minor updates to template
parent
71fce6b5ea
commit
d16fb02b21
|
@ -4,11 +4,11 @@ info:
|
|||
name: phpPgAdmin 4.1.1 - 'Redirect.php' Cross-Site Scripting
|
||||
author: dhiyaneshDK
|
||||
severity: medium
|
||||
tags: cve2007,xss,phppgadmin
|
||||
description: Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
|
||||
tags: cve,cve2007,xss,pgadmin
|
||||
reference: https://www.exploit-db.com/exploits/30090
|
||||
metadata:
|
||||
shodan-query: 'http.title:"phpPgAdmin"'
|
||||
description: "Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865."
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -17,13 +17,16 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- '<script>alert("document.domain")</script>'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
part: header
|
||||
|
|
|
@ -4,10 +4,7 @@ info:
|
|||
name: Gogs - 'users'/'repos' '?q' SQL Injection
|
||||
author: dhiyaneshDK
|
||||
severity: high
|
||||
tags: cve2014,sqli,gogs
|
||||
metadata:
|
||||
shodan-query: 'title:"Sign In - Gogs"'
|
||||
description: "Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go."
|
||||
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
|
||||
reference:
|
||||
- http://www.securityfocus.com/bid/71187
|
||||
- http://seclists.org/fulldisclosure/2014/Nov/33
|
||||
|
@ -17,6 +14,9 @@ info:
|
|||
- http://www.exploit-db.com/exploits/35238
|
||||
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98694
|
||||
- http://www.securityfocus.com/archive/1/533995/100/0/threaded
|
||||
tags: cve,cve2014,sqli,gogs
|
||||
metadata:
|
||||
shodan-query: 'title:"Sign In - Gogs"'
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -29,6 +29,7 @@ requests:
|
|||
words:
|
||||
- '"ok":true'
|
||||
- '"data"'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Gitea Login
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
tags: gitea
|
||||
tags: gitea,panel
|
||||
metadata:
|
||||
shodan-query: 'html:"Powered by Gitea Version"'
|
||||
|
||||
|
@ -15,9 +15,11 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- 'Powered by Gitea Version'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Sign In - Gogs
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
tags: panel
|
||||
tags: panel,gogs
|
||||
metadata:
|
||||
shodan-query: 'title:"Sign In - Gogs"'
|
||||
|
||||
|
@ -15,9 +15,11 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- '<title>Sign In - Gogs</title>'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: Phabricator Login
|
||||
author: dhiyaneshDK
|
||||
severity: info
|
||||
tags: panel
|
||||
tags: panel,phabricator
|
||||
metadata:
|
||||
shodan-query: 'html:"phabricator-standard-page"'
|
||||
|
||||
|
@ -15,9 +15,11 @@ requests:
|
|||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
||||
- type: word
|
||||
words:
|
||||
- 'phabricator-standard-page'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
|
@ -18,6 +18,7 @@ requests:
|
|||
- type: word
|
||||
words:
|
||||
- 'git web interface version'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
|
@ -18,6 +18,7 @@ requests:
|
|||
- type: word
|
||||
words:
|
||||
- 'GitList</title>'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- 200
|
Loading…
Reference in New Issue