TemplateMan Update [Wed Sep 27 13:29:58 UTC 2023] 🤖
parent
9cbcb77b26
commit
627e654d30
|
@ -10,12 +10,12 @@ info:
|
||||||
- https://www.exploit-db.com/ghdb/7179
|
- https://www.exploit-db.com/ghdb/7179
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
cvss-score: 10.0
|
cvss-score: 10
|
||||||
cwe-id: CWE-912
|
cwe-id: CWE-912
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: http.html:"ZTE Corporation"
|
shodan-query: http.html:"ZTE Corporation"
|
||||||
|
verified: true
|
||||||
tags: edb,network,zte,telnet,backdoor,router
|
tags: edb,network,zte,telnet,backdoor,router
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,14 +7,14 @@ info:
|
||||||
description: VSFTPD 2.3.4 contains a backdoor command execution vulnerability.
|
description: VSFTPD 2.3.4 contains a backdoor command execution vulnerability.
|
||||||
reference:
|
reference:
|
||||||
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
- https://www.rapid7.com/db/modules/exploit/unix/ftp/vsftpd_234_backdoor/
|
||||||
|
remediation: This backdoor was removed on July 3rd, 2011.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
cvss-score: 10.0
|
cvss-score: 10
|
||||||
cwe-id: CWE-78
|
cwe-id: CWE-78
|
||||||
remediation: This backdoor was removed on July 3rd, 2011.
|
|
||||||
tags: network,vsftpd,ftp,backdoor
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,vsftpd,ftp,backdoor
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -5,23 +5,23 @@ info:
|
||||||
author: iamthefrogy
|
author: iamthefrogy
|
||||||
severity: high
|
severity: high
|
||||||
description: SSHv1 is deprecated and has known cryptographic issues.
|
description: SSHv1 is deprecated and has known cryptographic issues.
|
||||||
remediation: Upgrade to SSH 2.4 or later.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.kb.cert.org/vuls/id/684820
|
- https://www.kb.cert.org/vuls/id/684820
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
|
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
|
||||||
- http://www.kb.cert.org/vuls/id/684820
|
- http://www.kb.cert.org/vuls/id/684820
|
||||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6603
|
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6603
|
||||||
|
remediation: Upgrade to SSH 2.4 or later.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
|
||||||
cvss-score: 7.5
|
cvss-score: 7.5
|
||||||
cve-id: CVE-2001-1473
|
cve-id: CVE-2001-1473
|
||||||
cwe-id: CWE-310
|
cwe-id: CWE-310
|
||||||
epss-score: 0.00258
|
|
||||||
cpe: cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.00258
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: ssh
|
|
||||||
product: ssh
|
product: ssh
|
||||||
|
vendor: ssh
|
||||||
tags: cve,cve2001,network,ssh,openssh
|
tags: cve,cve2001,network,ssh,openssh
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -5,24 +5,24 @@ info:
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: critical
|
severity: critical
|
||||||
description: ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
|
description: ProFTPD 1.3.5 contains a remote code execution vulnerability via the mod_copy module which allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
|
||||||
remediation: Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
|
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/t0kx/exploit-CVE-2015-3306
|
- https://github.com/t0kx/exploit-CVE-2015-3306
|
||||||
- https://www.exploit-db.com/exploits/36803/
|
- https://www.exploit-db.com/exploits/36803/
|
||||||
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
|
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
|
||||||
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
|
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2015-3306
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-3306
|
||||||
|
remediation: Upgrade to ProFTPD 1.3.5a / 1.3.6rc1 or later.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
|
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
|
||||||
cvss-score: 10
|
cvss-score: 10
|
||||||
cve-id: CVE-2015-3306
|
cve-id: CVE-2015-3306
|
||||||
cwe-id: CWE-284
|
cwe-id: CWE-284
|
||||||
epss-score: 0.97267
|
|
||||||
cpe: cpe:2.3:a:proftpd:proftpd:1.3.5:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:proftpd:proftpd:1.3.5:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97267
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: proftpd
|
|
||||||
product: proftpd
|
product: proftpd
|
||||||
|
vendor: proftpd
|
||||||
tags: cve,cve2015,ftp,rce,network,proftpd,edb
|
tags: cve,cve2015,ftp,rce,network,proftpd,edb
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -5,25 +5,25 @@ info:
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: critical
|
severity: critical
|
||||||
description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623.
|
description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623.
|
||||||
remediation: |
|
|
||||||
Upgrade to the most recent version of HP Data Protector.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/39858
|
- https://www.exploit-db.com/exploits/39858
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2016-2004
|
- https://nvd.nist.gov/vuln/detail/CVE-2016-2004
|
||||||
- http://www.kb.cert.org/vuls/id/267328
|
- http://www.kb.cert.org/vuls/id/267328
|
||||||
- https://www.exploit-db.com/exploits/39858/
|
- https://www.exploit-db.com/exploits/39858/
|
||||||
- http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html
|
- http://packetstormsecurity.com/files/137199/HP-Data-Protector-A.09.00-Command-Execution.html
|
||||||
|
remediation: |
|
||||||
|
Upgrade to the most recent version of HP Data Protector.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2016-2004
|
cve-id: CVE-2016-2004
|
||||||
cwe-id: CWE-306
|
cwe-id: CWE-306
|
||||||
epss-score: 0.06793
|
|
||||||
cpe: cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.06793
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: hp
|
|
||||||
product: data_protector
|
product: data_protector
|
||||||
|
vendor: hp
|
||||||
tags: cve,cve2016,network,iot,hp,rce,edb
|
tags: cve,cve2016,network,iot,hp,rce,edb
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -15,9 +15,9 @@ info:
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2016-3510
|
cve-id: CVE-2016-3510
|
||||||
cwe-id: CWE-119
|
cwe-id: CWE-119
|
||||||
epss-score: 0.0162000000
|
epss-score: 0.0162
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
verified: true
|
||||||
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization,network
|
tags: cve,cve2016,weblogic,t3,rce,oast,deserialization,network
|
||||||
|
|
||||||
|
|
|
@ -6,24 +6,24 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
|
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
|
||||||
remediation: Deactivate a telnet connection or employ Access Control Lists (ACLs) to limit access.
