Restoring Empty Lines (#4340)

* Enhancement: cves/2021/CVE-2021-34473.yaml by mp

* Enhancement: cves/2021/CVE-2021-34621.yaml by mp

* Enhancement: cves/2021/CVE-2021-35336.yaml by mp

* Enhancement: cves/2021/CVE-2021-35464.yaml by mp

* Enhancement: cves/2021/CVE-2021-35587.yaml by mp

* Enhancement: cves/2021/CVE-2021-3577.yaml by mp

* Enhancement: cves/2021/CVE-2021-36260.yaml by mp

* Enhancement: cves/2021/CVE-2021-36380.yaml by mp

* Enhancement: cves/2021/CVE-2021-40323.yaml by mp

* Enhancement: cves/2021/CVE-2021-39226.yaml by mp

* Enhancement: cves/2021/CVE-2021-38647.yaml by mp

* Enhancement: cves/2021/CVE-2021-37580.yaml by mp

* Enhancement: cves/2021/CVE-2021-37538.yaml by mp

* Enhancement: cves/2021/CVE-2021-34473.yaml by mp

* Enhancement: cves/2021/CVE-2021-35336.yaml by mp

* Enhancement: cves/2021/CVE-2021-3577.yaml by mp

* Enhancement: cves/2021/CVE-2021-36260.yaml by mp

* Enhancement: cves/2021/CVE-2021-36380.yaml by mp

* Enhancement: cves/2021/CVE-2021-37538.yaml by mp

* Enhancement: cves/2021/CVE-2021-37580.yaml by mp

* Spacing and spelling

* remove blank lines introduced by dashboard

* Enhancement: cves/2019/CVE-2019-1821.yaml by mp

* Enhancement: cves/2019/CVE-2019-18394.yaml by mp

* Enhancement: cves/2019/CVE-2019-18818.yaml by mp

* Enhancement: cves/2019/CVE-2019-19781.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-3396.yaml by mp

* Enhancement: cves/2019/CVE-2019-3929.yaml by mp

* Enhancement: cves/2019/CVE-2019-5127.yaml by mp

* Enhancement: cves/2019/CVE-2019-7238.yaml by mp

* Enhancement: cves/2019/CVE-2019-7256.yaml by mp

* Enhancement: cves/2019/CVE-2019-7609.yaml by mp

* Enhancement: cves/2019/CVE-2019-8982.yaml by mp

* Enhancement: cves/2019/CVE-2019-9618.yaml by mp

* Enhancement: cves/2019/CVE-2019-9670.yaml by mp

* Enhancement: cves/2019/CVE-2019-1821.yaml by mp

* Enhancement: cves/2019/CVE-2019-18394.yaml by mp

* Enhancement: cves/2019/CVE-2019-19781.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-2725.yaml by mp

* Enhancement: cves/2019/CVE-2019-5127.yaml by mp

* Enhancement: cves/2019/CVE-2019-9618.yaml by mp

* Enhancement: cves/2019/CVE-2019-9670.yaml by mp

* Enhancement: cves/2005/CVE-2005-2428.yaml by mp

* Enhancement: cves/2019/CVE-2019-2579.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-6112.yaml by mp

* Enhancement: cves/2019/CVE-2019-9733.yaml by mp

* Enhancement: cves/2020/CVE-2020-11034.yaml by mp

* Enhancement: cves/2020/CVE-2020-11529.yaml by mp

* Enhancement: cves/2020/CVE-2020-11546.yaml by mp

* Enhancement: cves/2020/CVE-2020-12116.yaml by mp

* Enhancement: cves/2020/CVE-2020-12447.yaml by mp

* Enhancement: cves/2020/CVE-2020-17453.yaml by mp

* Enhancement: cves/2020/CVE-2020-19360.yaml by mp

* Enhancement: cves/2020/CVE-2020-2140.yaml by mp

* Enhancement: cves/2020/CVE-2020-23575.yaml by mp

* Enhancement: cves/2020/CVE-2020-24223.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-2579.yaml by mp

