Add a template for Incapptic Connect (#4100)

* Add tpl for Incapptic

* Fix linter error

* misc update

* Auto Generated CVE annotations [Mon Apr 18 13:10:32 UTC 2022] 🤖

Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io>
Co-authored-by: GitHub Action <action@github.com>
patch-1
Dominique RIGHETTO 2022-04-18 15:10:41 +02:00 committed by GitHub
parent 111dd9da26
commit a3ad749c91
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 46 additions and 1 deletions

View File

@ -14,6 +14,11 @@ info:
classification: classification:
cve-id: CVE-2022-28363 cve-id: CVE-2022-28363
tags: cve,cve2022,xss,rlm tags: cve,cve2022,xss,rlm
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2022-28363
cwe-id: CWE-79
requests: requests:
- method: GET - method: GET

View File

@ -3,7 +3,7 @@ id: CVE-2022-28365
info: info:
name: Reprise License Manager 14.2 - Information Disclosure name: Reprise License Manager 14.2 - Information Disclosure
author: Akincibor author: Akincibor
severity: low severity: medium
description: | description: |
Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture and file/directory information. Reprise License Manager 14.2 is affected by an Information Disclosure vulnerability via a GET request to /goforms/rlminfo. No authentication is required. The information disclosed is associated with software versions, process IDs, network configuration, hostname(s), system architecture and file/directory information.
reference: reference:
@ -14,6 +14,11 @@ info:
classification: classification:
cve-id: CVE-2022-28365 cve-id: CVE-2022-28365
tags: cve,cve2022,exposure,rlm tags: cve,cve2022,exposure,rlm
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.30
cve-id: CVE-2022-28365
cwe-id: CWE-668
requests: requests:
- method: GET - method: GET

View File

@ -0,0 +1,35 @@
id: incapptic-connect-panel
info:
name: IVANTI Incapptic Connect
author: righettod
severity: info
reference: https://www.ivanti.com/products/incapptic-connect
metadata:
shodan-query:
- http.title:"incapptic"
- http.favicon.hash:-1067582922
tags: panel,ivanti,incapptic-connect
requests:
- method: GET
path:
- '{{BaseURL}}'
- '{{BaseURL}}/static/img/custom_icons/favicon.ico'
redirects: true
max-redirects: 3
stop-at-first-match: true
matchers-condition: or
matchers:
- type: dsl
dsl:
- "status_code==200"
- "contains(tolower(body), 'incapptic')"
condition: and
- type: dsl
dsl:
- "status_code==200"
- "('-1067582922' == mmh3(base64_py(body)))"
condition: and