|
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/artkond/cisco-rce
|
- https://github.com/artkond/cisco-rce
|
||||||
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
||||||
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2017-3881
|
- https://nvd.nist.gov/vuln/detail/CVE-2017-3881
|
||||||
- http://www.securitytracker.com/id/1038059
|
- http://www.securitytracker.com/id/1038059
|
||||||
|
remediation: Deactivate a telnet connection or employ Access Control Lists (ACLs) to limit access.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2017-3881
|
cve-id: CVE-2017-3881
|
||||||
cwe-id: CWE-20
|
cwe-id: CWE-20
|
||||||
epss-score: 0.97332
|
|
||||||
cpe: cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97332
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: cisco
|
|
||||||
product: ios
|
product: ios
|
||||||
|
vendor: cisco
|
||||||
tags: cve,cve2017,cisco,rce,network,kev,msf
|
tags: cve,cve2017,cisco,rce,network,kev,msf
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -6,25 +6,25 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
|
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
|
||||||
remediation: |
|
|
||||||
Consider updating to Log4j 2.15.0 or a newer version, deactivating JNDI lookups, or implementing a Java Agent to safeguard against potentially harmful JNDI lookups.
|
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2017-5645
|
- https://github.com/vulhub/vulhub/tree/master/log4j/CVE-2017-5645
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2017-5645
|
- https://nvd.nist.gov/vuln/detail/CVE-2017-5645
|
||||||
- http://www.openwall.com/lists/oss-security/2019/12/19/2
|
- http://www.openwall.com/lists/oss-security/2019/12/19/2
|
||||||
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
|
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
|
||||||
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
||||||
|
remediation: |
|
||||||
|
Consider updating to Log4j 2.15.0 or a newer version, deactivating JNDI lookups, or implementing a Java Agent to safeguard against potentially harmful JNDI lookups.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2017-5645
|
cve-id: CVE-2017-5645
|
||||||
cwe-id: CWE-502
|
cwe-id: CWE-502
|
||||||
epss-score: 0.74805
|
|
||||||
cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.74805
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: apache
|
|
||||||
product: log4j
|
product: log4j
|
||||||
|
vendor: apache
|
||||||
tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast,
|
tags: cve,cve2017,vulhub,network,apache,log4j,rce,deserialization,oast,
|
||||||
variables:
|
variables:
|
||||||
end: "\r\n"
|
end: "\r\n"
|
||||||
|
|
|
@ -16,9 +16,9 @@ info:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2018-2893
|
cve-id: CVE-2018-2893
|
||||||
epss-score: 0.973460000
|
epss-score: 0.97346
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
tags: cve,cve2018,weblogic,network,deserialization,rce,oracle
|
tags: cve,cve2018,weblogic,network,deserialization,rce,oracle
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -15,9 +15,9 @@ info:
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2020-11981
|
cve-id: CVE-2020-11981
|
||||||
cwe-id: CWE-78
|
cwe-id: CWE-78
|
||||||
epss-score: 0.936930000
|
epss-score: 0.93693
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: product:"redis"
|
shodan-query: product:"redis"
|
||||||
verified: true
|
verified: true
|
||||||
tags: cve,cve2020,network,redis,unauth,apache,airflow,vulhub,intrusive
|
tags: cve,cve2020,network,redis,unauth,apache,airflow,vulhub,intrusive
|
||||||
|
|
|
@ -5,25 +5,25 @@ info:
|
||||||
author: milo2012
|
author: milo2012
|
||||||
severity: critical
|
severity: critical
|
||||||
description: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
|
description: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
|
||||||
remediation: https://access.redhat.com/solutions/4851251
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
- https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-1938
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-1938
|
||||||
- https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
|
- https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
|
||||||
- https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
|
- https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
|
||||||
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
|
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
|
||||||
|
remediation: https://access.redhat.com/solutions/4851251
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2020-1938
|
cve-id: CVE-2020-1938
|
||||||
cwe-id: CWE-269
|
cwe-id: CWE-269
|
||||||
epss-score: 0.97486
|
|
||||||
cpe: cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97486
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 4
|
max-request: 1
|
||||||
vendor: apache
|
|
||||||
product: geode
|
product: geode
|
||||||
shodan-query: title:"Apache Tomcat"
|
shodan-query: title:"Apache Tomcat"
|
||||||
|
vendor: apache
|
||||||
tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat
|
tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -6,24 +6,24 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
|
OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
|
||||||
remediation: OpenBSD users are recommended to install patches for OpenBSD 6.6
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.openwall.com/lists/oss-security/2020/01/28/3
|
- https://www.openwall.com/lists/oss-security/2020/01/28/3
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-7247
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-7247
|
||||||
- https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45
|
- https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45
|
||||||
- http://www.openwall.com/lists/oss-security/2020/01/28/3
|
- http://www.openwall.com/lists/oss-security/2020/01/28/3
|
||||||
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
|
- http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html
|
||||||
|
remediation: OpenBSD users are recommended to install patches for OpenBSD 6.6
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2020-7247
|
cve-id: CVE-2020-7247
|
||||||
cwe-id: CWE-755
|
cwe-id: CWE-755
|
||||||
epss-score: 0.9749
|
|
||||||
cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:openbsd:opensmtpd:6.6:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.9749
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: openbsd
|
|
||||||
product: opensmtpd
|
product: opensmtpd
|
||||||
|
vendor: openbsd
|
||||||
tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev
|
tags: cve,cve2020,smtp,opensmtpd,network,rce,oast,kev
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -5,7 +5,6 @@ info:
|
||||||
author: Y4er
|
author: Y4er
|
||||||
severity: critical
|
severity: critical
|
||||||
description: 'When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.'
|
description: 'When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.'
