Rename "references" to "reference" to match the expected template info structure

Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
patch-1
forgedhallpass 2021-08-18 14:29:20 +03:00
parent a6068214ac
commit 4c920b2552
25 changed files with 25 additions and 27 deletions

View File

@ -9,7 +9,7 @@ info:
found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url. found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url.
As sudo is configured to execute /bin/tar without a password (NOPASSWD) As sudo is configured to execute /bin/tar without a password (NOPASSWD)
it is possible to run root commands using the "checkpoint" tar options. it is possible to run root commands using the "checkpoint" tar options.
references: | reference: |
- https://www.tarlogic.com/advisories/zeroshell-rce-root.txt - https://www.tarlogic.com/advisories/zeroshell-rce-root.txt
- https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py
tags: cve,cve2019,rce tags: cve,cve2019,rce

View File

@ -11,8 +11,7 @@ info:
before 2.2.5 for WordPress allows unauthenticated options import, before 2.2.5 for WordPress allows unauthenticated options import,
as demonstrated by storing an XSS payload for remote code execution. as demonstrated by storing an XSS payload for remote code execution.
Source/References: reference: https://github.com/GeneralEG/CVE-2019-15858
- https://github.com/GeneralEG/CVE-2019-15858
tags: cve,cve2019,wordpress,wp-plugin,xss tags: cve,cve2019,wordpress,wp-plugin,xss
requests: requests:

View File

@ -5,7 +5,7 @@ info:
author: dwisiswant0 author: dwisiswant0
severity: medium severity: medium
description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field). description: A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).
references: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b reference: https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b
tags: cve,cve2019,wordpress,wp-plugin,xss tags: cve,cve2019,wordpress,wp-plugin,xss
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: critical severity: critical
description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php. description: Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.
tags: cve,cve2020 tags: cve,cve2020
references: https://blog.max0x4141.com/post/artica_proxy/ reference: https://blog.max0x4141.com/post/artica_proxy/
requests: requests:
- method: GET - method: GET

View File

@ -17,8 +17,7 @@ info:
Successful attacks of this vulnerability can result Successful attacks of this vulnerability can result
in takeover of Oracle WebLogic Server. in takeover of Oracle WebLogic Server.
Source/References: reference: https://github.com/hktalent/CVE-2020-2551
- https://github.com/hktalent/CVE-2020-2551
tags: cve,cve2020,oracle,weblogic,rce tags: cve,cve2020,oracle,weblogic,rce
requests: requests:

View File

@ -8,7 +8,7 @@ info:
SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP,
SVN, and GitLab credentials via the api/settings/values URI. SVN, and GitLab credentials via the api/settings/values URI.
NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it." NOTE: reportedly, the vendor's position for SMTP and SVN is "it is the administrator's responsibility to configure it."
references: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/ reference: https://csl.com.co/sonarqube-auditando-al-auditor-parte-i/
tags: cve,cve2020,sonarqube tags: cve,cve2020,sonarqube
requests: requests:

View File

@ -10,7 +10,7 @@ info:
A remote attacker could exploit this vulnerability to expose A remote attacker could exploit this vulnerability to expose
sensitive information or consume memory resources. sensitive information or consume memory resources.
references: | reference: |
- https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463 - https://www.ibm.com/support/pages/security-bulletin-ibm-maximo-asset-management-vulnerable-information-disclosure-cve-2020-4463
- https://github.com/Ibonok/CVE-2020-4463 - https://github.com/Ibonok/CVE-2020-4463
tags: cve,cve2020,ibm,xxe tags: cve,cve2020,ibm,xxe

View File

@ -10,7 +10,7 @@ info:
script or HTML via multiple parameters where the administrator's entries script or HTML via multiple parameters where the administrator's entries
were not correctly sanitized. were not correctly sanitized.
References: reference:
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
tags: cve,cve2020,xss tags: cve,cve2020,xss

View File

@ -9,7 +9,7 @@ info:
Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10
before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files. before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files.
References: reference:
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
tags: cve,cve2020,citrix,lfi tags: cve,cve2020,citrix,lfi

