sullo 2022-05-27 09:46:25 -04:00
commit b04f2e96fc
3 changed files with 6 additions and 6 deletions

View File

@ -1,7 +1,7 @@
id: code42-log4j-rce
info:
name: Code42 Apache Log4j - Remote Code Execution
name: Apache Code42 - Log4j Remote Code Execution
author: Adam Crosser
severity: critical
description: |
@ -45,4 +45,4 @@ requests:
regex:
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output
# Enhanced by mp on 2022/05/24
# Enhanced by mp on 2022/05/27

View File

@ -1,7 +1,7 @@
id: jamf-log4j-jndi-rce
info:
name: JamF - Log4j JNDI Remote Code Execution
name: JamF - Log4j Remote Code Execution
author: pdteam
severity: critical
description: JamF is susceptible to Lof4j JNDI remote code execution. JamF is the industry standard when it comes to the management of iOS devices (iPhones and iPads), macOS computers (MacBooks, iMacs, etc.), and tvOS devices (Apple TV).
@ -45,4 +45,4 @@ requests:
regex:
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output
# Enhanced by mp on 2022/05/26
# Enhanced by mp on 2022/05/27

View File

@ -4,7 +4,7 @@ info:
name: Joomla CMS <=3.4.6 - Remote Code Execution
author: leovalcante,kiks7
severity: critical
description: Joomla CMS 3.0.0 to the 3.4.6 release contain an unauthenticated PHP object injection that leads to remote code execution.
description: Joomla CMS 3.0.0 through the 3.4.6 release contains an unauthenticated PHP object injection that leads to remote code execution.
reference:
- https://blog.hacktivesecurity.com/index.php/2019/10/03/rusty-joomla-rce/
- https://github.com/kiks7/rusty_joomla_rce
@ -47,4 +47,4 @@ requests:
- "Failed to decode session object"
condition: and
# Enhanced by mp on 2022/05/26
# Enhanced by mp on 2022/05/27