|
||||||
remediation: 3.0.x users should upgrade to 3.0.26, 3.11.x users should upgrade to 3.11.12, 4.0.x users should upgrade to 4.0.2
|
|
||||||
reference:
|
reference:
|
||||||
- https://y4er.com/post/cve-2021-44521-apache-cassandra-udf-rce/
|
- https://y4er.com/post/cve-2021-44521-apache-cassandra-udf-rce/
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-44521
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-44521
|
||||||
|
@ -13,17 +12,18 @@ info:
|
||||||
- https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
|
- https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356
|
||||||
- http://www.openwall.com/lists/oss-security/2022/02/11/4
|
- http://www.openwall.com/lists/oss-security/2022/02/11/4
|
||||||
- https://thesecmaster.com/how-to-fix-apache-cassandra-rce-vulnerability-cve-2021-44521/
|
- https://thesecmaster.com/how-to-fix-apache-cassandra-rce-vulnerability-cve-2021-44521/
|
||||||
|
remediation: 3.0.x users should upgrade to 3.0.26, 3.11.x users should upgrade to 3.11.12, 4.0.x users should upgrade to 4.0.2
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
||||||
cvss-score: 9.1
|
cvss-score: 9.1
|
||||||
cve-id: CVE-2021-44521
|
cve-id: CVE-2021-44521
|
||||||
cwe-id: CWE-732,CWE-94
|
cwe-id: CWE-732,CWE-94
|
||||||
epss-score: 0.01212
|
|
||||||
cpe: cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.01212
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: apache
|
|
||||||
product: cassandra
|
product: cassandra
|
||||||
|
vendor: apache
|
||||||
tags: cve,cve2021,network,rce,apache,cassandra
|
tags: cve,cve2021,network,rce,apache,cassandra
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -9,24 +9,24 @@ info:
|
||||||
vulnerability was introduced by Debian and Ubuntu Redis packages that
|
vulnerability was introduced by Debian and Ubuntu Redis packages that
|
||||||
insufficiently sanitized the Lua environment. The maintainers failed to
|
insufficiently sanitized the Lua environment. The maintainers failed to
|
||||||
disable the package interface, allowing attackers to load arbitrary libraries.
|
disable the package interface, allowing attackers to load arbitrary libraries.
|
||||||
remediation: Update to the most recent versions currently available.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
|
- https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
|
||||||
- https://attackerkb.com/topics/wyA1c1HIC8/cve-2022-0543/rapid7-analysis#rapid7-analysis
|
- https://attackerkb.com/topics/wyA1c1HIC8/cve-2022-0543/rapid7-analysis#rapid7-analysis
|
||||||
- https://bugs.debian.org/1005787
|
- https://bugs.debian.org/1005787
|
||||||
- https://www.debian.org/security/2022/dsa-5081
|
- https://www.debian.org/security/2022/dsa-5081
|
||||||
- https://lists.debian.org/debian-security-announce/2022/msg00048.html
|
- https://lists.debian.org/debian-security-announce/2022/msg00048.html
|
||||||
|
remediation: Update to the most recent versions currently available.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
cvss-score: 10
|
cvss-score: 10
|
||||||
cve-id: CVE-2022-0543
|
cve-id: CVE-2022-0543
|
||||||
epss-score: 0.97184
|
|
||||||
cpe: cpe:2.3:a:redis:redis:-:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:redis:redis:-:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97184
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 4
|
max-request: 1
|
||||||
vendor: redis
|
|
||||||
product: redis
|
product: redis
|
||||||
shodan-query: redis_version
|
shodan-query: redis_version
|
||||||
|
vendor: redis
|
||||||
tags: cve,cve2022,network,redis,unauth,rce,kev
|
tags: cve,cve2022,network,redis,unauth,rce,kev
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -6,27 +6,27 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.
|
In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.
|
||||||
remediation: |
|
|
||||||
Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value.
|
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/50914
|
- https://www.exploit-db.com/exploits/50914
|
||||||
- https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py
|
- https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit/blob/main/CVE-2022-24706-Exploit.py
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-24706
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-24706
|
||||||
- http://www.openwall.com/lists/oss-security/2022/04/26/1
|
- http://www.openwall.com/lists/oss-security/2022/04/26/1
|
||||||
- http://www.openwall.com/lists/oss-security/2022/05/09/1
|
- http://www.openwall.com/lists/oss-security/2022/05/09/1
|
||||||
|
remediation: |
|
||||||
|
Upgrade to versions 3.2.2 or newer. Starting from CouchDB 3.2.2, the previous default Erlang cookie value "monster" will be rejected upon startup. Upgraded installations will be required to select an alternative value.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2022-24706
|
cve-id: CVE-2022-24706
|
||||||
cwe-id: CWE-1188
|
cwe-id: CWE-1188
|
||||||
epss-score: 0.97407
|
|
||||||
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97407
|
||||||
metadata:
|
metadata:
|
||||||
verified: "true"
|
max-request: 1
|
||||||
max-request: 2
|
|
||||||
vendor: apache
|
|
||||||
product: couchdb
|
product: couchdb
|
||||||
shodan-query: product:"CouchDB"
|
shodan-query: product:"CouchDB"
|
||||||
|
vendor: apache
|
||||||
|
verified: "true"
|
||||||
tags: cve,cve2022,network,couch,rce,kev
|
tags: cve,cve2022,network,couch,rce,kev
|
||||||
variables:
|
variables:
|
||||||
name_msg: "00156e00050007499c4141414141414041414141414141"
|
name_msg: "00156e00050007499c4141414141414041414141414141"
|
||||||
|
|
|
@ -6,27 +6,27 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
|
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
|
||||||
remediation: Update the RocketMQ application to version 5.1.1
|
|
||||||
reference:
|
reference:
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2023-33246
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-33246
|
||||||
- https://github.com/I5N0rth/CVE-2023-33246
|
- https://github.com/I5N0rth/CVE-2023-33246
|
||||||
- http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html
|
- http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html
|
||||||
- http://www.openwall.com/lists/oss-security/2023/07/12/1
|
- http://www.openwall.com/lists/oss-security/2023/07/12/1
|
||||||
- https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp
|
- https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp
|
||||||
|
remediation: Update the RocketMQ application to version 5.1.1
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2023-33246
|
cve-id: CVE-2023-33246
|
||||||
cwe-id: CWE-94
|
cwe-id: CWE-94
|
||||||
epss-score: 0.95581
|
|
||||||
cpe: cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.95581
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
fofa-query: protocol="rocketmq"
|
||||||
max-request: 2
|
max-request: 1
|
||||||
vendor: apache
|
|
||||||
product: rocketmq
|
product: rocketmq
|
||||||
shodan-query: title:"RocketMQ"
|
shodan-query: title:"RocketMQ"
|
||||||
fofa-query: protocol="rocketmq"
|
vendor: apache
|
||||||
|
verified: true
|
||||||
tags: cve,cve2023,rocketmq,rce,oast,intrusive,network
|
tags: cve,cve2023,rocketmq,rce,oast,intrusive,network
|
||||||
variables:
|
variables:
|
||||||
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'
|
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'
|
||||||
|
|
|
@ -4,13 +4,13 @@ info:
|
||||||
name: FTP Anonymous Login
|
name: FTP Anonymous Login
|
||||||
author: C3l3si4n,pussycat0x
|
author: C3l3si4n,pussycat0x
|
||||||
severity: medium
|
severity: medium
|
||||||
reference:
|
|
||||||
- https://tools.ietf.org/html/rfc2577
|
|
||||||
description: |
|
description: |
|
||||||
Anonymous FTP access allows anyone to access your public_ftp folder, allowing unidentified visitors to download (and possibly upload) files on your website. Anonymous FTP creates the potential for a security hole for hackers and is not recommended.
