Merge pull request #4748 from MostInterestingBotInTheWorld/dashboard
Dashboard Content Enhancementspatch-1
commit
a28acd9bc1
|
@ -1,11 +1,17 @@
|
|||
id: CNVD-2018-13393
|
||||
|
||||
info:
|
||||
name: Metinfo LFI
|
||||
name: Metinfo - Local File Inclusion
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: Metinfo is susceptible to local file inclusion.
|
||||
reference:
|
||||
- https://paper.seebug.org/676/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
||||
cvss-score: 8.6
|
||||
cve-id:
|
||||
cwe-id: CWE-22
|
||||
tags: metinfo,cnvd,cvnd2018,lfi
|
||||
|
||||
requests:
|
||||
|
@ -23,3 +29,5 @@ requests:
|
|||
- "<?php"
|
||||
- "login_met_cookie($metinfo_admin_name);"
|
||||
condition: and
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,15 +1,21 @@
|
|||
id: CNVD-2020-67113
|
||||
|
||||
info:
|
||||
name: H5S CONSOLE Unauthorized Access Vulnerability (CNVD-2020-67113)
|
||||
name: H5S CONSOLE - Unauthorized Access
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE Exists Unauthorized Access Vulnerability
|
||||
severity: medium
|
||||
description: Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE is susceptible to an unauthorized access vulnerability.
|
||||
reference:
|
||||
- https://vul.wangan.com/a/CNVD-2020-67113
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cve-id:
|
||||
cwe-id: CWE-425
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"H5S CONSOLE"
|
||||
tags: h5s,unauth,h5sconsole,cnvd,cnvd2020
|
||||
tags: cnvd,cnvd2020,h5s,unauth,h5sconsole
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -42,3 +48,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,11 +1,17 @@
|
|||
id: CNVD-2021-10543
|
||||
|
||||
info:
|
||||
name: EEA Information Disclosure
|
||||
name: EEA - Information Disclosure
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
description: EEA is susceptible to information disclosure.
|
||||
reference:
|
||||
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-10543
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
||||
cvss-score: 5.3
|
||||
cve-id:
|
||||
cwe-id: CWE-200
|
||||
tags: config,exposure,cnvd,cnvd2021
|
||||
|
||||
requests:
|
||||
|
@ -24,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,14 +1,20 @@
|
|||
id: CNVD-2021-28277
|
||||
|
||||
info:
|
||||
name: Landray-OA Arbitrary - Arbitrary File Retrieval
|
||||
name: Landray-OA - Local File Inclusion
|
||||
author: pikpikcu,daffainfo
|
||||
severity: high
|
||||
description: Landray-OA is susceptible to local file inclusion.
|
||||
reference:
|
||||
- https://www.aisoutu.com/a/1432457
|
||||
- https://mp.weixin.qq.com/s/TkUZXKgfEOVqoHKBr3kNdw
|
||||
metadata:
|
||||
fofa-query: app="Landray OA system"
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
|
||||
cvss-score: 8.6
|
||||
cve-id:
|
||||
cwe-id: CWE-22
|
||||
tags: landray,lfi,cnvd,cnvd2021
|
||||
|
||||
requests:
|
||||
|
@ -42,3 +48,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,13 +1,19 @@
|
|||
id: CNVD-2021-30167
|
||||
|
||||
info:
|
||||
name: UFIDA NC BeanShell Remote Code Execution
|
||||
name: UFIDA NC BeanShell Remote Command Execution
|
||||
author: pikpikcu
|
||||
severity: high
|
||||
description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program.
|
||||
reference:
|
||||
- https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A
|
||||
- https://www.cnvd.org.cn/webinfo/show/6491
|
||||
tags: beanshell,rce,cnvd,cnvd2021,yonyou
|
||||
- https://chowdera.com/2022/03/202203110138271510.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||
cvss-score: 10.0
|
||||
cwe-id: CWE-77
|
||||
tags: cnvd,cnvd2021,beanshell,rce,yonyou
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -40,3 +46,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by cs on 2022/07/05
|
||||
|
|
|
@ -1,18 +1,19 @@
|
|||
id: CVE-2006-2842
|
||||
|
||||
info:
|
||||
name: Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion
|
||||
name: Squirrelmail <=1.4.6 - Local File Inclusion
|
||||
author: dhiyaneshDk
|
||||
severity: high
|
||||
description: 'PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.'
|
||||
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/27948
|
||||
- http://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE
|
||||
- http://www.squirrelmail.org/security/issue/2006-06-01
|
||||
- http://web.archive.org/web/20160915101900/http://secunia.com/advisories/20406/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2006-2842
|
||||
classification:
|
||||
cve-id: CVE-2006-2842
|
||||
tags: cve2006,lfi,squirrelmail,cve
|
||||
tags: cve,cve2006,lfi,squirrelmail
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -29,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -5,14 +5,15 @@ info:
|
|||
author: pussycat0x
|
||||
severity: high
|
||||
description: |
|
||||
Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
|
||||
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled, which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
|
||||
reference:
|
||||
- http://www.cmsimple.com/forum/viewtopic.php?f=2&t=17
|
||||
- http://web.archive.org/web/20210121182016/https://www.securityfocus.com/bid/29450/
|
||||
- http://web.archive.org/web/20140729144732/http://secunia.com:80/advisories/30463
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-2650
|
||||
classification:
|
||||
cve-id: CVE-2008-2650
|
||||
tags: cve,cve2008,lfi
|
||||
tags: cve,cve2008,lfi,cmsimple
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -23,10 +24,14 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
part: body
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,15 +1,16 @@
|
|||
id: CVE-2008-4668
|
||||
|
||||
info:
|
||||
name: Joomla! Component imagebrowser 0.1.5 rc2 - Directory Traversal
|
||||
name: Joomla! Image Browser 0.1.5 rc2 - Local File Inclusion
|
||||
author: daffainfo
|
||||
severity: high
|
||||
description: Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
|
||||
description: Joomla! Image Browser 0.1.5 rc2 is susceptible to local file inclusion via com_imagebrowser which could allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php.
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/6618
|
||||
- https://www.cvedetails.com/cve/CVE-2008-4668
|
||||
- http://web.archive.org/web/20210121183742/https://www.securityfocus.com/bid/31458/
|
||||
- http://securityreason.com/securityalert/4464
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-4668
|
||||
classification:
|
||||
cve-id: CVE-2008-4668
|
||||
tags: cve,cve2008,joomla,lfi
|
||||
|
@ -29,3 +30,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,18 +1,18 @@
|
|||
id: CVE-2008-6668
|
||||
|
||||
info:
|
||||
name: nweb2fax <= 0.2.7 Directory Traversal
|
||||
name: nweb2fax <=0.2.7- Local File Inclusion
|
||||
author: geeknik
|
||||
severity: high
|
||||
description: Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via .. in the id parameter to comm.php and var_filename parameter to viewrq.php.
|
||||
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php (aka local file inclusion).
|
||||
reference:
|
||||
- https://www.exploit-db.com/exploits/5856
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-6668
|
||||
- http://web.archive.org/web/20210130035550/https://www.securityfocus.com/bid/29804
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43173
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2008-6668
|
||||
classification:
|
||||
cve-id: CVE-2008-6668
|
||||
tags: nweb2fax,lfi,cve,cve2008,traversal
|
||||
tags: cve,cve2008,nweb2fax,lfi,traversal
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -22,10 +22,13 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "root:.*:0:0:"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Seagate NAS OS 4.3.15.1 - Server Information Disclosure
|
||||
author: princechaddha
|
||||
severity: high
|
||||
description: Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests.
|
||||
description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.System.get_infos.
|
||||
reference:
|
||||
- https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2018-12296
|
||||
|
@ -36,3 +36,5 @@ requests:
|
|||
group: 1
|
||||
regex:
|
||||
- '"version": "([0-9.]+)"'
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
id: CVE-2022-26134
|
||||
|
||||
info:
|
||||
name: Confluence - Remote Code Execution via OGNL template injection
|
||||
name: Confluence - Remote Code Execution
|
||||
author: pdteam,jbertman
|
||||
severity: critical
|
||||
description: |
|
||||
Critical severity unauthenticated remote code execution vulnerability in Confluence Server and Data Center.
|
||||
Confluence Server and Data Center is susceptible to an unauthenticated remote code execution vulnerability.
|
||||
reference:
|
||||
- https://attackerkb.com/topics/BH1D56ZEhs/cve-2022-26134/rapid7-analysis
|
||||
- https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
|
||||
|
@ -17,6 +17,7 @@ info:
|
|||
cve-id: CVE-2022-26134
|
||||
cwe-id: CWE-74
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.component:"Atlassian Confluence"
|
||||
tags: cve,cve2022,confluence,rce,ognl,oast,cisa
|
||||
|
||||
|
@ -44,4 +45,6 @@ requests:
|
|||
- type: kval
|
||||
part: header
|
||||
kval:
|
||||
- "x_cmd_response"
|
||||
- "x_cmd_response"
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,23 +1,23 @@
|
|||
id: CVE-2022-26960
|
||||
|
||||
info:
|
||||
name: elFinder - Path Traversal
|
||||
name: elFinder <=2.1.60 - Local File Inclusion
|
||||
author: pikpikcu
|
||||
severity: critical
|
||||
description: |
|
||||
Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
||||
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
||||
reference:
|
||||
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
|
||||
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
|
||||
- https://www.synacktiv.com/publications.html
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
||||
cvss-score: 9.1
|
||||
cve-id: CVE-2022-26960
|
||||
cwe-id: CWE-22
|
||||
metadata:
|
||||
verified: "true"
|
||||
verified: true
|
||||
tags: cve,cve2022,lfi,elfinder
|
||||
|
||||
requests:
|
||||
|
@ -36,3 +36,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/05
|
||||
|
|
|
@ -1,23 +1,23 @@
|
|||
id: CVE-2022-27927
|
||||
info:
|
||||
name: Microfinance Management System 1.0 - 'customer_number' SQLi
|
||||
name: Microfinance Management System 1.0 - SQL Injection
|
||||
author: lucasljm2001,ekrause
|
||||
severity: critical
|
||||
description: |
|
||||
Detects an SQL Injection vulnerability in Microfinance Management System.
