severity updates

patch-1
bauthard 2020-09-20 18:27:43 +05:30
parent faf6b488a5
commit dbfa0fca2d
28 changed files with 35 additions and 18 deletions

View File

@ -3,7 +3,7 @@ id: jolokia-instance
info:
name: Jolokia Version Disclosure
author: mavericknerd & dwisiswant0
severity: low
severity: info
requests:
- method: GET

View File

@ -2,7 +2,7 @@ id: telerik-dialoghandler-detect
info:
name: Detect Telerik Web UI Dialog Handler
author: organiccrap
severity: low
severity: info
# https://captmeelo.com/pentest/2018/08/03/pwning-with-telerik.html
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: telerik-fileupload-detect
info:
name: Detect Telerik Web UI fileupload handler
author: organiccrap
severity: low
severity: info
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: tomcat-scripts
info:
name: Detect Tomcat Exposed Scripts
author: Co0nan
severity: low
severity: info
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: wordpress-db-backup
info:
name: WordPress DB Backup
author: dwisiswant0
severity: info
severity: medium
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: wp-debug-log
info:
name: WordPress debug log
author: geraldino2 & @dwisiswant0
severity: info
severity: low
requests:
- method: GET

View File

@ -12,6 +12,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/emergency.php"
matchers-condition: and
matchers:
- type: word

View File

@ -2,7 +2,7 @@ id: atlassian-crowd-panel
info:
name: Atlassian Crowd panel detect
author: organiccrap
severity: low
severity: info
requests:
- method: GET
path:

View File

@ -2,7 +2,7 @@ id: citrix-adc-gateway-panel
info:
name: Citrix ADC Gateway detect
author: organiccrap
severity: low
severity: info
requests:
- method: GET
path:

View File

@ -12,6 +12,7 @@ requests:
- "http://{{Hostname}}:2376/version"
- "http://{{Hostname}}/v1.24/version"
- "http://{{Hostname}}:2376/v1.24/version"
matchers-condition: and
matchers:
- type: word

View File

@ -3,6 +3,7 @@ info:
name: JMX Console
author: Yash Anand @yashanand155
severity: low
requests:
- method: GET
path:

View File

@ -4,6 +4,7 @@ info:
name: SAP NetWeaver Portal detect
author: organiccrap
severity: info
# SAP Netweaver default creds - SAP*/06071992 or TMSADM/$1Pawd2&
requests:

View File

@ -3,7 +3,7 @@ id: basic-cors-misconfig-flash
info:
name: Basic CORS misconfiguration exploitable with Flash
author: nadino
severity: low
severity: info
requests:
- method: GET

View File

@ -4,6 +4,7 @@ info:
name: FrontPage configuration information discloure
author: JTeles
severity: info
# Reference: https://docs.microsoft.com/en-us/archive/blogs/fabdulwahab/security-protecting-sharepoint-server-applications
requests:

View File

@ -6,7 +6,7 @@ id: jira-unauthenticated-dashboards
info:
name: Jira Unauthenticated Dashboards
author: TechbrunchFR
severity: info
severity: low
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: jira-unauth-popular-filters
info:
name: Jira Unauthenticated Popular Filters
author: TechbrunchFR
severity: info
severity: low
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: jira-unauthenticated-projects
info:
name: Jira Unauthenticated Projects
author: TechbrunchFR
severity: info
severity: low
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: jira-unauthenticated-user-picker
info:
name: Jira Unauthenticated User Picker
author: TechbrunchFR
severity: high
severity: medium
requests:
- method: GET

View File

@ -3,7 +3,7 @@ id: unaunthenticated-jenkin
info:
name: Unauthenticated Jenkin Dashboard
author: dhiyaneshDK
severity: High
severity: high
requests:
- method: GET

View File

@ -9,6 +9,9 @@ requests:
- method: GET
path:
- "{{BaseURL}}/login"
redirects: true
max-redirects: 2
matchers:
- type: word
words:

View File

@ -11,6 +11,9 @@ requests:
- "{{BaseURL}}/users/sign_in"
- "{{BaseURL}}/users/sign_up"
- "{{BaseURL}}/explore"
redirects: true
max-redirects: 2
matchers:
- type: word
words:

View File

@ -12,6 +12,8 @@ requests:
- "{{BaseURL}}/jira/secure/Dashboard.jspa"
- "{{BaseURL}}/login.jsp"
redirects: true
max-redirects: 2
matchers:
- type: word
words:

View File

@ -2,7 +2,7 @@ id: liferay-portal-detect
info:
name: Liferay Portal Detection
author: organiccrap & dwisiswant0
severity: low
severity: info
# CVE-2020-7961: Liferay Portal Unauthenticated RCE
# https://github.com/mzer0one/CVE-2020-7961-POC
requests:

View File

@ -8,8 +8,9 @@ info:
requests:
- method: GET
path:
- "{{BaseURL}}:7001/console/login/LoginForm.jsp"
- "{{BaseURL}}/console/login/LoginForm.jsp"
- "{{BaseURL}}:7001/console/login/LoginForm.jsp"
matchers:
- type: word
words:

View File

@ -6,7 +6,7 @@ id: http-username-password
info:
name: Http usernamme password
author: nadino
severity: medium
severity: info
requests:
- method: GET

View File

@ -5,6 +5,7 @@ info:
author: hetroublemakr
severity: low
description: todo
# reference: https://twitter.com/AEMSecurity
requests:

View File

@ -3,9 +3,10 @@ info:
name: Nginx off-by-slash exposes Git config
author: organiccrap
severity: medium
# https://twitter.com/Random_Robbie/status/1262676628167110656
description: Nginx off-by-slash vulnerability exposes Git configuration.
# https://twitter.com/Random_Robbie/status/1262676628167110656
requests:
- method: GET
path:

View File

@ -5,6 +5,7 @@ info:
author: Harsh Bothra
severity: medium
description: Directory traversal vulnerability on IBM InfoPrint 4247-Z03 Impact Matrix Printer.
# reference: https://www.exploit-db.com/exploits/47835
requests: