-content/uploads/wp-file-manager-pro/fm_backup' - 'wp-content/uploads/wp-file-manager-pro/fm_backup'
- 'backup_' - 'backup_'
condition: and condition: and
# Enhanced by mp on 2022/04/08

View File

@ -1,19 +1,21 @@
id: CVE-2020-35848 id: CVE-2020-35848
info: info:
name: Cockpit prior to 0.12.0 NoSQL injection in /auth/newpassword name: Cockpit <0.12.0 NoSQL Injection
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
description: | description: |
newpassword method of the Auth controller, newpassword method of the Auth controller,
which is responsible for displaying the user password reset form. which is responsible for displaying the user password reset form.
reference: https://swarm.ptsecurity.com/rce-cockpit-cms/ reference:
tags: cve,cve2020,nosqli,sqli,cockpit,injection - https://swarm.ptsecurity.com/rce-cockpit-cms/
- https://nvd.nist.gov/vuln/detail/CVE-2020-35848
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2020-35848 cve-id: CVE-2020-35848
cwe-id: CWE-89 cwe-id: CWE-89
tags: cve,cve2020,nosqli,sqli,cockpit,injection
requests: requests:
- method: POST - method: POST
@ -33,3 +35,5 @@ requests:
part: body part: body
regex: regex:
- 'string\([0-9]{1,3}\)(\s)?"rp-([a-f0-9-]+)"' - 'string\([0-9]{1,3}\)(\s)?"rp-([a-f0-9-]+)"'
# Enhanced by mp on 2022/04/08

View File

@ -1,19 +1,19 @@
id: CVE-2020-6637 id: CVE-2020-6637
info: info:
name: OpenSIS v7.3 unauthenticated SQL injection name: OpenSIS v7.3 unauthenticated SQL Injection
author: pikpikcu author: pikpikcu
severity: critical severity: critical
description: openSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php. description: "OpenSIS Community Edition version 7.3 is vulnerable to SQL injection via the USERNAME parameter of index.php."
tags: cve,cve2020,sqli,opensis
reference: reference:
- https://nvd.nist.gov/vuln/detail/CVE-2020-6637
- https://cinzinga.com/CVE-2020-6637/ - https://cinzinga.com/CVE-2020-6637/
- https://nvd.nist.gov/vuln/detail/CVE-2020-6637
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2020-6637 cve-id: CVE-2020-6637
cwe-id: CWE-89 cwe-id: CWE-89
tags: cve,cve2020,sqli,opensis
requests: requests:
- method: POST - method: POST
@ -43,3 +43,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/04/08

View File

@ -1,16 +1,21 @@
id: open-virtualization-manager-panel id: open-virtualization-manager-panel
info: info:
name: Open Virtualization Userportal & Webadmin Panel name: Open Virtualization Userportal & Webadmin Panel Detection
author: idealphase author: idealphase
severity: info severity: info
description: open-source distributed virtualization solution, designed to manage your entire enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible. description: Open Virtualization Userportal & Webadmin panels were detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
metadata: metadata:
shodan-query: title:"Ovirt-Engine" shodan-query: title:"Ovirt-Engine"
google-query: intitle:"Ovirt-Engine" google-query: intitle:"Ovirt-Engine"
reference: reference:
- https://www.ovirt.org/ - https://www.ovirt.org/
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html - https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: panel,ovirt,oss tags: panel,ovirt,oss
requests: requests:
@ -36,3 +41,5 @@ requests:
group: 1 group: 1
regex: regex:
- '"application_title":"(([a-zA-Z]+\s)*[a-zA-Z]+)"' - '"application_title":"(([a-zA-Z]+\s)*[a-zA-Z]+)"'
# Enhanced by mp on 2022/04/08

View File

@ -4,8 +4,13 @@ info:
name: OpenVPN Monitor Disclosure name: OpenVPN Monitor Disclosure
author: geeknik author: geeknik
severity: high severity: high
description: openvpn-monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all current connections. description: openvpn-monitor was discovered. OpenVPN Monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all its current connections.
reference: https://openvpn-monitor.openbytes.ie/ reference: https://openvpn-monitor.openbytes.ie/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: openvpn,disclosure,panel tags: openvpn,disclosure,panel
requests: requests:
@ -33,3 +38,6 @@ requests:
part: header part: header
words: words:
- "text/html" - "text/html"
# Enhanced by mp on 2022/04/08

