parent
4f987317c6
commit
690da7dd94
|
@ -1,16 +1,20 @@
|
||||||
id: qnap-qts-panel
|
id: qnap-qts-panel
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: QNAP QTS Panel
|
name: QNAP - QTS Panel Discovery
|
||||||
author: idealphase
|
author: idealphase
|
||||||
severity: info
|
severity: info
|
||||||
description: |
|
description: |
|
||||||
Simple, Secure, Scalable & Reliable, Based on Linux, QTS 4 is designed to deliver high-performance applications and services fulfilling your needs in file sharing, storage management, backup, virtual environments, multimedia, surveillance and more.
|
QNAP QTS Panel was discovered.
|
||||||
reference:
|
reference:
|
||||||
- https://www.qnap.com/en/qts4/con_show.php?op=showone&cid=1
|
- https://www.qnap.com/en?ref=header_logo
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: product:"QNAP"
|
shodan-query: product:"QNAP"
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cwe-id: CWE-200
|
||||||
tags: panel,qnap,qts
|
tags: panel,qnap,qts
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -28,3 +32,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,13 +1,18 @@
|
||||||
id: git-config-nginxoffbyslash
|
id: git-config-nginxoffbyslash
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Nginx off-by-slash exposes Git config
|
name: Nginx - Git Configuration Exposure
|
||||||
author: organiccrap
|
author: organiccrap
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Nginx off-by-slash vulnerability exposes Git configuration.
|
description: Nginx is vulnerable to git configuration exposure.
|
||||||
reference:
|
reference:
|
||||||
|
- https://beaglesecurity.com/blog/vulnerability/nginx-off-by-slash-exposes-git-config.html
|
||||||
- https://twitter.com/Random_Robbie/status/1262676628167110656
|
- https://twitter.com/Random_Robbie/status/1262676628167110656
|
||||||
- https://github.com/PortSwigger/nginx-alias-traversal/blob/master/off-by-slash.py
|
- https://github.com/PortSwigger/nginx-alias-traversal/blob/master/off-by-slash.py
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||||
|
cvss-score: 5.3
|
||||||
|
cwe-id: CWE-200
|
||||||
tags: config,exposure,nginx
|
tags: config,exposure,nginx
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -29,3 +34,5 @@ requests:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- '[core]'
|
- '[core]'
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/26
|
||||||
|
|
|
@ -1,16 +1,20 @@
|
||||||
id: elFinder-path-traversal
|
id: elFinder-path-traversal
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: elFinder - Path Traversal
|
name: elFinder <=2.1.12 - Local File Inclusion
|
||||||
author: ritikchaddha
|
author: ritikchaddha
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
Connector.minimal.php in std42 elFinder through 2.1.12 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
elFinder through 2.1.12 is vulnerable to local file inclusion via Connector.minimal.php in std42. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
||||||
reference:
|
reference:
|
||||||
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
|
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
|
||||||
metadata:
|
metadata:
|
||||||
verified: true
|
verified: true
|
||||||
shodan-query: title:"elfinder"
|
shodan-query: title:"elfinder"
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: lfi,elfinder
|
tags: lfi,elfinder
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -29,3 +33,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/26
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
id: ewebs-arbitrary-file-reading
|
id: ewebs-arbitrary-file-reading
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: EWEBS casmain.xgi arbitrary file reading vulnerability
|
name: EWEBS - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
description: A vulnerability in EWEBS's 'casmain.xgi' endpoint allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter.
|
description: EWEBS is vulnerable to local file inclusion and allows remote attackers to disclose the content of locally stored files via the 'Language_S' parameter supplied to the 'casmain.xgi' endpoint.
