Update and rename apache-server-snoop.yaml to CVE-2000-0760.yaml

patch-11
Ritik Chaddha 2024-09-09 20:50:22 +04:00 committed by GitHub
parent c9e069912a
commit d97bab4a41
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 37 additions and 44 deletions

View File

@ -0,0 +1,37 @@
id: CVE-2000-0760
info:
name: Jakarta Tomcat 3.1 and 3.0
author: Thabisocn
severity: low
description: |
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
reference:
- https://vulners.com/nessus/TOMCAT_SNOOP.NASL
- https://nvd.nist.gov/vuln/detail/CVE-2000-0760
metadata:
max-request: 1
verified: true
google-dork: site:*/examples/jsp/snp/snoop.jsp
vendor: apache
product: tomcat
tags: exposure,misconfig,apache,snoop,servlet,jakarta,tomcat
http:
- method: GET
path:
- "{{BaseURL}}/examples/jsp/snp/snoop.jsp"
matchers-condition: and
matchers:
- type: word
words:
- "Request Information"
- "Path info"
- "Server name"
- "Remote address"
condition: and
- type: status
status:
- 200

View File

@ -1,44 +0,0 @@
id: apache-server-snoop
info:
name: apache-server-snoop
author: Thabisocn
severity: medium
metadata:
max-request: 3
verified: true
Description: There exists an apache vulnerability that allows an anonymous user to request a nonexistent URL with a .snp extension leading to an internal system information disclosure this vulnerability has been classified as CVE-2000-0760.
Google-Dork:
- site:*/examples/jsp/snp/snoop.jsp
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0760
- https://vulners.com/nessus/TOMCAT_SNOOP.NASL
tags: exposure,misconfiguration
http:
- method: GET
path:
- "{{BaseURL}}/examples/jsp/snp/snoop.jsp"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- "Request Information"
- "Path info"
- "Server name"
- "Remote address"
condition: and
- type: status
status:
- 200