View File

@ -1,11 +1,16 @@
id: ioncube-loader-wizard id: ioncube-loader-wizard
info: info:
name: Ioncube Loader Wizard disclosure name: ioncube Loader Wizard Disclosure
author: Mubassirpatel author: Mubassirpatel
severity: medium severity: medium
description: ioncube-loader-wizard is vulnerable to xss,phpinfo, etc. description: An ioncube Loader Wizard was discovered.
reference: https://firefart.at/post/multiple-vulnerabilities-in-ioncube-loader-wizard/ reference: https://firefart.at/post/multiple-vulnerabilities-in-ioncube-loader-wizard/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: ioncube,disclosure,exposure tags: ioncube,disclosure,exposure
requests: requests:
@ -24,3 +29,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/04/08

View File

@ -1,10 +1,15 @@
id: joomla-manifest-file id: joomla-manifest-file
info: info:
name: Joomla manifest file disclosure name: Joomla Manifest File Disclosure
author: oppsec author: oppsec
severity: info severity: info
description: joomla.xml is a file which stores information about installed Joomla, such as version, files, and paths. description: A Joomla Manifest file was discovered. joomla.xml is a file which stores information about installed Joomla, such as version, files, and paths.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: misc,joomla tags: misc,joomla
requests: requests:
@ -28,3 +33,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/04/08

View File

@ -1,16 +1,21 @@
id: open-virtualization-manager-detect id: open-virtualization-manager-detect
info: info:
name: Open Virtualization Manager Detect name: Open Virtualization Manager Detection
author: idealphase author: idealphase
severity: info severity: info
description: open-source distributed virtualization solution, designed to manage your entire enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible. description: Open Virtualization Manager was detected. Open Virtualization Manager is an open-source distributed virtualization solution designed to manage enterprise infrastructure. oVirt uses the trusted KVM hypervisor and is built upon several other community projects, including libvirt, Gluster, PatternFly, and Ansible.
metadata: metadata:
shodan-query: title:"Ovirt-Engine" shodan-query: title:"Ovirt-Engine"
google-query: intitle:"Ovirt-Engine" google-query: intitle:"Ovirt-Engine"
reference: reference:
- https://www.ovirt.org/ - https://www.ovirt.org/
- https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html - https://www.ovirt.org/dropped/admin-guide/virt/console-client-resources.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id:
cwe-id: CWE-200
tags: tech,ovirt tags: tech,ovirt
requests: requests:
@ -33,3 +38,5 @@ requests:
group: 1 group: 1
regex: regex:
- '<span class="version-text">(.+)<\/span>' - '<span class="version-text">(.+)<\/span>'
# Enhanced by mp on 2022/04/08

View File

@ -1,10 +1,18 @@
id: chamilo-lms-xss id: chamilo-lms-xss
info: info:
name: Chamilo LMS Cross Site Scripting name: Chamilo LMS 1.11.14 Cross-Site Scripting
author: geeknik author: geeknik
severity: medium severity: high
description: https://www.netsparker.com/web-applications-advisories/ns-21-001-cross-site-scripting-in-chamilo-lms/ description: Chamilo LMS 1.11.14 is vulnerable to cross-site scripting.
reference:
- https://www.netsparker.com/web-applications-advisories/ns-21-001-cross-site-scripting-in-chamilo-lms/
- https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-45-2021-01-21-Moderate-impact-moderate-risk-XSS-vulnerability-in-agenda
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id:
cwe-id: CWE-79
tags: xss,chamilo tags: xss,chamilo
requests: requests:
@ -25,3 +33,5 @@ requests:
part: header part: header
words: words:
- "text/html" - "text/html"
# Enhanced by mp on 2022/04/08

View File

@ -4,7 +4,7 @@ info:
name: EyeLock nano NXT 3.5 - Local File Disclosure name: EyeLock nano NXT 3.5 - Local File Disclosure
author: geeknik author: geeknik
severity: high severity: high
description: nano NXT suffers from a file disclosure vulnerability when input passed through the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources. description: EyeLock nano NXT suffers from a file disclosure vulnerability when input passed through the 'path' parameter to 'logdownload.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources.
reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt reference: https://www.zeroscience.mk/codes/eyelock_lfd.txt
tags: iot,lfi,eyelock tags: iot,lfi,eyelock
@ -22,3 +22,5 @@ requests:
regex: regex:
- "root:[x*]:0:0:" - "root:[x*]:0:0:"
part: body part: body
# Enhanced by mp on 2022/04/08