|
Anonymous FTP access allows anyone to access your public_ftp folder, allowing unidentified visitors to download (and possibly upload) files on your website. Anonymous FTP creates the potential for a security hole for hackers and is not recommended.
|
||||||
tags: network,ftp,default-login
|
reference:
|
||||||
|
- https://tools.ietf.org/html/rfc2577
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,ftp,default-login
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -8,11 +8,11 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/ftpserver/security/authentication/
|
- https://docs.microsoft.com/en-us/iis/configuration/system.applicationhost/sites/sitedefaults/ftpserver/security/authentication/
|
||||||
classification:
|
classification:
|
||||||
cvss-score: 8.5
|
|
||||||
cvss-metrics: 3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
|
cvss-metrics: 3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
|
||||||
tags: network,ftp,default-login,service
|
cvss-score: 8.5
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,ftp,default-login,service
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
||||||
|
|
|
@ -13,9 +13,9 @@ info:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||||
cvss-score: 5.3
|
cvss-score: 5.3
|
||||||
cwe-id: CWE-284
|
cwe-id: CWE-284
|
||||||
tags: network,ldap,default-login,tenable
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,ldap,default-login,tenable
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
OpenWire is the native protocol that Apache ActiveMQ uses. It is designed for performance and size on the wire - sacrificing some ease of implementation with higher performance and reduced network bandwidth as a priority.
|
OpenWire is the native protocol that Apache ActiveMQ uses. It is designed for performance and size on the wire - sacrificing some ease of implementation with higher performance and reduced network bandwidth as a priority.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"ActiveMQ OpenWire transport"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"ActiveMQ OpenWire transport"'
|
|
||||||
tags: network,activemq,detect
|
tags: network,activemq,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server.
|
Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Apache ActiveMQ"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Apache ActiveMQ"'
|
|
||||||
tags: network,activemq,oss,detect
|
tags: network,activemq,oss,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,10 +7,10 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Axigen Mail Server was detected.
|
Axigen Mail Server was detected.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
|
||||||
verified: true
|
|
||||||
fofa-query: app="axigen-Mail-Server"
|
fofa-query: app="axigen-Mail-Server"
|
||||||
|
max-request: 1
|
||||||
shodan-query: product:"Axigen"
|
shodan-query: product:"Axigen"
|
||||||
|
verified: true
|
||||||
tags: network,axigen,detect
|
tags: network,axigen,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
|
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"Cisco fingerd"
|
shodan-query: product:"Cisco fingerd"
|
||||||
|
verified: true
|
||||||
tags: network,finger,detect
|
tags: network,finger,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Clam AntiVirus is a free software, cross-platform antimalware toolkit able to detect many types of malware, including viruses.
|
Clam AntiVirus is a free software, cross-platform antimalware toolkit able to detect many types of malware, including viruses.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: port:3310 product:"ClamAV"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'port:3310 product:"ClamAV"'
|
|
||||||
tags: network,clamav,detect
|
tags: network,clamav,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server.
|
Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: cassandra
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: "cassandra"
|
|
||||||
tags: network,cassandra,cql,detect
|
tags: network,cassandra,cql,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -10,11 +10,10 @@ info:
|
||||||
- http://www.addpac.com/addpac_eng2/down.php?file=505_f16.pdf
|
- http://www.addpac.com/addpac_eng2/down.php?file=505_f16.pdf
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,addpac,apos,voip,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,addpac,apos,voip,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -9,11 +9,10 @@ info:
|
||||||
- https://datatracker.ietf.org/doc/html/rfc6120
|
- https://datatracker.ietf.org/doc/html/rfc6120
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,jabber,xmpp,messaging,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,jabber,xmpp,messaging,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -8,12 +8,11 @@ info:
|
||||||
Microsoft .NET Remoting httpd was detected.
|
Microsoft .NET Remoting httpd was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"MS .NET Remoting httpd"
|
shodan-query: product:"MS .NET Remoting httpd"
|
||||||
|
verified: true
|
||||||
tags: network,detect,microsoft
|
tags: network,detect,microsoft
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,14 +6,14 @@ info:
|
||||||
severity: low
|
severity: low
|
||||||
description: |
|
description: |
|
||||||
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
|
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.
|
||||||
remediation: |
|
|
||||||
Disable CBC Ciphers.
|
|
||||||
reference: |
|
reference: |
|
||||||
https://www.tenable.com/plugins/nessus/70658
|
https://www.tenable.com/plugins/nessus/70658
|
||||||
|
remediation: |
|
||||||
|
Disable CBC Ciphers.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Dropbear sshd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Dropbear sshd"'
|
|
||||||
tags: network,ssh,dropbear,detect
|
tags: network,ssh,dropbear,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -10,12 +10,11 @@ info:
|
||||||
- https://nmap.org/nsedoc/scripts/smtp-open-relay.html
|
- https://nmap.org/nsedoc/scripts/smtp-open-relay.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: ESMTP
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'ESMTP'
|
|
||||||
tags: network,detect,smtp,mail
|
tags: network,detect,smtp,mail
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,9 +6,9 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
The "EXPN" can be used by attackers to learn about valid usernames on the target system. On some SMTP servers, EXPN can be used to show the subscribers of a mailing list subscription lists are generally considered to be sensitive information.
|
The "EXPN" can be used by attackers to learn about valid usernames on the target system. On some SMTP servers, EXPN can be used to show the subscribers of a mailing list subscription lists are generally considered to be sensitive information.
|
||||||
tags: mail,expn,network,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: mail,expn,network,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
|
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: port:"79" action
|
shodan-query: port:"79" action
|
||||||
|
verified: true
|
||||||
tags: network,finger,detect
|
tags: network,finger,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"GNU Inetutils FTPd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"GNU Inetutils FTPd"'
|
|
||||||
tags: network,ftp,smartgateway,gnu,inetutils,detect
|
tags: network,ftp,smartgateway,gnu,inetutils,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,11 +8,10 @@ info:
|
||||||
Gopher service was detected.
|
Gopher service was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,gopher,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,gopher,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -10,12 +10,11 @@ info:
|
||||||
- https://nmap.org/nsedoc/scripts/db2-das-info.html
|
- https://nmap.org/nsedoc/scripts/db2-das-info.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"IBM DB2 Database Server"
|
shodan-query: product:"IBM DB2 Database Server"
|
||||||
|
verified: true
|
||||||
tags: network,ibm,database,db,db2,detect
|
tags: network,ibm,database,db,db2,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,12 +8,11 @@ info:
|
||||||
IMAP was detected.
|
IMAP was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: imap
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'imap'
|
|
||||||
tags: network,detect,imap,mail
|
tags: network,detect,imap,mail
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,11 +8,10 @@ info:
|
||||||
iPlanet Messaging Server IMAP protocol was detected.
|
iPlanet Messaging Server IMAP protocol was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
|
||||||
fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap"
|
fofa-query: app="iPlanet-Messaging-Server-5.2" && protocol="imap"
|
||||||
|
max-request: 1
|
||||||
tags: network,imap,detect
|
tags: network,imap,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: Microsoft FTP Service
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: "Microsoft FTP Service"
|
|
||||||
tags: network,ftp,microsoft,detect
|
tags: network,ftp,microsoft,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"MikroTik router ftpd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"MikroTik router ftpd"'
|
|
||||||
tags: network,ftp,mikrotik,router,detect
|
tags: network,ftp,mikrotik,router,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,12 +8,11 @@ info:
|
||||||
MikroTik RouterOS API was detected.
|
MikroTik RouterOS API was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"MikroTik RouterOS API Service"
|
shodan-query: product:"MikroTik RouterOS API Service"
|
||||||
|
verified: true
|
||||||
tags: network,mikrotik,detect
|
tags: network,mikrotik,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,15 +6,14 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
MongoDB service was detected.
|
MongoDB service was detected.
|
||||||
classification:
|
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/orleven/Tentacle
|
- https://github.com/orleven/Tentacle
|
||||||
tags: network,mongodb,detect
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,mongodb,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -11,10 +11,10 @@ info:
|
||||||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-mqqb/50da7ea1-eed7-41f9-ba6a-2aa37f5f1e92
|
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-mqqb/50da7ea1-eed7-41f9-ba6a-2aa37f5f1e92
|
||||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554
|
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
|
||||||
verified: true
|
|
||||||
shodan-query: MSMQ
|
|
||||||
censys-query: services.service_name:MSMQ
|
censys-query: services.service_name:MSMQ
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: MSMQ
|
||||||
|
verified: true
|
||||||
tags: network,msmq,detect
|
tags: network,msmq,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,12 +8,11 @@ info:
|
||||||
MySQL instance was detected.
|
MySQL instance was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"MySQL"
|
shodan-query: product:"MySQL"
|
||||||
|
verified: true
|
||||||
tags: network,mysql,db,detect
|
tags: network,mysql,db,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,19 +6,18 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
OpenSSH service was detected.
|
OpenSSH service was detected.
|
||||||
classification:
|
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
|
||||||
reference:
|
reference:
|
||||||
- http://www.openwall.com/lists/oss-security/2016/08/01/2
|
- http://www.openwall.com/lists/oss-security/2016/08/01/2
|
||||||
- http://www.openwall.com/lists/oss-security/2018/08/15/5
|
- http://www.openwall.com/lists/oss-security/2018/08/15/5
|
||||||
- http://seclists.org/fulldisclosure/2016/Jul/51
|
- http://seclists.org/fulldisclosure/2016/Jul/51
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2016-6210
|
- https://nvd.nist.gov/vuln/detail/CVE-2016-6210
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2018-15473
|
- https://nvd.nist.gov/vuln/detail/CVE-2018-15473
|
||||||
tags: seclists,network,ssh,openssh,detect
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: seclists,network,ssh,openssh,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -11,12 +11,11 @@ info:
|
||||||
- https://www.postgresql.org/docs/current/client-authentication-problems.html
|
- https://www.postgresql.org/docs/current/client-authentication-problems.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: port:5432 product:"PostgreSQL"
|
shodan-query: port:5432 product:"PostgreSQL"
|
||||||
|
verified: true
|
||||||
tags: network,postgresql,db,detect
|
tags: network,postgresql,db,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -10,12 +10,11 @@ info:
|
||||||
- https://nmap.org/nsedoc/scripts/pop3-ntlm-info.html
|
- https://nmap.org/nsedoc/scripts/pop3-ntlm-info.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: pop3 port:110
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'pop3 port:110'
|
|
||||||
tags: network,detect,pop3,mail
|
tags: network,detect,pop3,mail
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"ProFTPD"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"ProFTPD"'
|
|
||||||
tags: network,ftp,proftpd,detect
|
tags: network,ftp,proftpd,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -9,9 +9,9 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://nmap.org/nsedoc/scripts/amqp-info.html
|
- https://nmap.org/nsedoc/scripts/amqp-info.html
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"RabbitMQ"
|
shodan-query: product:"RabbitMQ"
|
||||||
|
verified: true
|
||||||
tags: network,rabbitmq,oss,detect
|
tags: network,rabbitmq,oss,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,10 +8,9 @@ info:
|
||||||
Windows Remote Desktop Protocol was detected.
|
Windows Remote Desktop Protocol was detected.
