misc tag updates

patch-1
sandeep 2021-04-06 12:16:11 +05:30
parent 7ae14fc96a
commit 8fdfc64e54
122 changed files with 134 additions and 134 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2015-3306
info:
name: ProFTPd RCE
author: pd-team
author: pdteam
severity: high
reference: https://github.com/t0kx/exploit-CVE-2015-3306
description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.

View File

@ -2,7 +2,7 @@ id: CVE-2017-9506
info:
name: Jira IconURIServlet SSRF
author: pd-team
author: pdteam
severity: high
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
tags: cve,cve2017,atlassian,jira,ssrf

View File

@ -2,7 +2,7 @@ id: CVE-2018-7251
info:
name: AnchorCMS Error Log Exposure
author: pd-team
author: pdteam
severity: medium
tags: cve,cve2018,anchorcms,logs

View File

@ -2,7 +2,7 @@ id: CVE-2018-8006
info:
name: Apache ActiveMQ XSS
author: pd-team
author: pdteam
severity: medium
tags: cve,cve2018,apache,activemq,xss

View File

@ -2,7 +2,7 @@ id: CVE-2019-10092
info:
name: Apache mod_proxy HTML Injection / Partial XSS
author: pd-team
author: pdteam
severity: medium
description: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2019-14223
info:
name: Alfresco Share Open Redirect
author: pd-team
author: pdteam
severity: low
description: An issue was discovered in Alfresco Community Edition versions below 5.2.6, 6.0.N and 6.1.N. The Alfresco Share application is vulnerable to an Open Redirect attack via a crafted POST request. By manipulating the POST parameters, an attacker can redirect a victim to a malicious website over any protocol the attacker desires (e.g.,http, https, ftp, smb, etc.).
reference: |

View File

@ -2,7 +2,7 @@ id: CVE-2019-7219
info:
name: Zarafa WebApp Reflected XSS
author: pd-team
author: pdteam
severity: low
description: |
Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0.1.47791 and earlier. NOTE: this is a discontinued product. The issue was fixed in later Zarafa Webapp versions; however, some former Zarafa Webapp customers use the related Kopano product instead.

View File

@ -2,7 +2,7 @@ id: CVE-2019-9955
info:
name: CVE-2019-9955 Zyxel XSS
author: pd-team
author: pdteam
severity: low
tags: cve,cve2019,xss
description: On Zyxel ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200-VPN, ZyWALL 110, ZyWALL 310, ZyWALL 1100 devices, the security firewall login page is vulnerable to Reflected XSS via the unsanitized 'mp_idx' parameter.

View File

@ -2,7 +2,7 @@ id: CVE-2020-17518
info:
name: Apache Flink Upload Path Traversal
author: pd-team
author: pdteam
severity: critical
reference: https://github.com/vulhub/vulhub/tree/master/flink/CVE-2020-17518
description: |

View File

@ -2,7 +2,7 @@ id: CVE-2020-17519
info:
name: Apache Flink directory traversal
author: pd-team
author: pdteam
severity: high
description: A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process.
reference: https://github.com/B1anda0/CVE-2020-17519

View File

@ -2,7 +2,7 @@ id: CVE-2020-1943
info:
name: Apache OFBiz Reflected XSS
author: pd-team
author: pdteam
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
severity: medium
tags: cve,cve2020,apache,xss

View File

@ -2,7 +2,7 @@ id: activemq-default-login
info:
name: Apache ActiveMQ Default Credentials
author: pd-team
author: pdteam
severity: medium
tags: apache,activemq,dlogin

View File

@ -2,7 +2,7 @@ id: ambari-default-credentials
info:
name: Apache Ambari Default Credentials
author: pd-team
author: pdteam
severity: medium
tags: ambari,dlogin

View File

@ -2,7 +2,7 @@ id: ofbiz-default-credentials
info:
name: Apache OfBiz Default Credentials
author: pd-team
author: pdteam
severity: medium
tags: ofbiz,dlogin

View File

@ -2,7 +2,7 @@ id: zabbix-default-credentials
info:
name: Zabbix Default Credentials
author: pd-team
author: pdteam
severity: critical
tags: zabbix,dlogin

View File

@ -2,7 +2,7 @@ id: cname-service-detector
info:
name: 3rd party service checker
author: pd-team
author: pdteam
severity: info
tags: dns

View File

@ -2,7 +2,7 @@ id: servfail-refused-hosts
info:
name: Servfail Host Finder
author: pd-team
author: pdteam
severity: info
tags: dns

View File

@ -2,7 +2,7 @@ id: active-admin-exposure
info:
name: ActiveAdmin Admin Dasboard Exposure
author: pd-team
author: pdteam
severity: info
requests:

View File

@ -2,7 +2,7 @@ id: activemq-panel
info:
name: Apache ActiveMQ Exposure
author: pd-team
author: pdteam
severity: info
requests:

