Fixed mistakes/typos in the templates.

Related nuclei tickets:
* #259 - dynamic key-value field support for template information
* #940 - new infos in template
* #834
* RES-84
patch-1
forgedhallpass 2021-08-19 15:30:14 +03:00
parent cdf9451158
commit e68d15ab63
13 changed files with 14 additions and 14 deletions

View File

@ -5,7 +5,7 @@ info:
author: emadshanab author: emadshanab
severity: high severity: high
description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server
refrense: | reference:
- https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/ - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/
- https://nvd.nist.gov/vuln/detail/CVE-2015-8813 - https://nvd.nist.gov/vuln/detail/CVE-2015-8813
tags: cve,cve2015,ssrf,oob tags: cve,cve2015,ssrf,oob

View File

@ -12,8 +12,8 @@ requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/system/console?.css" - "{{BaseURL}}/system/console?.css"
header: headers:
- Authorization: "Basic YWRtaW46YWRtaW4K" Authorization: "Basic YWRtaW46YWRtaW4K"
matchers-condition: and matchers-condition: and
matchers: matchers:

View File

@ -22,5 +22,5 @@ requests:
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
- "\\[(font|extension|file)s\\]" - "\\[(font|extension|file)s\\]"
conditon: or condition: or
part: body part: body

View File

@ -19,4 +19,4 @@ requests:
words: words:
- "* Copyright (c) 2005,2013, Oracle" - "* Copyright (c) 2005,2013, Oracle"
- "<title>settings</title>" - "<title>settings</title>"
conditon: and condition: and

View File

@ -3,7 +3,7 @@ info:
name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template
author: pikpikcu,madrobot author: pikpikcu,madrobot
severity: critical severity: critical
refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558 reference: https://nvd.nist.gov/vuln/detail/CVE-2019-17558
tags: cve,cve2019,apache,rce,solr tags: cve,cve2019,apache,rce,solr
requests: requests:

View File

@ -5,7 +5,7 @@ info:
author: pdteam author: pdteam
severity: critical severity: critical
description: A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests. description: A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
refrense: | reference:
- https://swarm.ptsecurity.com/openfire-admin-console/ - https://swarm.ptsecurity.com/openfire-admin-console/
- https://github.com/igniterealtime/Openfire/pull/1497 - https://github.com/igniterealtime/Openfire/pull/1497
tags: cve,cve2019,ssrf,openfire,oob tags: cve,cve2019,ssrf,openfire,oob

View File

@ -5,7 +5,7 @@ info:
author: KBA@SOGETI_ESEC,madrobot,dwisiswant0 author: KBA@SOGETI_ESEC,madrobot,dwisiswant0
severity: medium severity: medium
description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure. description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
refrense: https://www.exploit-db.com/exploits/48698 reference: https://www.exploit-db.com/exploits/48698
tags: cve,cve2019,wordpress,wp-plugin tags: cve,cve2019,wordpress,wp-plugin
requests: requests:

View File

@ -5,7 +5,7 @@ info:
author: knassar702 author: knassar702
severity: medium severity: medium
description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter. description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
refrense: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html reference: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html
tags: cve,cve2019,xss tags: cve,cve2019,xss
requests: requests:

View File

@ -16,7 +16,7 @@ requests:
- "ZTE Corporation. All rights reserved. </div>" - "ZTE Corporation. All rights reserved. </div>"
- '<form name="fLogin" id="fLogin" method="post" onsubmit="return false;" action="">' - '<form name="fLogin" id="fLogin" method="post" onsubmit="return false;" action="">'
part: body part: body
condtion: and condition: and
- type: word - type: word
words: words:

View File

@ -36,4 +36,4 @@ requests:
- "image/" - "image/"
part: all part: all
negative: true negative: true
condtion: or condition: or

View File

@ -4,7 +4,7 @@ info:
author: princechaddha author: princechaddha
severity: high severity: high
tags: etouch,sqli tags: etouch,sqli
refrence: | reference:
- https://github.com/mstxq17/CodeCheck/ - https://github.com/mstxq17/CodeCheck/
- https://www.anquanke.com/post/id/168991 - https://www.anquanke.com/post/id/168991

View File

@ -4,7 +4,7 @@ info:
name: JFrog Unauthentication Builds name: JFrog Unauthentication Builds
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: medium
referemce: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml
tags: jfrog tags: jfrog
requests: requests:

View File

@ -4,7 +4,7 @@ info:
name: Zoo Management System 1.0 - Authentication Bypass name: Zoo Management System 1.0 - Authentication Bypass
author: dwisiswant0 author: dwisiswant0
severity: high severity: high
refernce: https://www.exploit-db.com/exploits/48880 reference: https://www.exploit-db.com/exploits/48880
requests: requests:
- raw: - raw: