diff --git a/exposures/logs/zm-system-log-detect.yaml b/exposures/logs/zm-system-log-detect.yaml new file mode 100644 index 0000000000..72e583915e --- /dev/null +++ b/exposures/logs/zm-system-log-detect.yaml @@ -0,0 +1,23 @@ +id: zm-system-log-detect +info: + name: zm-system-log-detect + author: pussycat0x + severity: low + reference: https://www.exploit-db.com/ghdb/6926 + tags: logs,zm,exposure + +requests: + - method: GET + path: + - "{{BaseURL}}/?view=log" + - "{{BaseURL}}zm/?view=log" + + matchers-condition: and + matchers: + - type: word + words: + - "ZM - System Log" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/iot/brother-printer-detect.yaml b/iot/brother-printer-detect.yaml new file mode 100644 index 0000000000..b0a3efc054 --- /dev/null +++ b/iot/brother-printer-detect.yaml @@ -0,0 +1,23 @@ +id: brother-printer-detect + +info: + name: Brother Printer + author: pussycat0x + severity: low + reference: https://www.exploit-db.com/ghdb/6889 + tags: iot,printer,tech + +requests: + - method: GET + path: + - "{{BaseURL}}/general/status.html" + + matchers-condition: and + matchers: + - type: word + words: + - "Brother Industries" + + - type: status + status: + - 200 \ No newline at end of file diff --git a/iot/hp-device-info-detect.yaml b/iot/hp-device-info-detect.yaml new file mode 100644 index 0000000000..f308cd0a9c --- /dev/null +++ b/iot/hp-device-info-detect.yaml @@ -0,0 +1,22 @@ +id: hp-device-info-detect +info: + name: HP LaserJet + author: pussycat0x + severity: low + reference: https://www.exploit-db.com/ghdb/6905 + tags: iot,hp +requests: + - method: GET + path: + - "{{BaseURL}}/hp/device/DeviceInformation/View" + matchers-condition: and + matchers: + - type: word + words: + - "Device Information" + - "hp" + condition: and + + - type: status + status: + - 200 \ No newline at end of file diff --git a/iot/unauthorized-brother-access-detect.yaml b/iot/unauthorized-brother-access-detect.yaml new file mode 100644 index 0000000000..17abe4ddfc --- /dev/null +++ b/iot/unauthorized-brother-access-detect.yaml @@ -0,0 +1,25 @@ +id: brother-unauthorized-access-detect + +info: + name: Brother Printer + author: pussycat0x + severity: medium + reference: https://www.exploit-db.com/ghdb/6889 + tags: iot,printer + +requests: + - method: GET + path: + - "{{BaseURL}}/net/net/net.html" + + matchers-condition: and + matchers: + - type: word + words: + - "Brother Industries" + - "Network Status" + condition: and + + - type: status + status: + - 200 diff --git a/misconfiguration/unauthorized-hp-printer.yaml b/misconfiguration/unauthorized-hp-printer.yaml new file mode 100644 index 0000000000..9f69be01e2 --- /dev/null +++ b/misconfiguration/unauthorized-hp-printer.yaml @@ -0,0 +1,24 @@ +id: unauthorized-hp-printer + +info: + name: Unauthorized HP Printer + author: pussycat0x + severity: high + tags: hp,iot,unauth + +requests: + - method: GET + path: + - "{{BaseURL}}/SSI/Auth/ip_snmp.htm" + + matchers-condition: and + matchers: + - type: word + words: + - "HP" + - "

SNMP

" + condition: and + + - type: status + status: + - 200 diff --git a/misconfiguration/wamp-server-configuration.yaml b/misconfiguration/wamp-server-configuration.yaml new file mode 100644 index 0000000000..43b8b708f1 --- /dev/null +++ b/misconfiguration/wamp-server-configuration.yaml @@ -0,0 +1,24 @@ +id: wamp-server-configuration + +info: + name: default-wamp-server-page + author: pussycat0x + severity: medium + description: Wamp default page will expose sensitive configuration and vhosts. + reference: https://www.exploit-db.com/ghdb/6891. + tags: wamp + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: dsl + dsl: + - 'contains(tolower(body), "wampserver")' + + - type: status + status: + - 200 diff --git a/network/ftp-default-creds.yaml b/network/ftp-default-creds.yaml new file mode 100644 index 0000000000..18bef48e05 --- /dev/null +++ b/network/ftp-default-creds.yaml @@ -0,0 +1,33 @@ +id: ftp-default-credentials + +info: + name: FTP Service with default credentials + author: pussycat0x + severity: critical + tags: network,ftp,default-login + +network: + - payloads: + username: + - admin + - root + - anonymous + password: + - anonymous + - password + - toor + - nas + - guest + - default + - pass1 + - stingray + + attack: clusterbomb + inputs: + - data: "USER {{username}}\r\nPASS {{password}}\r\n" + host: + - "{{Hostname}}:21" + matchers: + - type: word + words: + - "230" \ No newline at end of file diff --git a/technologies/crush-ftp-detect.yaml b/technologies/crush-ftp-detect.yaml new file mode 100644 index 0000000000..ec9d334733 --- /dev/null +++ b/technologies/crush-ftp-detect.yaml @@ -0,0 +1,21 @@ +id: crush-ftp-detect + +info: + name: Crush FTP + author: pussycat0x + severity: info + tags: tech,ftp +requests: + - method: GET + path: + - "{{BaseURL}}/WebInterface/login.html" + + redirects: true + matchers-condition: and + matchers: + - type: word + words: + - "CrushFTP WebInterface" + - type: status + status: + - 200 \ No newline at end of file diff --git a/technologies/web-ftp-detect.yaml b/technologies/web-ftp-detect.yaml new file mode 100644 index 0000000000..1b3b439a07 --- /dev/null +++ b/technologies/web-ftp-detect.yaml @@ -0,0 +1,23 @@ +id: web-ftp-detect + +info: + name: Web FTP Detection + author: pussycat0x + severity: info + reference: https://www.exploit-db.com/ghdb/7013 + tags: webftp,tech,ftp + +requests: + - method: GET + path: + - "{{BaseURL}}/cgi-bin/upload/web-ftp.cgi" + + matchers-condition: and + matchers: + - type: word + words: + - "Web-FTP" + - "square login" + - type: status + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml b/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml new file mode 100644 index 0000000000..d5ea2cb71b --- /dev/null +++ b/vulnerabilities/wordpress/wp-plugin-lifterlms.yaml @@ -0,0 +1,25 @@ +id: wordpress-plugins-lifterlms + +info: + name: WordPress Plugin lifterlms Listing + author: pussycat0x + severity: low + description: Searches for sensitive directories present in the wordpress-plugins plugin. + reference: https://www.exploit-db.com/ghdb/6420 + tags: wordpress,listing + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/lifterlms/" + matchers-condition: and + matchers: + - type: word + words: + - "Index of" + - "/wp-content/plugins/lifterlms/" + condition: and + + - type: status + status: + - 200 \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-super-forms.yaml b/vulnerabilities/wordpress/wp-super-forms.yaml new file mode 100644 index 0000000000..7b1c01e7ad --- /dev/null +++ b/vulnerabilities/wordpress/wp-super-forms.yaml @@ -0,0 +1,22 @@ +id: wordpress-super-forms +info: + name: WordPress super-forms + author: pussycat0x + severity: low + description: Searches for sensitive directories present in the wordpress-plugins plugin. + reference: https://www.exploit-db.com/ghdb/6776 + tags: wordpress,listing + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/super-forms/" + matchers-condition: and + matchers: + - type: word + words: + - "Index of /wp-content/plugins/super-forms/" + + - type: status + status: + - 200 \ No newline at end of file