|
||||||
reference:
|
reference:
|
||||||
- http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
|
- http://wiki.peiqi.tech/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E6%9E%81%E9%80%9AEWEBS/%E6%9E%81%E9%80%9AEWEBS%20casmain.xgi%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.html
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: ewebs,lfi
|
tags: ewebs,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -30,3 +34,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,17 @@
|
||||||
id: feifeicms-lfr
|
id: feifeicms-lfr
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: FeiFeiCms Local File Read
|
name: FeiFeiCms - Local File Inclusion
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: high
|
severity: high
|
||||||
|
description: FeiFeiCms is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://www.cnblogs.com/jinqi520/p/10202615.html
|
- https://www.cnblogs.com/jinqi520/p/10202615.html
|
||||||
- https://gitee.com/daicuo/feifeicms
|
- https://gitee.com/daicuo/feifeicms
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: feifeicms,lfi
|
tags: feifeicms,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -28,3 +33,5 @@ requests:
|
||||||
- "db_host"
|
- "db_host"
|
||||||
condition: and
|
condition: and
|
||||||
part: body
|
part: body
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: finereport-path-traversal
|
id: finereport-path-traversal
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: FineReport 8.0 Path Traversal
|
name: FineReport 8.0 - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: medium
|
severity: medium
|
||||||
|
description: FIneReport 8.0 is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- http://foreversong.cn/archives/1378
|
- http://foreversong.cn/archives/1378
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: finereport,lfi
|
tags: finereport,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -26,3 +31,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: flir-path-traversal
|
id: flir-path-traversal
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Flir Path Traversal
|
name: Flir - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: Flir is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://juejin.cn/post/6961370156484263972
|
- https://juejin.cn/post/6961370156484263972
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: flir,lfi
|
tags: flir,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -24,3 +29,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
id: geowebserver-lfi
|
id: geowebserver-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GeoVision Geowebserver 5.3.3 - LFI
|
name: GeoVision Geowebserver 5.3.3 - Local File Inclusion
|
||||||
author: madrobot
|
author: madrobot
|
||||||
severity: high
|
severity: high
|
||||||
description: A vulnerability in GeoVision Geowebserver allows remote unauthenticated attackers to disclose the content of locally stored files.
|
description: GeoVision Geowebserver 5.3.3 allows remote unauthenticated attackers to disclose the content of locally stored files via local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: geowebserver,lfi
|
tags: geowebserver,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -29,3 +33,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
id: geowebserver-xss
|
id: geowebserver-xss
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GeoVision Geowebserver 5.3.3 - XSS
|
name: GeoVision Geowebserver 5.3.3 - Cross-Site Scripting
|
||||||
author: madrobot
|
author: madrobot
|
||||||
severity: medium
|
severity: medium
|
||||||
description: GEOVISION GEOWEBSERVER =< 5.3.3 are vulnerable to several XSS / HTML Injection / Local File Include / XML Injection / Code execution vectors. The application fails to properly sanitize user requests.
|
description: GeoVision Geowebserver 5.3.3 and prior versions are vulnerable to several cross-site scripting / HTML injection / local file inclusion / XML injection / code execution vectors because the application fails to properly sanitize user requests.
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
- https://packetstormsecurity.com/files/163860/geovisiongws533-lfixssxsrfexec.txt
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: geowebserver,xss
|
tags: geowebserver,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -32,3 +36,5 @@ requests:
|
||||||
part: header
|
part: header
|
||||||
words:
|
words:
|
||||||
- text/html
|
- text/html
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,17 @@
|
||||||
id: global-domains-lfi
|
id: global-domains-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Global Domains International Directory traversal Vulnerability
|
name: Global Domains International - Local File Inclusion
|
||||||
author: 0x_Akoko
|
author: 0x_Akoko
|
||||||
severity: high
|
severity: high
|
||||||
|
description: Global Domains International is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://cxsecurity.com/issue/WLB-2018020247
|
- https://cxsecurity.com/issue/WLB-2018020247
|
||||||
- http://www.nic.ws
|
- http://www.nic.ws
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: globaldomains,lfi,traversal
|
tags: globaldomains,lfi,traversal
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -23,3 +28,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -4,12 +4,15 @@ info:
|
||||||
name: GoIP-1 GSM - Local File Inclusion
|
name: GoIP-1 GSM - Local File Inclusion
|
||||||
author: gy741
|
author: gy741
|
||||||
severity: high
|
severity: high
|
||||||
description: Input passed thru the 'content' or 'sidebar' GET parameter in 'frame.html' or 'frame.A100.html' not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker
|
description: GoIP-1 GSM is vulnerable to local file inclusion because input passed thru the 'content' or 'sidebar' GET parameter in 'frame.html' or 'frame.A100.html' is not properly sanitized before being used to read files. This can be exploited by an unauthenticated attacker to read arbitrary files on the affected system.
|
||||||
to read arbitrary files on the affected system.
