moving apache templates to apache directory

patch-1
sandeep 2021-11-21 14:26:39 +05:30
parent 45073c7b88
commit 80db01c68c
4 changed files with 12 additions and 9 deletions

View File

@ -1,13 +1,14 @@
id: apache-filename-brute-force id: apache-filename-enum
info: info:
name: Apache Filename Brute Force name: Apache Filename Enumeration
author: geeknik author: geeknik
description: If the client provides an invalid Accept header, the server will respond with a 406 Not Acceptable error containing a pseudo directory listing. description: If the client provides an invalid Accept header, the server will respond with a 406 Not Acceptable error containing a pseudo directory listing.
reference: reference:
- https://hackerone.com/reports/210238 - https://hackerone.com/reports/210238
- https://www.acunetix.com/vulnerabilities/web/apache-mod_negotiation-filename-bruteforcing/ - https://www.acunetix.com/vulnerabilities/web/apache-mod_negotiation-filename-bruteforcing/
severity: low severity: low
tags: apache tags: apache,misconfig
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Apache Hbase Unauth name: Apache Hbase Unauth
author: pikpikcu author: pikpikcu
severity: medium severity: medium
tags: apache,unauth tags: apache,unauth,misconfig
requests: requests:
- method: GET - method: GET

View File

@ -4,7 +4,7 @@ info:
name: Apache Storm Unauth name: Apache Storm Unauth
author: pikpikcu author: pikpikcu
severity: medium severity: medium
tags: apache,unauth tags: apache,unauth,misconfig
requests: requests:
- method: GET - method: GET
@ -15,13 +15,15 @@ requests:
matchers: matchers:
- type: word - type: word
part: body
words: words:
- '\"totalMem\":' - '"totalMem":'
- '\"stormVersion\":' - '"stormVersion":'
- type: word - type: word
part: header
words: words:
- 'text/plain' - 'text/plain'
part: header
- type: status - type: status
status: status:

View File

@ -6,7 +6,7 @@ info:
severity: low severity: low
description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection. description: The following example scripts that come with Apache Tomcat v4.x - v7.x and can be used by attackers to gain information about the system. These scripts are also known to be vulnerable to cross site scripting (XSS) injection.
reference: https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks reference: https://www.rapid7.com/db/vulnerabilities/apache-tomcat-example-leaks
tags: apache tags: apache,misconfig
requests: requests:
- method: GET - method: GET