View File

@ -5,7 +5,7 @@ info:
author: Ganofins author: Ganofins
severity: medium severity: medium
description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard. description: JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard.
references: | reference: |
- https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585 - https://wpscan.com/vulnerability/705bcd6e-6817-4f89-be37-901a767b0585
- https://wordpress.org/plugins/jh-404-logger/ - https://wordpress.org/plugins/jh-404-logger/
tags: cve,cve2021,wordpress,wp-plugin,xss tags: cve,cve2021,wordpress,wp-plugin,xss

View File

@ -4,7 +4,7 @@ info:
name: Shoppable Service Auth Token name: Shoppable Service Auth Token
author: philippedelteil author: philippedelteil
severity: info severity: info
references: https://ask.shoppable.com/knowledge/quick-start-api-guide reference: https://ask.shoppable.com/knowledge/quick-start-api-guide
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects bolt CMS description: Detects bolt CMS
tags: tech,bolt,cms tags: tech,bolt,cms
references: reference:
- https://github.com/bolt/bolt - https://github.com/bolt/bolt
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects BookStack description: Detects BookStack
tags: tech,bookstack tags: tech,bookstack
references: https://github.com/BookStackApp/BookStack reference: https://github.com/BookStackApp/BookStack
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Grav CMS description: Detects Grav CMS
tags: tech,grav,cms tags: tech,grav,cms
references: https://github.com/getgrav/grav reference: https://github.com/getgrav/grav
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Mautic CRM description: Detects Mautic CRM
tags: tech,mautic,crm tags: tech,mautic,crm
references: reference:
- https://github.com/mautic/mautic - https://github.com/mautic/mautic
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects MoinMoin Wiki description: Detects MoinMoin Wiki
tags: tech,moin,moinmoin,wiki tags: tech,moin,moinmoin,wiki
references: reference:
- https://github.com/moinwiki/moin-1.9 - https://github.com/moinwiki/moin-1.9
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects OctoberCMS description: Detects OctoberCMS
tags: tech,octobercms tags: tech,octobercms
references: https://github.com/octobercms/october reference: https://github.com/octobercms/october
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Opencast description: Detects Opencast
tags: tech,opencast tags: tech,opencast
references: reference:
- https://github.com/opencast/opencast - https://github.com/opencast/opencast
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Plone CMS description: Detects Plone CMS
tags: tech,plone,cms tags: tech,plone,cms
references: reference:
- https://github.com/plone/Products.CMFPlone - https://github.com/plone/Products.CMFPlone
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Rhymix CMS description: Detects Rhymix CMS
tags: tech,rhymix tags: tech,rhymix
references: https://github.com/rhymix/rhymix reference: https://github.com/rhymix/rhymix
requests: requests:
- method: GET - method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects Shopware CMS description: Detects Shopware CMS
tags: tech,shopware,cms tags: tech,shopware,cms
references: reference:
- https://github.com/shopware/shopware - https://github.com/shopware/shopware
- https://github.com/shopware/platform - https://github.com/shopware/platform

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects strapi CMS description: Detects strapi CMS
tags: tech,strapi,cms tags: tech,strapi,cms
references: reference:
- https://github.com/strapi/strapi - https://github.com/strapi/strapi
requests: requests:

View File

@ -6,7 +6,7 @@ info:
severity: info severity: info
description: Detects wazuh description: Detects wazuh
tags: tech,wazuh tags: tech,wazuh
references: reference:
- https://github.com/wazuh/wazuh - https://github.com/wazuh/wazuh
requests: requests:

View File

@ -12,7 +12,7 @@ info:
making it possible to upload arbitrary files making it possible to upload arbitrary files
to arbitrary directories or overwrite existing ones during archive extraction. to arbitrary directories or overwrite existing ones during archive extraction.
References: reference:
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/ - https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
tags: mcafee,rce tags: mcafee,rce

View File

@ -6,7 +6,7 @@ info:
severity: high severity: high
description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials description: Critical Information Disclosure on WP Courses plugin < 2.0.29 exposes private course videos and materials
tags: wordpress,plugin tags: wordpress,plugin
references: | reference: |
- https://www.exploit-db.com/exploits/48910 - https://www.exploit-db.com/exploits/48910
- https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/ - https://www.redtimmy.com/critical-information-disclosure-on-wp-courses-plugin-exposes-private-course-videos-and-materials/