fixed lint errors
parent
41a3cb3ed5
commit
e8b8fa1993
|
@ -9,6 +9,7 @@ ignore: |
|
|||
|
||||
rules:
|
||||
document-start: disable
|
||||
comments-indentation: disable
|
||||
line-length: disable
|
||||
new-lines: disable
|
||||
new-line-at-end-of-file: disable
|
||||
|
|
|
@ -19,7 +19,7 @@ info:
|
|||
tags: cve,cve2019,vmware,aria,rce
|
||||
|
||||
variables:
|
||||
keysDir: "helpers/payloads/CVE-2023-34039-keys" # load all private keys from this directory
|
||||
keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
|
||||
|
||||
javascript:
|
||||
# init field can be used to make any preperations before the actual exploit
|
||||
|
@ -38,7 +38,7 @@ javascript:
|
|||
let m = require('nuclei/ssh')
|
||||
let c = m.SSHClient()
|
||||
c.ConnectWithKey(Host,Port,'support@'+Host,key) // returns true if connection is successful
|
||||
|
||||
|
||||
args:
|
||||
Host: "{{Host}}"
|
||||
Port: "22"
|
||||
|
@ -47,12 +47,12 @@ javascript:
|
|||
|
||||
payloads:
|
||||
# 'keys' will be updated by actual private keys after init is executed
|
||||
keys:
|
||||
keys:
|
||||
- dummy1
|
||||
- dummy2
|
||||
|
||||
threads: 10
|
||||
stop-at-first-match: true
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
id: mssql-weak-credentials
|
||||
id: mssql-default-logins
|
||||
|
||||
info:
|
||||
name: Microsoft Sql - Weak Credentials
|
||||
name: Microsoft Sql - Default Logins
|
||||
author: Ice3man543,tarunKoyalwar
|
||||
severity: high
|
||||
description: |
|
||||
|
@ -9,7 +9,7 @@ info:
|
|||
metadata:
|
||||
max-request: 7
|
||||
shodan-query: port:1433
|
||||
tags: js,mssql,default-login,network
|
||||
tags: js,mssql,default-login,network
|
||||
|
||||
javascript:
|
||||
- pre-condition: |
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
metadata:
|
||||
max-request: 9
|
||||
shodan-query: port:5432
|
||||
tags: js,postgres,default-login,network
|
||||
tags: js,postgres,default-login,network
|
||||
|
||||
javascript:
|
||||
- pre-condition: |
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
metadata:
|
||||
max-request: 6
|
||||
shodan-query: product:"redis"
|
||||
tags: js,redis,default-login,network
|
||||
tags: js,redis,default-login,network
|
||||
|
||||
javascript:
|
||||
- pre-condition: |
|
||||
|
|
|
@ -6,7 +6,7 @@ info:
|
|||
severity: critical
|
||||
metadata:
|
||||
shodan-query: port:1433
|
||||
tags: js,ssh,default-login,network
|
||||
tags: js,ssh,default-login,network
|
||||
|
||||
javascript:
|
||||
- pre-condition: |
|
||||
|
|
|
@ -7,7 +7,7 @@ info:
|
|||
metadata:
|
||||
max-request: 1
|
||||
shodan-query: port:1433
|
||||
tags: js,mssql,detect,network
|
||||
tags: js,mssql,detect,network
|
||||
|
||||
javascript:
|
||||
- code: |
|
||||
|
|
|
@ -23,8 +23,9 @@ javascript:
|
|||
Port: "22"
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '"UserAuth":'
|
||||
- '"password"'
|
||||
condition: and
|
|
@ -7,7 +7,7 @@ info:
|
|||
metadata:
|
||||
verified: true
|
||||
shodan-query: product:"OpenSSH"
|
||||
max-request: 1
|
||||
max-request: 1
|
||||
tags: js,ssh,enum,network
|
||||
|
||||
javascript:
|
||||
|
|
Loading…
Reference in New Issue