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,windows,rdp,detect
|
tags: network,windows,rdp,detect
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 4
|
max-request: 1
|
||||||
shodan-query: product:"redis"
|
shodan-query: product:"redis"
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,redis,detect
|
tags: network,redis,detect
|
||||||
|
|
|
@ -6,9 +6,9 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: Riak is a distributed NoSQL key-value data store that offers high availability, fault tolerance, operational simplicity, and scalability.
|
description: Riak is a distributed NoSQL key-value data store that offers high availability, fault tolerance, operational simplicity, and scalability.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: product:"Riak"
|
shodan-query: product:"Riak"
|
||||||
|
verified: true
|
||||||
tags: network,oss,detect
|
tags: network,oss,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,12 +8,11 @@ info:
|
||||||
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
|
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: port:"111"
|
shodan-query: port:"111"
|
||||||
|
verified: true
|
||||||
tags: network,rpcbind,portmap,detect
|
tags: network,rpcbind,portmap,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -10,11 +10,10 @@ info:
|
||||||
- https://linux.die.net/man/1/rsync
|
- https://linux.die.net/man/1/rsync
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,rsyncd,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,rsyncd,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -10,12 +10,11 @@ info:
|
||||||
https://nmap.org/nsedoc/scripts/rtsp-methods.html
|
https://nmap.org/nsedoc/scripts/rtsp-methods.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: RTSP/1.0
|
shodan-query: RTSP/1.0
|
||||||
|
verified: true
|
||||||
tags: network,rtsp,detect
|
tags: network,rtsp,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -8,12 +8,12 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://www.samba.org/samba/what_is_samba.html
|
- https://www.samba.org/samba/what_is_samba.html
|
||||||
- https://www.samba.org/samba/history/security.html
|
- https://www.samba.org/samba/history/security.html
|
||||||
|
remediation: Always apply the latest security patch.
|
||||||
classification:
|
classification:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
remediation: Always apply the latest security patch.
|
|
||||||
tags: network,smb,samba,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,smb,samba,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: SAPRouter Detection
|
name: SAPRouter Detection
|
||||||
author: randomstr1ng
|
author: randomstr1ng
|
||||||
severity: info
|
severity: info
|
||||||
tags: network,sap,detect
|
|
||||||
description: |
|
description: |
|
||||||
SAProuter is a software application that provides a remote connection between our customer's network and SAP.
|
SAProuter is a software application that provides a remote connection between our customer's network and SAP.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,sap,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: SMB Detection
|
name: SMB Detection
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: low
|
severity: low
|
||||||
tags: network,windows,smb,service,detect
|
|
||||||
description: |
|
description: |
|
||||||
SMB (Server Message Block) is a network-layered protocol mainly used on Windows for sharing files, printers, and communication between network-attached computers. SMB related vulnerabilities can be levaraged to compromise large-scale systems.
|
SMB (Server Message Block) is a network-layered protocol mainly used on Windows for sharing files, printers, and communication between network-attached computers. SMB related vulnerabilities can be levaraged to compromise large-scale systems.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,windows,smb,service,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: SMTP Service Detection
|
name: SMTP Service Detection
|
||||||
author: pussycat0x
|
author: pussycat0x
|
||||||
severity: info
|
severity: info
|
||||||
tags: network,service,smtp,detect
|
|
||||||
description: |
|
description: |
|
||||||
SMTP is part of the application layer of the TCP/IP protocol. Using a process called “store and forward,” SMTP moves your email on and across networks.
|
SMTP is part of the application layer of the TCP/IP protocol. Using a process called “store and forward,” SMTP moves your email on and across networks.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,service,smtp,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems
|
Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Dropbear sshd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Dropbear sshd"'
|
|
||||||
tags: network,ssh,dropbear,detect
|
tags: network,ssh,dropbear,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: STARTTLS Mail Server Detection
|
name: STARTTLS Mail Server Detection
|
||||||
author: r3dg33k
|
author: r3dg33k
|
||||||
severity: info
|
severity: info
|
||||||
tags: mail,starttls,network,detect
|
|
||||||
description: |
|
description: |
|
||||||
STARTTLS is an email protocol command that tells an email server that an email client, including an email client running in a web browser, wants to turn an existing insecure connection into a secure one.
|
STARTTLS is an email protocol command that tells an email server that an email client, including an email client running in a web browser, wants to turn an existing insecure connection into a secure one.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: mail,starttls,network,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,7 +7,7 @@ info:
|
||||||
description: |
|
description: |
|
||||||
ServerQuery is a commandline based administration tool/feature of TeamSpeak 3 server.
|
ServerQuery is a commandline based administration tool/feature of TeamSpeak 3 server.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: product:"TeamSpeak 3 ServerQuery"
|
shodan-query: product:"TeamSpeak 3 ServerQuery"
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,service,teamspeak3,detect
|
tags: network,service,teamspeak3,detect
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
|
Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: port:23 telnet
|
shodan-query: port:23 telnet
|
||||||
|
verified: true
|
||||||
tags: network,telnet,detect
|
tags: network,telnet,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: Totemomail SMTP Server Detection
|
name: Totemomail SMTP Server Detection
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: info
|
severity: info
|
||||||
tags: mail,smtp,network,totemomail,detect
|
|
||||||
description: |
|
description: |
|
||||||
Totemomail is a comprehensive email solution designed to address all aspects of digital communication security.
|
Totemomail is a comprehensive email solution designed to address all aspects of digital communication security.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: mail,smtp,network,totemomail,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
vmauthd is the VMWare authentication daemon that is included with many VMWare products, including ESX(i), and Workstation.
|
vmauthd is the VMWare authentication daemon that is included with many VMWare products, including ESX(i), and Workstation.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"VMware Authentication Daemon"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"VMware Authentication Daemon"'
|
|
||||||
tags: network,vmware,authenticated,detect
|
tags: network,vmware,authenticated,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: A Virtual Network Computing (VNC) service was detected.
|
description: A Virtual Network Computing (VNC) service was detected.