|
|
||||||
reference:
|
reference:
|
||||||
- https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/
|
- https://shufflingbytes.com/posts/hacking-goip-gsm-gateway/
|
||||||
- http://www.hybertone.com/uploadfile/download/20140304125509964.pdf
|
- http://www.hybertone.com/uploadfile/download/20140304125509964.pdf
|
||||||
- http://en.dbltek.com/latestfirmwares.html
|
- http://en.dbltek.com/latestfirmwares.html
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: gsm,goip,lfi,iot
|
tags: gsm,goip,lfi,iot
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -22,3 +25,5 @@ requests:
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
- "root:.*:0:0:"
|
- "root:.*:0:0:"
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,17 @@
|
||||||
id: groupoffice-lfi
|
id: groupoffice-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Groupoffice 3.4.21 Directory Traversal Vulnerability
|
name: Groupoffice 3.4.21 - Local File Inclusion
|
||||||
author: 0x_Akoko
|
author: 0x_Akoko
|
||||||
severity: high
|
severity: high
|
||||||
|
description: Groupoffice 3.4.21 is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://cxsecurity.com/issue/WLB-2018020249
|
- https://cxsecurity.com/issue/WLB-2018020249
|
||||||
- http://www.group-office.com
|
- http://www.group-office.com
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: groupoffice,lfi,traversal
|
tags: groupoffice,lfi,traversal
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -24,3 +29,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: gsoap-lfi
|
id: gsoap-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: gSOAP 2.8 - Directory Traversal
|
name: gSOAP 2.8 - Local File Inclusion
|
||||||
author: 0x_Akoko
|
author: 0x_Akoko
|
||||||
|
description: gSOAP 2.8 is vulnerable to local file inclusion.
|
||||||
severity: high
|
severity: high
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/47653
|
- https://www.exploit-db.com/exploits/47653
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: gsoap,lfi
|
tags: gsoap,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -27,3 +32,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: hanming-lfr
|
id: hanming-lfr
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Hanming Video Conferencing File Read
|
name: Hanming Video Conferencing - Local File Inclusion
|
||||||
author: ritikchaddha
|
author: ritikchaddha
|
||||||
severity: high
|
severity: high
|
||||||
|
description: Hanming Video Conferencing is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://mp.weixin.qq.com/s/F-M21PT0xn9QOuwoC8llKA
|
- https://mp.weixin.qq.com/s/F-M21PT0xn9QOuwoC8llKA
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: lfr,hanming,lfi
|
tags: lfr,hanming,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -28,3 +33,5 @@ requests:
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
- "root:[x*]:0:0:"
|
- "root:[x*]:0:0:"
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: hjtcloud-arbitrary-file-read
|
id: hjtcloud-arbitrary-file-read
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: HJTcloud Arbitrary File Read
|
name: HJTcloud - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: HJTcloud is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
|
- https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: hjtcloud,lfi
|
tags: hjtcloud,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -38,3 +43,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -4,6 +4,7 @@ info:
|
||||||
name: UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
|
name: UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read
|
||||||
author: hackerarpan
|
author: hackerarpan
|
||||||
severity: high
|
severity: high
|
||||||
|
description: UniSharp Larevel File Manager 2.0.0 is vulnerable to arbitrary file read.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/48166
|
- https://www.exploit-db.com/exploits/48166
|
||||||
- https://github.com/UniSharp/laravel-filemanager
|
- https://github.com/UniSharp/laravel-filemanager
|
||||||
|
@ -27,3 +28,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,19 +1,14 @@
|
||||||
id: mcafee-epo-rce
|
id: mcafee-epo-rce
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: McAfee ePolicy Orchestrator RCE
|
name: McAfee ePolicy Orchestrator - Arbitrary File Upload
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
A ZipSlip vulnerability in McAfee ePolicy Orchestrator (ePO)
|
McAfee ePolicy Orchestrator (ePO) is vulnerable to a ZipSlip vulnerability which allows arbitrary file upload when archives are unpacked if the names of the packed files are not properly sanitized. An attacker can create archives with files containing "../" in their names, making it possible to upload arbitrary files to arbitrary directories or overwrite existing ones during archive extraction.
|
||||||
is a type of Path Traversal occurring when archives are unpacked
|
|
||||||
if the names of the packed files are not properly sanitized.
|
|
||||||
An attacker can create archives with files containing "../" in their names,
|
|
||||||
making it possible to upload arbitrary files
|
|
||||||
to arbitrary directories or overwrite existing ones during archive extraction.
|
|
||||||
reference:
|
reference:
|
||||||
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||||||
tags: mcafee,rce
|
tags: mcafee,rce,
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -32,3 +27,5 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- "Volume (in drive [A-Z]|Serial Number) is"
|
- "Volume (in drive [A-Z]|Serial Number) is"
|
||||||
part: body
|
part: body
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
id: metinfo-lfi
|
id: metinfo-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: MetInfo 6.0.0/6.1.0 LFI
|
name: MetInfo <=6.1.0 - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
description: A vulnerability in MetInfo allows remote unauthenticated attackers access to locally stored files and their content.
