Restoring Empty Lines (#4340)
* Enhancement: cves/2021/CVE-2021-34473.yaml by mp * Enhancement: cves/2021/CVE-2021-34621.yaml by mp * Enhancement: cves/2021/CVE-2021-35336.yaml by mp * Enhancement: cves/2021/CVE-2021-35464.yaml by mp * Enhancement: cves/2021/CVE-2021-35587.yaml by mp * Enhancement: cves/2021/CVE-2021-3577.yaml by mp * Enhancement: cves/2021/CVE-2021-36260.yaml by mp * Enhancement: cves/2021/CVE-2021-36380.yaml by mp * Enhancement: cves/2021/CVE-2021-40323.yaml by mp * Enhancement: cves/2021/CVE-2021-39226.yaml by mp * Enhancement: cves/2021/CVE-2021-38647.yaml by mp * Enhancement: cves/2021/CVE-2021-37580.yaml by mp * Enhancement: cves/2021/CVE-2021-37538.yaml by mp * Enhancement: cves/2021/CVE-2021-34473.yaml by mp * Enhancement: cves/2021/CVE-2021-35336.yaml by mp * Enhancement: cves/2021/CVE-2021-3577.yaml by mp * Enhancement: cves/2021/CVE-2021-36260.yaml by mp * Enhancement: cves/2021/CVE-2021-36380.yaml by mp * Enhancement: cves/2021/CVE-2021-37538.yaml by mp * Enhancement: cves/2021/CVE-2021-37580.yaml by mp * Spacing and spelling * remove blank lines introduced by dashboard * Enhancement: cves/2019/CVE-2019-1821.yaml by mp * Enhancement: cves/2019/CVE-2019-18394.yaml by mp * Enhancement: cves/2019/CVE-2019-18818.yaml by mp * Enhancement: cves/2019/CVE-2019-19781.yaml by mp * Enhancement: cves/2019/CVE-2019-2725.yaml by mp * Enhancement: cves/2019/CVE-2019-3396.yaml by mp * Enhancement: cves/2019/CVE-2019-3929.yaml by mp * Enhancement: cves/2019/CVE-2019-5127.yaml by mp * Enhancement: cves/2019/CVE-2019-7238.yaml by mp * Enhancement: cves/2019/CVE-2019-7256.yaml by mp * Enhancement: cves/2019/CVE-2019-7609.yaml by mp * Enhancement: cves/2019/CVE-2019-8982.yaml by mp * Enhancement: cves/2019/CVE-2019-9618.yaml by mp * Enhancement: cves/2019/CVE-2019-9670.yaml by mp * Enhancement: cves/2019/CVE-2019-1821.yaml by mp * Enhancement: cves/2019/CVE-2019-18394.yaml by mp * Enhancement: cves/2019/CVE-2019-19781.yaml by mp * Enhancement: cves/2019/CVE-2019-2725.yaml by mp * Enhancement: cves/2019/CVE-2019-2725.yaml by mp * Enhancement: cves/2019/CVE-2019-5127.yaml by mp * Enhancement: cves/2019/CVE-2019-9618.yaml by mp * Enhancement: cves/2019/CVE-2019-9670.yaml by mp * Enhancement: cves/2005/CVE-2005-2428.yaml by mp * Enhancement: cves/2019/CVE-2019-2579.yaml by mp * Enhancement: cves/2019/CVE-2019-2578.yaml by mp * Enhancement: cves/2019/CVE-2019-6112.yaml by mp * Enhancement: cves/2019/CVE-2019-9733.yaml by mp * Enhancement: cves/2020/CVE-2020-11034.yaml by mp * Enhancement: cves/2020/CVE-2020-11529.yaml by mp * Enhancement: cves/2020/CVE-2020-11546.yaml by mp * Enhancement: cves/2020/CVE-2020-12116.yaml by mp * Enhancement: cves/2020/CVE-2020-12447.yaml by mp * Enhancement: cves/2020/CVE-2020-17453.yaml by mp * Enhancement: cves/2020/CVE-2020-19360.yaml by mp * Enhancement: cves/2020/CVE-2020-2140.yaml by mp * Enhancement: cves/2020/CVE-2020-23575.yaml by mp * Enhancement: cves/2020/CVE-2020-24223.yaml by mp * Enhancement: cves/2019/CVE-2019-2578.yaml by mp * Enhancement: cves/2019/CVE-2019-2579.yaml by mp * Enhancement: cves/2019/CVE-2019-2578.yaml by mp * Enhancement: cves/2019/CVE-2019-6112.yaml by mp * Enhancement: cves/2019/CVE-2019-9733.yaml by mp * Enhancement: cves/2020/CVE-2020-11034.yaml by mp * Enhancement: cves/2020/CVE-2020-11529.yaml by mp * Enhancement: cves/2020/CVE-2020-12116.yaml by mp * Enhancement: cves/2020/CVE-2020-12447.yaml by mp * Enhancement: cves/2020/CVE-2020-2140.yaml by mp * Enhancement: cves/2020/CVE-2020-14092.yaml by mp * Enhancement: cves/2021/CVE-2021-20090.yaml by mp * standardizing enhanced by tag * standardizing enhanced by tag * Fix spacing. Add classification->cve * Enhancement: cves/2021/CVE-2021-20158.yaml by mp * Enhancement: cves/2021/CVE-2021-20167.yaml by mp * Typo * Enhancement: cves/2021/CVE-2021-20837.yaml by mp * Enhancement: cves/2021/CVE-2021-21307.yaml by mp * Enhancement: cves/2021/CVE-2021-21479.yaml by mp * Enhancement: cves/2021/CVE-2021-21881.yaml by mp * Enhancement: cves/2021/CVE-2021-21972.yaml by mp * Enhancement: cves/2021/CVE-2021-21978.yaml by mp * Enhancement: cves/2021/CVE-2021-22005.yaml by mp * Enhancement: cves/2021/CVE-2021-22205.yaml by mp * Enhancement: cves/2021/CVE-2021-22986.yaml by mp * Enhancement: cves/2021/CVE-2021-24285.yaml by mp * Enhancement: cves/2021/CVE-2021-24472.yaml by mp * Enhancement: cves/2021/CVE-2021-20090.yaml by mp * Enhancement: cves/2021/CVE-2021-20167.yaml by mp * Enhancement: cves/2021/CVE-2021-21307.yaml by mp * Enhancement: cves/2021/CVE-2021-21978.yaml by mp * Enhancement: cves/2021/CVE-2021-21985.yaml by mp * Enhancement: cves/2021/CVE-2021-21972.yaml by mp * Enhancement: cves/2021/CVE-2021-22205.yaml by mp * Enhancement: cves/2021/CVE-2021-22986.yaml by mp * Enhancement: cves/2021/CVE-2021-24285.yaml by mp * Restore empty lines * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: vulnerabilities/other/3cx-management-console.yaml by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Remove unnecessary file * Restore content after bad dashboard edit * Enhancement: undefined by cs * Spacing issues * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: undefined by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Delete null file created by dashboard * Remove improper Enhanced tag * Spacing issues * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Remove test dashboard commits * Enhancement: cves/2014/CVE-2014-9618.yaml by mp * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Enhancement: cnvd/2019/CNVD-2019-19299.yaml by cs * Not really enhanced * Add classification->cve-id * Restore content from dashboard mess up * Enhancement: cves/2014/CVE-2014-9618.yaml by mp * Enhancement: cves/2014/CVE-2014-9618.yaml by mp * Restore newlines Co-authored-by: sullo <sullo@cirt.net>patch-1
parent
633efcb9ce
commit
d05c7052e9
|
@ -33,3 +33,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by mp on 2022/05/09
|
||||
|
|
|
@ -23,7 +23,9 @@ requests:
|
|||
Host: {{Hostname}}
|
||||
Origin: {{BaseURL}}
|
||||
Content-Type: application/json
|
||||
|
||||
{"code": {"$gt": 0}, "password": "SuperStrongPassword1", "passwordConfirmation": "SuperStrongPassword1"}
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
|
|
|
@ -8,6 +8,8 @@ info:
|
|||
reference:
|
||||
- https://blog.assetnote.io/2022/05/03/hacking-a-bank-using-dotcms-rce/
|
||||
- https://github.com/h1ei1/POC/tree/main/CVE-2022-26352
|
||||
classification:
|
||||
cve-id: CVE-2022-26352
|
||||
tags: cve,cve2022,rce,dotcms
|
||||
|
||||
requests:
|
||||
|
@ -36,4 +38,4 @@ requests:
|
|||
dsl:
|
||||
- 'contains(body_2, "CVE-2022-26352")'
|
||||
- 'status_code_2 == 200'
|
||||
condition: and
|
||||
condition: and
|
||||
|
|
|
@ -29,6 +29,7 @@ requests:
|
|||
- |+
|
||||
GET http://{{hostval}}/dynamic/instance-identity/document HTTP/1.1
|
||||
Host: {{hostval}}
|
||||
|
||||
payloads:
|
||||
hostval:
|
||||
- alibaba.interact.sh
|
||||
|
|
|
@ -21,21 +21,27 @@ requests:
|
|||
- |+
|
||||
GET / HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
- |+
|
||||
GET http://somethingthatdoesnotexist/ HTTP/1.1
|
||||
Host: somethingthatdoesnotexist
|
||||
|
||||
- |+
|
||||
GET http://127.0.0.1/ HTTP/1.1
|
||||
Host: 127.0.0.1
|
||||
|
||||
- |+
|
||||
GET https://127.0.0.1/ HTTP/1.1
|
||||
Host: 127.0.0.1
|
||||
|
||||
- |+
|
||||
GET http://localhost/ HTTP/1.1
|
||||
Host: localhost
|
||||
|
||||
- |+
|
||||
GET https://localhost/ HTTP/1.1
|
||||
Host: localhost
|
||||
|
||||
unsafe: true
|
||||
req-condition: true
|
||||
stop-at-first-match: true
|
||||
|
|
Loading…
Reference in New Issue