* Enhancement: cves/2019/CVE-2019-2578.yaml by mp

* Enhancement: cves/2019/CVE-2019-6112.yaml by mp

* Enhancement: cves/2019/CVE-2019-9733.yaml by mp

* Enhancement: cves/2020/CVE-2020-11034.yaml by mp

* Enhancement: cves/2020/CVE-2020-11529.yaml by mp

* Enhancement: cves/2020/CVE-2020-12116.yaml by mp

* Enhancement: cves/2020/CVE-2020-12447.yaml by mp

* Enhancement: cves/2020/CVE-2020-2140.yaml by mp

* Enhancement: cves/2020/CVE-2020-14092.yaml by mp

* Enhancement: cves/2021/CVE-2021-20090.yaml by mp

* standardizing enhanced by tag

* standardizing enhanced by tag

* Fix spacing. Add classification->cve

* Enhancement: cves/2021/CVE-2021-20158.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Typo

* Enhancement: cves/2021/CVE-2021-20837.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21479.yaml by mp

* Enhancement: cves/2021/CVE-2021-21881.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-22005.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Enhancement: cves/2021/CVE-2021-24472.yaml by mp

* Enhancement: cves/2021/CVE-2021-20090.yaml by mp

* Enhancement: cves/2021/CVE-2021-20167.yaml by mp

* Enhancement: cves/2021/CVE-2021-21307.yaml by mp

* Enhancement: cves/2021/CVE-2021-21978.yaml by mp

* Enhancement: cves/2021/CVE-2021-21985.yaml by mp

* Enhancement: cves/2021/CVE-2021-21972.yaml by mp

* Enhancement: cves/2021/CVE-2021-22205.yaml by mp

* Enhancement: cves/2021/CVE-2021-22986.yaml by mp

* Enhancement: cves/2021/CVE-2021-24285.yaml by mp

* Restore empty lines

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Remove unnecessary file

* Restore content after bad dashboard edit

* Enhancement: undefined by cs

* Spacing issues

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: undefined by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Delete null file created by dashboard

* Remove improper Enhanced tag

* Spacing issues

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Remove test dashboard commits

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs

* Not really enhanced

* Add classification->cve-id

* Restore content from dashboard mess up

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Enhancement: cves/2014/CVE-2014-9618.yaml by mp

* Restore newlines

Co-authored-by: sullo <sullo@cirt.net>
patch-1
MostInterestingBotInTheWorld 2022-05-10 03:05:15 -04:00 committed by GitHub
parent 633efcb9ce
commit d05c7052e9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 14 additions and 1 deletions

View File

@ -33,3 +33,5 @@ requests:
- type: status
status:
- 200
# Enhanced by mp on 2022/05/09

View File

@ -23,7 +23,9 @@ requests:
Host: {{Hostname}}
Origin: {{BaseURL}}
Content-Type: application/json
{"code": {"$gt": 0}, "password": "SuperStrongPassword1", "passwordConfirmation": "SuperStrongPassword1"}
matchers-condition: and
matchers:
- type: status

View File

@ -8,6 +8,8 @@ info:
reference:
- https://blog.assetnote.io/2022/05/03/hacking-a-bank-using-dotcms-rce/
- https://github.com/h1ei1/POC/tree/main/CVE-2022-26352
classification:
cve-id: CVE-2022-26352
tags: cve,cve2022,rce,dotcms
requests:
@ -36,4 +38,4 @@ requests:
dsl:
- 'contains(body_2, "CVE-2022-26352")'
- 'status_code_2 == 200'
condition: and
condition: and

View File

@ -29,6 +29,7 @@ requests:
- |+
GET http://{{hostval}}/dynamic/instance-identity/document HTTP/1.1
Host: {{hostval}}
payloads:
hostval:
- alibaba.interact.sh

View File

@ -21,21 +21,27 @@ requests:
- |+
GET / HTTP/1.1
Host: {{Hostname}}
- |+
GET http://somethingthatdoesnotexist/ HTTP/1.1
Host: somethingthatdoesnotexist
- |+
GET http://127.0.0.1/ HTTP/1.1
Host: 127.0.0.1
- |+
GET https://127.0.0.1/ HTTP/1.1
Host: 127.0.0.1
- |+
GET http://localhost/ HTTP/1.1
Host: localhost
- |+
GET https://localhost/ HTTP/1.1
Host: localhost
unsafe: true
req-condition: true
stop-at-first-match: true