Fixed mistakes/typos in the templates.
Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84patch-1
parent
cdf9451158
commit
e68d15ab63
|
@ -5,7 +5,7 @@ info:
|
||||||
author: emadshanab
|
author: emadshanab
|
||||||
severity: high
|
severity: high
|
||||||
description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server
|
description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server
|
||||||
refrense: |
|
reference:
|
||||||
- https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/
|
- https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2015-8813
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-8813
|
||||||
tags: cve,cve2015,ssrf,oob
|
tags: cve,cve2015,ssrf,oob
|
||||||
|
|
|
@ -12,8 +12,8 @@ requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- "{{BaseURL}}/system/console?.css"
|
- "{{BaseURL}}/system/console?.css"
|
||||||
header:
|
headers:
|
||||||
- Authorization: "Basic YWRtaW46YWRtaW4K"
|
Authorization: "Basic YWRtaW46YWRtaW4K"
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -22,5 +22,5 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- "root:.*:0:0:"
|
- "root:.*:0:0:"
|
||||||
- "\\[(font|extension|file)s\\]"
|
- "\\[(font|extension|file)s\\]"
|
||||||
conditon: or
|
condition: or
|
||||||
part: body
|
part: body
|
||||||
|
|
|
@ -19,4 +19,4 @@ requests:
|
||||||
words:
|
words:
|
||||||
- "* Copyright (c) 2005,2013, Oracle"
|
- "* Copyright (c) 2005,2013, Oracle"
|
||||||
- "<title>settings</title>"
|
- "<title>settings</title>"
|
||||||
conditon: and
|
condition: and
|
|
@ -3,7 +3,7 @@ info:
|
||||||
name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template
|
name: Apache Solr 8.3.0 - Remote Code Execution via Velocity Template
|
||||||
author: pikpikcu,madrobot
|
author: pikpikcu,madrobot
|
||||||
severity: critical
|
severity: critical
|
||||||
refrense: https://nvd.nist.gov/vuln/detail/CVE-2019-17558
|
reference: https://nvd.nist.gov/vuln/detail/CVE-2019-17558
|
||||||
tags: cve,cve2019,apache,rce,solr
|
tags: cve,cve2019,apache,rce,solr
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: pdteam
|
author: pdteam
|
||||||
severity: critical
|
severity: critical
|
||||||
description: A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
|
description: A Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.
|
||||||
refrense: |
|
reference:
|
||||||
- https://swarm.ptsecurity.com/openfire-admin-console/
|
- https://swarm.ptsecurity.com/openfire-admin-console/
|
||||||
- https://github.com/igniterealtime/Openfire/pull/1497
|
- https://github.com/igniterealtime/Openfire/pull/1497
|
||||||
tags: cve,cve2019,ssrf,openfire,oob
|
tags: cve,cve2019,ssrf,openfire,oob
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: KBA@SOGETI_ESEC,madrobot,dwisiswant0
|
author: KBA@SOGETI_ESEC,madrobot,dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
|
description: The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed unauthenticated file download with user information disclosure.
|
||||||
refrense: https://www.exploit-db.com/exploits/48698
|
reference: https://www.exploit-db.com/exploits/48698
|
||||||
tags: cve,cve2019,wordpress,wp-plugin
|
tags: cve,cve2019,wordpress,wp-plugin
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: knassar702
|
author: knassar702
|
||||||
severity: medium
|
severity: medium
|
||||||
description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
|
description: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
|
||||||
refrense: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html
|
reference: https://knassar7o2.blogspot.com/2019/12/neon-dashboard-cve-2019-20141.html
|
||||||
tags: cve,cve2019,xss
|
tags: cve,cve2019,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -16,7 +16,7 @@ requests:
|
||||||
- "ZTE Corporation. All rights reserved. </div>"
|
- "ZTE Corporation. All rights reserved. </div>"
|
||||||
- '<form name="fLogin" id="fLogin" method="post" onsubmit="return false;" action="">'
|
- '<form name="fLogin" id="fLogin" method="post" onsubmit="return false;" action="">'
|
||||||
part: body
|
part: body
|
||||||
condtion: and
|
condition: and
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
|
@ -36,4 +36,4 @@ requests:
|
||||||
- "image/"
|
- "image/"
|
||||||
part: all
|
part: all
|
||||||
negative: true
|
negative: true
|
||||||
condtion: or
|
condition: or
|
|
@ -4,7 +4,7 @@ info:
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: high
|
severity: high
|
||||||
tags: etouch,sqli
|
tags: etouch,sqli
|
||||||
refrence: |
|
reference:
|
||||||
- https://github.com/mstxq17/CodeCheck/
|
- https://github.com/mstxq17/CodeCheck/
|
||||||
- https://www.anquanke.com/post/id/168991
|
- https://www.anquanke.com/post/id/168991
|
||||||
|
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: JFrog Unauthentication Builds
|
name: JFrog Unauthentication Builds
|
||||||
author: dhiyaneshDK
|
author: dhiyaneshDK
|
||||||
severity: medium
|
severity: medium
|
||||||
referemce: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml
|
reference: https://github.com/jaeles-project/jaeles-signatures/blob/master/common/jfrog-unauth-build-exposed.yaml
|
||||||
tags: jfrog
|
tags: jfrog
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Zoo Management System 1.0 - Authentication Bypass
|
name: Zoo Management System 1.0 - Authentication Bypass
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: high
|
severity: high
|
||||||
refernce: https://www.exploit-db.com/exploits/48880
|
reference: https://www.exploit-db.com/exploits/48880
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
Loading…
Reference in New Issue