diff --git a/fuzzing/arbitrary-file-read.yaml b/fuzzing/arbitrary-file-read.yaml index e1fb95913b..34260c7053 100644 --- a/fuzzing/arbitrary-file-read.yaml +++ b/fuzzing/arbitrary-file-read.yaml @@ -5,6 +5,7 @@ info: author: Sushant Kamble (https://in.linkedin.com/in/sushantkamble) severity: high description: Searches for /etc/passwd on passed URLs. + tags: fuzz,lfi requests: - method: GET diff --git a/fuzzing/directory-traversal.yaml b/fuzzing/directory-traversal.yaml index 6a01fbd634..b3c1953cfd 100644 --- a/fuzzing/directory-traversal.yaml +++ b/fuzzing/directory-traversal.yaml @@ -6,6 +6,7 @@ info: severity: high description: Detect basic directory traversal leading to a leak of sensitive files. tags: lfi,fuzz + requests: - method: GET path: diff --git a/fuzzing/generic-lfi-fuzzing.yaml b/fuzzing/generic-lfi-fuzzing.yaml index 5e8dd15bb5..f32eacb87b 100644 --- a/fuzzing/generic-lfi-fuzzing.yaml +++ b/fuzzing/generic-lfi-fuzzing.yaml @@ -4,6 +4,7 @@ info: author: geeknik severity: high description: A generic test for Local File Inclusion + tags: fuzz,lfi requests: - method: GET diff --git a/fuzzing/header-command-injection.yaml b/fuzzing/header-command-injection.yaml index fc544ab49f..7b1bc722e5 100644 --- a/fuzzing/header-command-injection.yaml +++ b/fuzzing/header-command-injection.yaml @@ -5,6 +5,7 @@ info: author: geeknik severity: high description: Fuzzing headers for command injection + tags: fuzz,rce requests: - payloads: diff --git a/fuzzing/iis-shortname.yaml b/fuzzing/iis-shortname.yaml index 3c3c4a7e28..0392a42acc 100644 --- a/fuzzing/iis-shortname.yaml +++ b/fuzzing/iis-shortname.yaml @@ -4,6 +4,8 @@ info: author: nodauf severity: info description: If IIS use old .Net Framwork it's possible to enumeration folder with the symbol ~. + tags: fuzz + reference: | - https://github.com/lijiejie/IIS_shortname_Scanner - https://www.exploit-db.com/exploits/19525