minor updates to template

patch-1
sandeep 2021-11-21 14:53:15 +05:30
parent 71fce6b5ea
commit d16fb02b21
7 changed files with 24 additions and 12 deletions

View File

@ -4,11 +4,11 @@ info:
name: phpPgAdmin 4.1.1 - 'Redirect.php' Cross-Site Scripting
author: dhiyaneshDK
severity: medium
tags: cve2007,xss,phppgadmin
description: Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865.
tags: cve,cve2007,xss,pgadmin
reference: https://www.exploit-db.com/exploits/30090
metadata:
shodan-query: 'http.title:"phpPgAdmin"'
description: "Cross-site scripting (XSS) vulnerability in phpPgAdmin 3.5 to 4.1.1, and possibly 4.1.2, allows remote attackers to inject arbitrary web script or HTML via certain input available in PHP_SELF in (1) redirect.php, possibly related to (2) login.php, different vectors than CVE-2007-2865."
requests:
- method: GET
@ -17,13 +17,16 @@ requests:
matchers-condition: and
matchers:
- type: word
words:
- '<script>alert("document.domain")</script>'
- type: status
status:
- 200
- type: word
part: header
words:
- "text/html"
part: header

View File

@ -4,10 +4,7 @@ info:
name: Gogs - 'users'/'repos' '?q' SQL Injection
author: dhiyaneshDK
severity: high
tags: cve2014,sqli,gogs
metadata:
shodan-query: 'title:"Sign In - Gogs"'
description: "Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go."
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
reference:
- http://www.securityfocus.com/bid/71187
- http://seclists.org/fulldisclosure/2014/Nov/33
@ -17,6 +14,9 @@ info:
- http://www.exploit-db.com/exploits/35238
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98694
- http://www.securityfocus.com/archive/1/533995/100/0/threaded
tags: cve,cve2014,sqli,gogs
metadata:
shodan-query: 'title:"Sign In - Gogs"'
requests:
- method: GET
@ -29,6 +29,7 @@ requests:
words:
- '"ok":true'
- '"data"'
- type: status
status:
- 200

View File

@ -4,7 +4,7 @@ info:
name: Gitea Login
author: dhiyaneshDK
severity: info
tags: gitea
tags: gitea,panel
metadata:
shodan-query: 'html:"Powered by Gitea Version"'
@ -15,9 +15,11 @@ requests:
matchers-condition: and
matchers:
- type: word
words:
- 'Powered by Gitea Version'
- type: status
status:
- 200

View File

@ -4,7 +4,7 @@ info:
name: Sign In - Gogs
author: dhiyaneshDK
severity: info
tags: panel
tags: panel,gogs
metadata:
shodan-query: 'title:"Sign In - Gogs"'
@ -15,9 +15,11 @@ requests:
matchers-condition: and
matchers:
- type: word
words:
- '<title>Sign In - Gogs</title>'
- type: status
status:
- 200

View File

@ -4,7 +4,7 @@ info:
name: Phabricator Login
author: dhiyaneshDK
severity: info
tags: panel
tags: panel,phabricator
metadata:
shodan-query: 'html:"phabricator-standard-page"'
@ -15,9 +15,11 @@ requests:
matchers-condition: and
matchers:
- type: word
words:
- 'phabricator-standard-page'
- type: status
status:
- 200

View File

@ -18,6 +18,7 @@ requests:
- type: word
words:
- 'git web interface version'
- type: status
status:
- 200
- 200

View File

@ -18,6 +18,7 @@ requests:
- type: word
words:
- 'GitList</title>'
- type: status
status:
- 200
- 200