description

patch-1
chajer 2020-08-26 00:52:00 +02:00
parent 32f77c4632
commit 58d0e08739
9 changed files with 16 additions and 7 deletions

View File

@ -4,6 +4,7 @@ info:
name: Nexus Repository Manager 3 RCE name: Nexus Repository Manager 3 RCE
auhtor: hetroublemakr auhtor: hetroublemakr
severity: high severity: high
description: Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
# reference: https://support.sonatype.com/hc/en-us/articles/360044882533-CVE-2020-10199-Nexus-Repository-Manager-3-Remote-Code-Execution-2020-03-31 # reference: https://support.sonatype.com/hc/en-us/articles/360044882533-CVE-2020-10199-Nexus-Repository-Manager-3-Remote-Code-Execution-2020-03-31
requests: requests:

View File

@ -4,6 +4,7 @@ info:
name: Sonatype Nexus Repository RCE name: Sonatype Nexus Repository RCE
auhtor: hetroublemakr auhtor: hetroublemakr
severity: high severity: high
description: A Remote Code Execution vulnerability has been discovered in Nexus Repository Manager requiring immediate action. The vulnerability allows for an attacker with an administrative account on NXRM to execute arbitrary code by crafting a malicious request to NXRM
# reference: https://support.sonatype.com/hc/en-us/articles/360044882533-CVE-2020-10199-Nexus-Repository-Manager-3-Remote-Code-Execution-2020-03-31 # reference: https://support.sonatype.com/hc/en-us/articles/360044882533-CVE-2020-10199-Nexus-Repository-Manager-3-Remote-Code-Execution-2020-03-31
requests: requests:
@ -21,4 +22,4 @@ requests:
part: body part: body
- type: status - type: status
status: status:
- 200 - 200

View File

@ -4,7 +4,7 @@ info:
name: CVE-2020-12720 vBulletin SQLI name: CVE-2020-12720 vBulletin SQLI
author: pdnuclei - projectdiscovery.io author: pdnuclei - projectdiscovery.io
severity: critical severity: critical
description: vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
# Source https://github.com/rekter0/exploits/tree/master/CVE-2020-12720 # Source https://github.com/rekter0/exploits/tree/master/CVE-2020-12720
# This template supports the detection part only. # This template supports the detection part only.
# Do not test any website without permission # Do not test any website without permission

View File

@ -4,6 +4,7 @@ info:
name: Netsweeper WebAdmin unixlogin.php Python Code Injection name: Netsweeper WebAdmin unixlogin.php Python Code Injection
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
description: Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
# This template exploits a Python code injection in the Netsweeper # This template exploits a Python code injection in the Netsweeper
# WebAdmin component's unixlogin.php script, for versions 6.4.4 and # WebAdmin component's unixlogin.php script, for versions 6.4.4 and
@ -38,4 +39,4 @@ requests:
part: body part: body
- type: status - type: status
status: status:
- 200 - 200

View File

@ -4,6 +4,7 @@ info:
name: IceWarp WebMail XSS name: IceWarp WebMail XSS
author: pdnuclei & dwisiswant0 author: pdnuclei & dwisiswant0
severity: medium severity: medium
description: In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.
# source:- https://www.exploit-db.com/exploits/47988 # source:- https://www.exploit-db.com/exploits/47988
# https://twitter.com/sagaryadav8742/status/1275170967527006208 # https://twitter.com/sagaryadav8742/status/1275170967527006208
@ -21,4 +22,4 @@ requests:
part: body part: body
- type: status - type: status
status: status:
- 200 - 200

View File

@ -4,6 +4,7 @@ info:
name: Citrix ShareFile StorageZones Unauthenticated Arbitrary File Read name: Citrix ShareFile StorageZones Unauthenticated Arbitrary File Read
author: dwisiswant0 author: dwisiswant0
severity: high severity: high
description: An unauthenticated arbitrary file read issue exists in all versions of Citrix ShareFile StorageZones (aka storage zones) Controller, including the most recent 5.10.x releases as of May 2020.
requests: requests:
- method: GET - method: GET
@ -20,4 +21,4 @@ requests:
- "fonts" - "fonts"
- "extensions" - "extensions"
condition: and condition: and
part: body part: body

View File

@ -4,6 +4,7 @@ info:
name: Apache Tomcat RCE by deserialization name: Apache Tomcat RCE by deserialization
author: dwisiswant0 author: dwisiswant0
severity: high severity: high
description: Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server
requests: requests:
- method: GET - method: GET
@ -23,4 +24,4 @@ requests:
- "ObjectInputStream" - "ObjectInputStream"
- "PersistentManagerBase" - "PersistentManagerBase"
condition: and condition: and
part: body part: body

View File

@ -4,6 +4,8 @@ info:
name: Apache OFBiz XML-RPC Java Deserialization name: Apache OFBiz XML-RPC Java Deserialization
author: dwisiswant0 author: dwisiswant0
severity: medium severity: medium
description: XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
# This temaplte detects a Java deserialization vulnerability in Apache # This temaplte detects a Java deserialization vulnerability in Apache
# OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for # OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for
@ -52,4 +54,4 @@ requests:
part: header part: header
- type: status - type: status
status: status:
- 200 - 200

View File

@ -4,6 +4,7 @@ info:
name: SEOmatic < 3.3.0 Server-Side Template Injection name: SEOmatic < 3.3.0 Server-Side Template Injection
author: dwisiswant0 author: dwisiswant0
severity: high severity: high
description: The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
requests: requests:
- method: GET - method: GET