|
||||||
classification:
|
classification:
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,vnc,service,detect
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,vnc,service,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Xlight ftpd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Xlight ftpd"'
|
|
||||||
tags: network,ftp,xlight,detect
|
tags: network,ftp,xlight,detect
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -10,12 +10,11 @@ info:
|
||||||
- https://nmap.org/nsedoc/scripts/mongodb-info.html
|
- https://nmap.org/nsedoc/scripts/mongodb-info.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: mongodb server information
|
shodan-query: mongodb server information
|
||||||
|
verified: true
|
||||||
tags: network,mongodb,enum
|
tags: network,mongodb,enum
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,12 +6,12 @@ info:
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
|
Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
|
||||||
metadata:
|
|
||||||
max-request: 2
|
|
||||||
verified: true
|
|
||||||
shodan-query: 'product:"Niagara Fox"'
|
|
||||||
reference:
|
reference:
|
||||||
- https://nmap.org/nsedoc/scripts/fox-info.html
|
- https://nmap.org/nsedoc/scripts/fox-info.html
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: product:"Niagara Fox"
|
||||||
|
verified: true
|
||||||
tags: network,fox,niagara,enum
|
tags: network,fox,niagara,enum
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007
|
- https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: port:5432 product:"PostgreSQL"
|
shodan-query: port:5432 product:"PostgreSQL"
|
||||||
verified: "true"
|
verified: "true"
|
||||||
tags: network,postgresql,db,unauth,enum,psql
|
tags: network,postgresql,db,unauth,enum,psql
|
||||||
|
|
|
@ -9,9 +9,9 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://nmap.org/nsedoc/scripts/smtp-commands.html
|
- https://nmap.org/nsedoc/scripts/smtp-commands.html
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: smtp
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'smtp'
|
|
||||||
tags: network,enum,smtp,mail
|
tags: network,enum,smtp,mail
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://nmap.org/nsedoc/scripts/smtp-enum-users.html
|
- https://nmap.org/nsedoc/scripts/smtp-enum-users.html
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: smtp
|
shodan-query: smtp
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,enum,smtp,mail
|
tags: network,enum,smtp,mail
|
||||||
|
|
|
@ -15,9 +15,9 @@ info:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||||
cvss-score: 5.3
|
cvss-score: 5.3
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,cisco,smi,exposure
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,cisco,smi,exposure
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -9,9 +9,9 @@ info:
|
||||||
- https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20
|
- https://doublepulsar.com/root-bridge-how-thousands-of-internet-connected-android-devices-now-have-no-security-and-are-b46a68cb0f20
|
||||||
- https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge
|
- https://www.hackeracademy.org/how-to-hack-android-device-with-adb-android-debugging-bridge
|
||||||
- https://www.securezoo.com/2018/06/thousands-of-android-devices-leave-debug-port-5555-exposed/
|
- https://www.securezoo.com/2018/06/thousands-of-android-devices-leave-debug-port-5555-exposed/
|
||||||
tags: network,adb,rce,android,exposure
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,adb,rce,android,exposure
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: |
|
description: |
|
||||||
Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.
|
Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
|
||||||
shodan-query: port:2375 product:"docker"
|
shodan-query: port:2375 product:"docker"
|
||||||
|
verified: true
|
||||||
tags: network,docker,exposure
|
tags: network,docker,exposure
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -12,7 +12,7 @@ info:
|
||||||
cvss-score: 7.2
|
cvss-score: 7.2
|
||||||
cwe-id: CWE-306
|
cwe-id: CWE-306
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 4
|
max-request: 1
|
||||||
tags: network,redis,unauth,exposure
|
tags: network,redis,unauth,exposure
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: Apache ZooKeeper was able to be accessed without any required authentication.
|
description: Apache ZooKeeper was able to be accessed without any required authentication.
|
||||||
reference:
|
reference:
|
||||||
- https://zookeeper.apache.org/security.html
|
- https://zookeeper.apache.org/security.html
|
||||||
tags: network,zookeeper,unauth,exposure
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,zookeeper,unauth,exposure
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
- https://dubbo.apache.org/en/docs3-v2/java-sdk/advanced-features-and-usage/security/auth/
|
- https://dubbo.apache.org/en/docs3-v2/java-sdk/advanced-features-and-usage/security/auth/
|
||||||
metadata:
|
metadata:
|
||||||
fofa-query: apache dubbo
|
fofa-query: apache dubbo
|
||||||
max-request: 2
|
max-request: 1
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,dubbo,apache,unauth,misconfig
|
tags: network,dubbo,apache,unauth,misconfig
|
||||||
|
|
||||||
|
|
|
@ -10,7 +10,7 @@ info:
|
||||||
- https://rocketmq.apache.org/docs/bestPractice/03access
|
- https://rocketmq.apache.org/docs/bestPractice/03access
|
||||||
metadata:
|
metadata:
|
||||||
fofa-query: protocol="rocketmq"
|
fofa-query: protocol="rocketmq"
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: title:"RocketMQ"
|
shodan-query: title:"RocketMQ"
|
||||||
verified: true
|
verified: true
|
||||||
tags: network,rocketmq,broker,apache,unauth,misconfig
|
tags: network,rocketmq,broker,apache,unauth,misconfig
|
||||||
|
|
|
@ -8,13 +8,13 @@ info:
|
||||||
ClamAV server 0.99.2, and possibly other previous versions, allow the execution
|
ClamAV server 0.99.2, and possibly other previous versions, allow the execution
|
||||||
of dangerous service commands without authentication. Specifically, the command 'SCAN'
|
of dangerous service commands without authentication. Specifically, the command 'SCAN'
|
||||||
may be used to list system files and the command 'SHUTDOWN' shut downs the service.
|
may be used to list system files and the command 'SHUTDOWN' shut downs the service.
|
||||||
metadata:
|
|
||||||
max-request: 2
|
|
||||||
verified: true
|
|
||||||
shodan-query: 'port:3310 product:"ClamAV" version:"0.99.2"'
|
|
||||||
reference:
|
reference:
|
||||||
- https://seclists.org/nmap-dev/2016/q2/201
|
- https://seclists.org/nmap-dev/2016/q2/201
|
||||||
- https://bugzilla.clamav.net/show_bug.cgi?id=11585
|
- https://bugzilla.clamav.net/show_bug.cgi?id=11585
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: port:3310 product:"ClamAV" version:"0.99.2"
|
||||||
|
verified: true
|
||||||
tags: network,clamav,unauth,seclists,misconfig
|
tags: network,clamav,unauth,seclists,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -5,9 +5,9 @@ info:
|
||||||
author: lu4nx
|
author: lu4nx
|
||||||
severity: high
|
severity: high
|
||||||
description: ClickHouse was able to be accessed with no required authentication in place.