|
||||
Microfinance Management System 1.0 is susceptible to SQL Injection.
|
||||
reference:
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27927
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-27927
|
||||
- https://www.sourcecodester.com/sites/default/files/download/oretnom23/mims_0.zip
|
||||
- https://www.exploit-db.com/exploits/50891
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-27927
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2022-27927
|
||||
cwe-id: CWE-89
|
||||
metadata:
|
||||
verified: "true"
|
||||
tags: cve,cve2022,sqli
|
||||
verified: true
|
||||
tags: cve,cve2022,sqli,microfinance
|
||||
|
||||
variables:
|
||||
num: "999999999"
|
||||
|
@ -39,3 +39,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,18 +1,17 @@
|
|||
id: CVE-2022-28219
|
||||
|
||||
info:
|
||||
name: Zoho ManageEngine ADAudit Plus - Unauthenticated XXE to RCE
|
||||
name: Zoho ManageEngine ADAudit Plus <7600 - XML Entity Injection/Remote Code Execution
|
||||
author: dwisiswant0
|
||||
severity: critical
|
||||
description: |
|
||||
Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an
|
||||
unauthenticated XXE attack that leads to Remote Code Execution.
|
||||
This template supports the detection part only, to achieve an
|
||||
XXE to RCE, see reference[2].
|
||||
Zoho ManageEngine ADAudit Plus before version 7060 is vulnerable to an
|
||||
unauthenticated XML entity injection attack that can lead to remote code execution.
|
||||
reference:
|
||||
- https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html
|
||||
- https://www.horizon3.ai/red-team-blog-cve-2022-28219/
|
||||
- https://manageengine.com
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-28219
|
||||
remediation: |
|
||||
Update to ADAudit Plus build 7060 or later, and ensure ADAudit Plus
|
||||
is configured with a dedicated service account with restricted privileges.
|
||||
|
@ -22,8 +21,8 @@ info:
|
|||
cve-id: CVE-2022-28219
|
||||
cwe-id: CWE-611
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: http.title:"ADAudit Plus" || http.title:"ManageEngine - ADManager Plus"
|
||||
verified: "true"
|
||||
tags: cve,cve2022,xxe,rce,zoho,manageengine,unauth
|
||||
|
||||
requests:
|
||||
|
@ -55,3 +54,5 @@ requests:
|
|||
part: body
|
||||
words:
|
||||
- "ManageEngine"
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -5,18 +5,17 @@ info:
|
|||
author: elitebaz
|
||||
severity: critical
|
||||
description: |
|
||||
NETGEAR ProSafe SSL VPN multiple firmwares were discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi.
|
||||
NETGEAR ProSafe SSL VPN multiple firmware versions were discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi.
|
||||
reference:
|
||||
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-29383
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-29383
|
||||
- https://github.com/badboycxcc/Netgear-ssl-vpn-20211222-CVE-2022-29383
|
||||
- https://github.com/badboycxcc/Netgear-ssl-vpn-20211222
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-29383
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||
cvss-score: 9.8
|
||||
cve-id: CVE-2022-29383
|
||||
metadata:
|
||||
verified: "true"
|
||||
verified: true
|
||||
tags: cve,cve2022,sqli,netgear,router
|
||||
|
||||
requests:
|
||||
|
@ -42,3 +41,5 @@ requests:
|
|||
- contains(body_1, "User authentication Failed")
|
||||
- contains(body_2, "User Login Failed for SSLVPN User.")
|
||||
condition: and
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,14 +1,15 @@
|
|||
id: openwrt-default-login
|
||||
|
||||
info:
|
||||
name: Opentwrt Default Login
|
||||
name: Opentwrt - Admin Login Page
|
||||
author: For3stCo1d
|
||||
severity: high
|
||||
description: An Opentwrt admin login page was discovered.
