tags update
parent
145620c09c
commit
dd2322c7f2
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Deprecated SSHv1 Protocol Detection
|
name: Deprecated SSHv1 Protocol Detection
|
||||||
author: iamthefrogy
|
author: iamthefrogy
|
||||||
severity: high
|
severity: high
|
||||||
tags: network,ssh,openssh,cves,cves2001
|
tags: cve,cve2001,network,ssh,openssh
|
||||||
description: SSHv1 is deprecated and has known cryptographic issues.
|
description: SSHv1 is deprecated and has known cryptographic issues.
|
||||||
remediation: Upgrade to SSH 2.4 or later.
|
remediation: Upgrade to SSH 2.4 or later.
|
||||||
reference:
|
reference:
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
id: CVE-2010-1870
|
id: CVE-2010-1870
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: ListSERV Maestro <= 9.0-8 RCE
|
name: ListSERV Maestro <= 9.0-8 RCE
|
||||||
author: b0yd
|
author: b0yd
|
||||||
|
@ -8,17 +9,19 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://www.securifera.com/advisories/sec-2020-0001/
|
- https://www.securifera.com/advisories/sec-2020-0001/
|
||||||
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
|
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
|
||||||
tags: rce,listserv,ognl,cves,cve2010
|
tags: cve,cve2010,rce,listserv,ognl
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: AV:N/AC:L/Au:N/C:N/I:P/A:N
|
cvss-metrics: AV:N/AC:L/Au:N/C:N/I:P/A:N
|
||||||
cvss-score: 5.0
|
cvss-score: 5.0
|
||||||
cve-id: CVE-2010-1870
|
cve-id: CVE-2010-1870
|
||||||
cwe-id: CWE-917
|
cwe-id: CWE-917
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- "{{BaseURL}}/lui/"
|
- "{{BaseURL}}/lui/"
|
||||||
- "{{BaseURL}}/hub/"
|
- "{{BaseURL}}/hub/"
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
regex:
|
regex:
|
||||||
|
@ -26,4 +29,5 @@ requests:
|
||||||
- 'LISTSERV Maestro\s+[5678]'
|
- 'LISTSERV Maestro\s+[5678]'
|
||||||
- 'Administration Hub 9\.0-[123456780]'
|
- 'Administration Hub 9\.0-[123456780]'
|
||||||
- 'Administration Hub [5678]'
|
- 'Administration Hub [5678]'
|
||||||
|
|
||||||
# Enhanced by mp on 2022/02/15
|
# Enhanced by mp on 2022/02/15
|
||||||
|
|
|
@ -6,7 +6,6 @@ info:
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
|
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
|
||||||
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
|
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
|
||||||
tags: crlf,generic,cves,cve2016,apache
|
|
||||||
reference:
|
reference:
|
||||||
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
|
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
|
||||||
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
|
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
|
||||||
|
@ -15,6 +14,7 @@ info:
|
||||||
cvss-score: 6.1
|
cvss-score: 6.1
|
||||||
cve-id: CVE-2016-4975
|
cve-id: CVE-2016-4975
|
||||||
cwe-id: CWE-93
|
cwe-id: CWE-93
|
||||||
|
tags: cve,cve2016,crlf,generic,apache
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -22,7 +22,8 @@ requests:
|
||||||
- "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
|
- "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
|
||||||
matchers:
|
matchers:
|
||||||
- type: regex
|
- type: regex
|
||||||
|
part: header
|
||||||
regex:
|
regex:
|
||||||
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
|
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
|
||||||
part: header
|
|
||||||
# Enhanced by cs on 2022/02/14
|
# Enhanced by cs on 2022/02/14
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: OpenSSH username enumeration < v7.3
|
name: OpenSSH username enumeration < v7.3
|
||||||
author: iamthefrogy,forgedhallpass
|
author: iamthefrogy,forgedhallpass
|
||||||
severity: medium
|
severity: medium
|
||||||
tags: network,openssh
|
tags: cve,cve2016,network,openssh
|
||||||
description: OpenSSH before 7.3 is vulnerable to username enumeration and DoS vulnerabilities.
|
description: OpenSSH before 7.3 is vulnerable to username enumeration and DoS vulnerabilities.
|
||||||
reference:
|
reference:
|
||||||
- http://seclists.org/fulldisclosure/2016/Jul/51
|
- http://seclists.org/fulldisclosure/2016/Jul/51
|
||||||
|
|
|
@ -8,12 +8,12 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82
|
- https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24838
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-24838
|
||||||
tags: wordpress,wp-plugin,open-redirect
|
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||||
cvss-score: 6.10
|
cvss-score: 6.10
|
||||||
cve-id: CVE-2021-24838
|
cve-id: CVE-2021-24838
|
||||||
cwe-id: CWE-601
|
cwe-id: CWE-601
|
||||||
|
tags: cve,cve2021,wordpress,wp-plugin,open-redirect
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -23,7 +23,7 @@ info:
|
||||||
cvss-score: 9.80
|
cvss-score: 9.80
|
||||||
cve-id: CVE-2021-42237
|
cve-id: CVE-2021-42237
|
||||||
cwe-id: CWE-502
|
cwe-id: CWE-502
|
||||||
tags: rce,sitecore,deserialization,oast
|
tags: cve,cve2021,rce,sitecore,deserialization,oast
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
Loading…
Reference in New Issue