misc updates

patch-1
sandeep 2021-07-02 18:24:31 +05:30
parent 16da6c9980
commit e2a0f93f79
4 changed files with 22 additions and 19 deletions

View File

@ -5,7 +5,7 @@ info:
author: milo2012
severity: high
reference: https://www.nc-lp.com/blog/weaponize-oracle-weblogic-server-poc-cve-2018-2628
tags: cve,cve2018,oracle,weblogic
tags: cve,cve2018,oracle,weblogic,network
network:
- inputs:

View File

@ -4,7 +4,7 @@ info:
name: Oracle WebLogic Server Deserialization RCE (CVE-2018-2893)
author: milo2012
severity: high
tags: cve,cve2018,weblogic
tags: cve,cve2018,weblogic,network
reference: https://www.anquanke.com/post/id/152164, https://vulners.com/nessus/WEBLOGIC_CVE_2018_2893.NASL
network:

View File

@ -5,7 +5,7 @@ info:
author: milo2012
severity: high
reference: https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
tags: cve,cve2020,apache,tomcat,lfi
tags: cve,cve2020,apache,tomcat,lfi,network
network:
- inputs:

View File

@ -9,23 +9,26 @@ info:
requests:
- raw:
- |
POST /jolokia/ HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 136
POST /jolokia/ HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 136
{
"type":"EXEC",
"mbean":"com.sun.management:type=HotSpotDiagnostic",
"operation":"dumpHeap",
"arguments":["/tmp1234/test1.hprof",0]
}
{
"type":"EXEC",
"mbean":"com.sun.management:type=HotSpotDiagnostic",
"operation":"dumpHeap",
"arguments":[
"/tmp1234/test1.hprof",
0
]
}
matchers:
- type: word