View File

@ -2,7 +2,7 @@ id: airflow-exposure
info:
name: Apache Airflow Exposure / Unauthenticated Access
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: ambari-exposure
info:
name: Apache Ambari Exposure / Unauthenticated Access
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: ansible-tower-exposure
info:
name: Ansible Tower Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: citrix-vpn-detect
info:
name: Citrix VPN Detection
author: pd-team
author: pdteam
severity: info
requests:

View File

@ -2,7 +2,7 @@ id: couchdb-fauxton
info:
name: Apache CouchDB Fauxton Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: django-admin-panel
info:
name: Python Django Admin Panel
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: druid-console-exposure
info:
name: Alibaba Druid Console Exposure
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: exposed-pagespeed-global-admin
info:
name: Apache PageSpeed Global Admin Dashboard Exposure
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: exposed-webalizer
info:
name: Publicly exposed Webalizer Interface
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: flink-exposure
info:
name: Apache Flink Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: hadoop-exposure
info:
name: Apache Hadoop Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: kafka-connect-ui
info:
name: Apache Kafka Connect UI Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: kafka-monitoring
info:
name: Apache Kafka Monitor Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: kafka-topics-ui
info:
name: Apache Kafka Topics UI Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: kubernetes-dashboard
info:
name: Kubernetes Console Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: parallels-html-client
info:
name: Parallels HTML5 Client
author: pd-team
author: pdteam
severity: info
requests:

View File

@ -2,7 +2,7 @@ id: phpmyadmin-panel
info:
name: phpMyAdmin Panel
author: pd-team
author: pdteam
severity: info
requests:

View File

@ -2,7 +2,7 @@ id: rocketmq-console-exposure
info:
name: Apache RocketMQ Console Exposure
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: selenoid-ui-exposure
info:
name: Selenoid UI Dashboard Exposure
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: setup-page-exposure
info:
name: Zenphoto Setup Page Exposure
author: pd-team
author: pdteam
severity: medium
description: Misconfiguration on Zenphoto version < 1.5.X which lead to sensitive information disclosure

View File

@ -2,7 +2,7 @@ id: solr-exposure
info:
name: Apache Solr Exposure
author: pd-team
author: pdteam
severity: medium
requests:

View File

@ -2,7 +2,7 @@ id: yarn-manager-exposure
info:
name: Apache Yarn ResourceManager Exposure / Unauthenticated Access
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -2,7 +2,7 @@ id: zipkin-exposure
info:
name: Zipkin Exposure
author: pd-team
author: pdteam
severity: low
requests:

View File

@ -4,7 +4,7 @@ info:
name: OpenAPI
author: pdteam
severity: info
tags: exposures,api
tags: exposure,api
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Public Swagger API
author: pdteam
severity: info
tags: exposures,api,swagger
tags: exposure,api,swagger
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: wadl file disclosure
author: 0xrudra & manuelbua
severity: info
tags: exposures,api
tags: exposure,api
reference: |
- https://github.com/dwisiswant0/wadl-dumper
- https://www.nopsec.com/leveraging-exposed-wadl-xml-in-burp-suite/

View File

@ -4,7 +4,7 @@ info:
name: wsdl-detect
author: jarijaas
severity: info
tags: exposures,api
tags: exposure,api
description: Detects web services that have WSDL (https://www.w3.org/TR/wsdl/)
requests:

View File

@ -4,7 +4,7 @@ info:
name: settings.php information disclosure
author: sheikhrishad
severity: medium
tags: exposures,backup
tags: exposure,backup
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: MySQL Dump Files
author: geeknik & @dwisiswant0
severity: medium
tags: exposures,backup
tags: exposure,backup
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Compressed Web File
author: Toufik Airane & @dwisiswant0
severity: medium
tags: exposures,backup
tags: exposure,backup
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: airflow-configuration-exposure
info:
name: Apache Airflow Configuration Exposure
author: pd-team
author: pdteam
severity: medium
tags: exposures,config
tags: exposure,config
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Alibaba Canal Info Leak
author: pikpikcu
severity: info
tags: config,exposures
tags: config,exposure
# https://github.com/alibaba/canal/issues/632
# https://netty.io/wiki/reference-counted-objects.html

View File

@ -2,9 +2,9 @@ id: amazon-docker-config-disclosure
info:
name: Dockerrun AWS Configuration Exposure
author: pd-team
author: pdteam
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: ansible-config-disclosure
info:
name: Ansible Configuration Exposure
author: pd-team
author: pdteam
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: AWStats config
author: sheikhrishad
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: AWStats script
author: sheikhrishad
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: geeknik
severity: low
reference: https://circleci.com/docs/2.0/sample-config/
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: circleci ssh-config exposure
author: geeknik
severity: low
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: composer-config-file
author: Mahendra Purbia (Mah3Sec_)
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: docker-compose.yml exposure
author: meme-lord & blckraven & geeknik
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: pikpikcu
severity: high
reference: https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo
severity: low
reference: https://www.bitkeeper.org/man/config-etc.html
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo
severity: low
reference: http://doc.bazaar.canonical.com/beta/en/user-reference/configuration-help.html
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: daffainfo
severity: low
reference: http://darcs.net/Using/Configuration#sources
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed HG Directory
author: daffainfo
severity: low
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed SVN Directory
author: udit_thakkur & dwisiswant0
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: FTP credentials exposure
author: pikpikcu
severity: medium
tags: config,ftp,exposures
tags: config,ftp,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
author: organiccrap
severity: medium
description: Nginx off-by-slash vulnerability exposes Git configuration.
tags: config,exposures
tags: config,exposure
reference: https://twitter.com/Random_Robbie/status/1262676628167110656
requests:

View File

@ -2,10 +2,10 @@ id: git-config
info:
name: Git Config Disclosure
author: pd-team & pikpikcu
author: pdteam & pikpikcu
severity: medium
description: Searches for the pattern /.git/config on passed URLs.
tags: config,git,exposures
tags: config,git,exposure
requests:
- raw:

View File

@ -5,7 +5,7 @@ info:
author: geeknik
severity: info
description: https://developers.google.com/gmail/api/auth/web-server
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: dhiyaneshDK
severity: low
reference: https://hackerone.com/reports/1026196
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: alperenkesk
severity: low
reference: https://www.exploit-db.com/exploits/44734
tags: scada,config,exposures
tags: scada,config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Detect exposed .htpasswd files
author: geeknik
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: oppsec
severity: low
description: configuration.php-dist is a file created by Joomla to save Joomla settings.
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Laravel .env file
author: pxmme1337 & dwisiswant0 & geeknik & emenalf
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Lvmeng UTS Disclosure
author: pikpikcu
severity: high
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -3,7 +3,7 @@ info:
name: Magento Config Disclosure
author: geeknik
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
description: The .netrc file contains login and initialization information used by the auto-login process.
reference: https://www.gnu.org/software/inetutils/manual/html_node/The-_002enetrc-file.html
severity: high
tags: netrc,config,exposures
tags: netrc,config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: opcache-status-exposure
info:
name: OPcache Status Exposure
author: pd-team
author: pdteam
severity: low
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: owncloud config Disclosure
author: Mahendra Purbia (Mah3Sec_)
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: geeknik & afaq
severity: info
description: All npm packages contain a file, usually in the project root, called package.json - this file holds various metadata relevant to the project.
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: perl-status
info:
name: Apache mod_perl Status Page Exposure
author: pd-team
author: pdteam
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: phpinfo-files
info:
name: phpinfo Disclosure
author: pd-team & daffainfo & meme-lord
author: pdteam & daffainfo & meme-lord
severity: low
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: rails-database-config
info:
name: Ruby-on-Rails Database Configuration Exposure
author: pd-team
author: pdteam
severity: low
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
author: geeknik
description: Redmine is a flexible project management web application written using Ruby on Rails framework - https://redmine.org/projects/redmine
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: pikpikcu
severity: high
reference: https://www.cnblogs.com/cHr1s/p/14499858.html
tags: ruijie,config,exposures
tags: ruijie,config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Detect Private SSH and TLS Keys
author: geeknik
severity: high
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: SFTP credentials exposure
author: sheikhrishad
severity: medium
tags: config,ftp,exposures
tags: config,ftp,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: SymfonyProfiler information leakage
author: wabafet
severity: medium
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: symfony-database-config
info:
name: Symfony Database Configuration Exposure
author: pd-team
author: pdteam
severity: high
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -2,9 +2,9 @@ id: symfony-profiler
info:
name: Symfony Profiler
author: pd-team
author: pdteam
severity: high
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -3,7 +3,7 @@ info:
name: Web Config file
author: Yash Anand @yashanand155
severity: info
tags: config,exposures
tags: config,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: X Prober server information leakage
author: pdteam
severity: low
tags: config,exposures
tags: config,exposure
reference: https://twitter.com/bugbounty_tips/status/1339984643517423616
requests:

View File

@ -5,7 +5,7 @@ info:
author: oppsec
severity: info
description: Bower is a package manager which stores packages informations in bower.json file
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
author: gevakun
severity: low
reference: https://twitter.com/Wh11teW0lf/status/1295594085445709824
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Drupal Install
author: NkxxkN
severity: low
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Directory Listing via DS_Store
author: 0w4ys
severity: info
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Exposed Spring Data REST Application-Level Profile Semantics (ALPS)
author: dwisiswant0
severity: medium
tags: file,exposures
tags: file,exposure
reference: https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
requests:

View File

@ -4,7 +4,7 @@ info:
name: Filezilla
author: amsda
severity: medium
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -3,7 +3,7 @@ info:
name: Keycloak Json File
author: oppsec
severity: info
tags: file,exposures
tags: file,exposure
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Lazy File Manager
author: amsda
severity: medium
tags: file,exposures
tags: file,exposure
requests:
- method: GET

Some files were not shown because too many files have changed in this diff Show More