|
description: MetInfo 6.0.0 through 6.1.0 is vulnerable to local file inclusion and allows remote unauthenticated attackers access to locally stored files and their content.
|
||||||
reference:
|
reference:
|
||||||
- https://paper.seebug.org/676/
|
- https://paper.seebug.org/676/
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: metinfo,lfi
|
tags: metinfo,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -30,3 +34,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,12 +1,16 @@
|
||||||
id: minimouse-lfi
|
id: minimouse-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Mini Mouse 9.2.0 - Path Traversal
|
name: Mini Mouse 9.2.0 - Local File Inclusion
|
||||||
author: 0x_Akoko
|
author: 0x_Akoko
|
||||||
severity: high
|
severity: high
|
||||||
description: A vulnerability in Mini Mouse allows remote unauthenticated attackers to include and disclose the content of locally stored files via the 'file' parameter.
|
description: Mini Mouse 9.2.0 is vulnerable to local file inclusion because it allows remote unauthenticated attackers to include and disclose the content of locally stored files via the 'file' parameter.
|
||||||
reference:
|
reference:
|
||||||
- https://www.exploit-db.com/exploits/49744
|
- https://www.exploit-db.com/exploits/49744
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: minimouse,lfi
|
tags: minimouse,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -27,3 +31,5 @@ requests:
|
||||||
- "extensions"
|
- "extensions"
|
||||||
condition: and
|
condition: and
|
||||||
part: body
|
part: body
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: mpsec-lfi
|
id: mpsec-lfi
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: MPSec ISG1000 Local File Read
|
name: MPSec ISG1000 - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: MPSec ISG1000 is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://twitter.com/sec715/status/1402884871173795842
|
- https://twitter.com/sec715/status/1402884871173795842
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: mpsec,lfi
|
tags: mpsec,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -31,3 +36,5 @@ requests:
|
||||||
words:
|
words:
|
||||||
- "text/plain"
|
- "text/plain"
|
||||||
part: header
|
part: header
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: myucms-lfr
|
id: myucms-lfr
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: MyuCMS Local File Read
|
name: MyuCMS - Local File Inclusion
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: high
|
severity: high
|
||||||
|
description: MyuCMS is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://blog.csdn.net/yalecaltech/article/details/104908257
|
- https://blog.csdn.net/yalecaltech/article/details/104908257
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: myucms,lfi
|
tags: myucms,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -16,3 +21,5 @@ requests:
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
- "root:.*:0:0:"
|
- "root:.*:0:0:"
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,11 +1,16 @@
|
||||||
id: natshell-path-traversal
|
id: natshell-path-traversal
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: NatShell Path Traversal
|
name: NatShell - Local File Inclusion
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
|
description: NatShell is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
|
- https://mp.weixin.qq.com/s/g4YNI6UBqIQcKL0TRkKWlw
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
metadata:
|
metadata:
|
||||||
fofa-query: title="蓝海卓越计费管理系统"
|
fofa-query: title="蓝海卓越计费管理系统"
|
||||||
tags: natshell,lfi
|
tags: natshell,lfi
|
||||||
|
@ -25,3 +30,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
|
@ -1,13 +1,17 @@
|
||||||
id: nginx-merge-slashes-path-traversal
|
id: nginx-merge-slashes-path-traversal
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Nginx Merge Slashes Path Traversal
|
name: Nginx Server - Local File Inclusion
|
||||||
author: dhiyaneshDk
|
author: dhiyaneshDk
|
||||||
severity: medium
|
severity: medium
|
||||||
description: A vulnerability in the remote Nginx server could cause the server to merge slashslash together causing what should have protected the web site from a directory traversal vulnerability into a vulnerable server.
|
description: Nginx server is vulnerable to local file inclusion.
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json
|
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/nginx-merge-slashes-path-traversal.json
|
||||||
- https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d
|
- https://medium.com/appsflyer/nginx-may-be-protecting-your-applications-from-traversal-attacks-without-you-even-knowing-b08f882fd43d
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-22
|
||||||
tags: exposure,config,lfi,nginx
|
tags: exposure,config,lfi,nginx
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
@ -31,3 +35,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/07/27
|
||||||
|
|
Loading…
Reference in New Issue