|
description: ClickHouse was able to be accessed with no required authentication in place.
|
||||||
tags: network,clickhouse,unauth,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,clickhouse,unauth,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -6,14 +6,14 @@ info:
|
||||||
severity: low
|
severity: low
|
||||||
description: |
|
description: |
|
||||||
The SSH key exchange algorithm is fundamental to keep the protocol secure. It is what allows two previously unknown parties to generate a shared key in plain sight, and have that secret remain private to the client and server. Over time, some implementations of this algorithm have been identified as weak or vulnerable.
|
The SSH key exchange algorithm is fundamental to keep the protocol secure. It is what allows two previously unknown parties to generate a shared key in plain sight, and have that secret remain private to the client and server. Over time, some implementations of this algorithm have been identified as weak or vulnerable.
|
||||||
remediation: |
|
|
||||||
Disable the weak algorithms.
|
|
||||||
reference: |
|
reference: |
|
||||||
https://www.virtuesecurity.com/kb/ssh-weak-key-exchange-algorithms-enabled
|
https://www.virtuesecurity.com/kb/ssh-weak-key-exchange-algorithms-enabled
|
||||||
|
remediation: |
|
||||||
|
Disable the weak algorithms.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Dropbear sshd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Dropbear sshd"'
|
|
||||||
tags: network,ssh,dropbear,misconfig
|
tags: network,ssh,dropbear,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -6,14 +6,14 @@ info:
|
||||||
severity: low
|
severity: low
|
||||||
description: |
|
description: |
|
||||||
The mac-alg command specifies which MAC algorithms in the SSH client profile for SSH encryption negotiation with an SFTP server when the DataPower Gateway acts as an SFTP client.
|
The mac-alg command specifies which MAC algorithms in the SSH client profile for SSH encryption negotiation with an SFTP server when the DataPower Gateway acts as an SFTP client.
|
||||||
remediation: |
|
|
||||||
Disable MD5 and 96-bit MAC algorithms.
|
|
||||||
reference: |
|
reference: |
|
||||||
https://www.virtuesecurity.com/kb/ssh-weak-mac-algorithms-enabled
|
https://www.virtuesecurity.com/kb/ssh-weak-mac-algorithms-enabled
|
||||||
|
remediation: |
|
||||||
|
Disable MD5 and 96-bit MAC algorithms.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
shodan-query: product:"Dropbear sshd"
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: 'product:"Dropbear sshd"'
|
|
||||||
tags: network,ssh,dropbear,misconfig
|
tags: network,ssh,dropbear,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
|
|
|
@ -7,9 +7,9 @@ info:
|
||||||
description: Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids.
|
description: Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids.
|
||||||
reference:
|
reference:
|
||||||
- http://ganglia.info/
|
- http://ganglia.info/
|
||||||
tags: ganglia,network,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: ganglia,network,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -4,11 +4,11 @@ info:
|
||||||
name: Memcached stats disclosure
|
name: Memcached stats disclosure
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: low
|
severity: low
|
||||||
tags: network,memcached,misconfig
|
|
||||||
description: |
|
description: |
|
||||||
Memcached stats is used to return server statistics such as PID, version, connections, etc.
|
Memcached stats is used to return server statistics such as PID, version, connections, etc.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,memcached,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -10,9 +10,9 @@ info:
|
||||||
- https://book.hacktricks.xyz/pentesting/27017-27018-mongodb
|
- https://book.hacktricks.xyz/pentesting/27017-27018-mongodb
|
||||||
- https://www.mongodb.com/features/mongodb-authentication
|
- https://www.mongodb.com/features/mongodb-authentication
|
||||||
remediation: Enable Authentication in MongoDB
|
remediation: Enable Authentication in MongoDB
|
||||||
tags: network,mongodb,unauth,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,mongodb,unauth,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -9,11 +9,10 @@ info:
|
||||||
- https://github.com/Tinram/MySQL-Brute
|
- https://github.com/Tinram/MySQL-Brute
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
cvss-score: 0.0
|
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,mysql,bruteforce,db,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,mysql,bruteforce,db,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -8,9 +8,9 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://securityforeveryone.com/tools/saprouter-routing-information-leakage-vulnerability-scanner
|
- https://securityforeveryone.com/tools/saprouter-routing-information-leakage-vulnerability-scanner
|
||||||
- https://support.sap.com/en/tools/connectivity-tools/saprouter.html
|
- https://support.sap.com/en/tools/connectivity-tools/saprouter.html
|
||||||
tags: network,sap,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,sap,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
|
@ -9,9 +9,9 @@ info:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||||
cvss-score: 5.3
|
cvss-score: 5.3
|
||||||
cwe-id: CWE-200
|
cwe-id: CWE-200
|
||||||
tags: network,tidb,bruteforce,db,misconfig
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: network,tidb,bruteforce,db,misconfig
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- host:
|
- host:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
description: TiDB server was able to be accessed because no authentication was required.
|
description: TiDB server was able to be accessed because no authentication was required.
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
zoomeye-query: tidb +port:"4000"
|
zoomeye-query: tidb +port:"4000"
|
||||||
tags: network,tidb,unauth,misconfig
|
tags: network,tidb,unauth,misconfig
|
||||||
|
|
||||||
|
|
|
@ -9,7 +9,7 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://www.postgresql.org/docs/9.6/auth-methods.html
|
- https://www.postgresql.org/docs/9.6/auth-methods.html
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
shodan-query: port:5432 product:"PostgreSQL"
|
shodan-query: port:5432 product:"PostgreSQL"
|
||||||
verified: "true"
|
verified: "true"
|
||||||
tags: network,postgresql,db,unauth,misconfig
|
tags: network,postgresql,db,unauth,misconfig
|
||||||
|
|
|
@ -10,11 +10,11 @@ info:
|
||||||
- https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html
|
- https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
cvss-score: 10.0
|
cvss-score: 10
|
||||||
cwe-id: CWE-77
|
cwe-id: CWE-77
|
||||||
tags: clockwatch,rce,network
|
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 2
|
max-request: 1
|
||||||
|
tags: clockwatch,rce,network
|
||||||
|
|
||||||
tcp:
|
tcp:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
|
Loading…
Reference in New Issue