|
||||
reference:
|
||||
- https://forum.archive.openwrt.org/viewtopic.php?id=16611
|
||||
metadata:
|
||||
shodan-query: http.title:"OpenWrt - LuCI"
|
||||
tags: openwrt,default-login
|
||||
tags: default-login,openwrt
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -18,4 +19,6 @@ requests:
|
|||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- 'cgi-bin/luci/admin/system/admin'
|
||||
- 'cgi-bin/luci/admin/system/admin'
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,14 +1,15 @@
|
|||
id: inspur-clusterengine-default-login
|
||||
|
||||
info:
|
||||
name: Inspur Clusterengine V4 Default Login
|
||||
name: Inspur Clusterengine 4 - Default Admin Login
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: Inspur Clusterengine version 4 default admin login credentials were successful.
|
||||
reference:
|
||||
- https://blog.csdn.net/qq_36197704/article/details/115665793
|
||||
metadata:
|
||||
fofa-query: title="TSCEV4.0"
|
||||
tags: inspur,clusterengine,default-login
|
||||
tags: default-login,inspur,clusterengine
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -43,3 +44,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,12 +1,13 @@
|
|||
id: panabit-ixcache-default-login
|
||||
|
||||
info:
|
||||
name: Panabit iXCache Default Login
|
||||
name: Panabit iXCache - Default Admin Login
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: Panabit iXCache default admin login credentials were successful.
|
||||
reference:
|
||||
- http://forum.panabit.com/thread-10830-1-1.html
|
||||
tags: ixcache,default-login,panabit
|
||||
tags: default-login,ixcache,panabit
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -16,12 +17,12 @@ requests:
|
|||
|
||||
username={{username}}&password={{password}}
|
||||
|
||||
attack: pitchfork
|
||||
payloads:
|
||||
username:
|
||||
- admin
|
||||
password:
|
||||
- ixcache
|
||||
attack: pitchfork
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
@ -34,3 +35,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,13 +1,13 @@
|
|||
id: secnet-ac-default-password
|
||||
|
||||
info:
|
||||
name: secnet-ac-default-password
|
||||
name: secnet ac - Default Admin Login
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: secnet ac default admin credentials were discovered.
|
||||
description: secnet ac default admin credentials were successful.
|
||||
reference:
|
||||
- https://bbs.secnet.cn/post/t-30
|
||||
tags: secnet,default-login
|
||||
tags: default-login,secnet
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -40,3 +40,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,10 +1,11 @@
|
|||
id: telecom-gateway-default-login
|
||||
|
||||
info:
|
||||
name: Telecom Gateway Default Login
|
||||
name: Telecom Gateway - Default Admin Login
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
tags: telecom,default-login,gateway
|
||||
description: Telecom Gateway default admin login credentials were successful.
|
||||
tags: default-login,telecom,gateway
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -20,6 +21,7 @@ requests:
|
|||
- admin
|
||||
password:
|
||||
- admin
|
||||
|
||||
redirects: true
|
||||
max-redirects: 2
|
||||
matchers-condition: and
|
||||
|
@ -35,3 +37,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,14 +1,16 @@
|
|||
id: rainloop-default-login
|
||||
|
||||
info:
|
||||
name: Rainloop WebMail Default Login
|
||||
name: Rainloop WebMail - Default Admin Login
|
||||
author: For3stCo1d
|
||||
severity: high
|
||||
description: Rainloop WebMail default admin login credentials were successful.
|
||||
reference:
|
||||
- https://github.com/RainLoop/rainloop-webmail/issues/28
|
||||
metadata:
|
||||
verified: true
|
||||
fofa-query: app="RAINLOOP-WebMail"
|
||||
tags: rainloop,webmail,default-login,foss
|
||||
tags: default-login,rainloop,webmail,foss
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -50,4 +52,6 @@ requests:
|
|||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,9 +1,10 @@
|
|||
id: supermicro-default-login
|
||||
|
||||
info:
|
||||
name: Supermicro Ipmi Default Login
|
||||
name: Supermicro Ipmi - Default Admin Login
|
||||
author: For3stCo1d
|
||||
severity: high
|
||||
description: Supermicro Ipmi default admin login credentials were successful.
|
||||
reference:
|
||||
- https://www.gearprimer.com/wiki/supermicro-ipmi-default-username-pasword/
|
||||
tags: supermicro,default-login
|
||||
|
@ -39,3 +40,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
id: wildfly-default-login
|
||||
|
||||
info:
|
||||
name: Wildfly Default Login
|
||||
name: Wildfly - Default Admin Login
|
||||
author: s0obi
|
||||
severity: high
|
||||
description: |
|
||||
Wildfly default login was discovered
|
||||
Wildfly default admin login credentials were successful.
|
||||
reference:
|
||||
- https://docs.wildfly.org/26.1/#administrator-guides
|
||||
tags: wildfly,default-login
|
||||
|
@ -36,3 +36,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/07/04
|
||||
|
|
Loading…
Reference in New Issue