fixed lint errors

patch-1
Prince Chaddha 2023-11-09 14:14:00 +05:30
parent 41a3cb3ed5
commit e8b8fa1993
9 changed files with 16 additions and 14 deletions

View File

@ -9,6 +9,7 @@ ignore: |
rules: rules:
document-start: disable document-start: disable
comments-indentation: disable
line-length: disable line-length: disable
new-lines: disable new-lines: disable
new-line-at-end-of-file: disable new-line-at-end-of-file: disable

View File

@ -19,7 +19,7 @@ info:
tags: cve,cve2019,vmware,aria,rce tags: cve,cve2019,vmware,aria,rce
variables: variables:
keysDir: "helpers/payloads/CVE-2023-34039-keys" # load all private keys from this directory keysDir: "helpers/payloads/cve-2023-34039-keys" # load all private keys from this directory
javascript: javascript:
# init field can be used to make any preperations before the actual exploit # init field can be used to make any preperations before the actual exploit
@ -38,7 +38,7 @@ javascript:
let m = require('nuclei/ssh') let m = require('nuclei/ssh')
let c = m.SSHClient() let c = m.SSHClient()
c.ConnectWithKey(Host,Port,'support@'+Host,key) // returns true if connection is successful c.ConnectWithKey(Host,Port,'support@'+Host,key) // returns true if connection is successful
args: args:
Host: "{{Host}}" Host: "{{Host}}"
Port: "22" Port: "22"
@ -47,12 +47,12 @@ javascript:
payloads: payloads:
# 'keys' will be updated by actual private keys after init is executed # 'keys' will be updated by actual private keys after init is executed
keys: keys:
- dummy1 - dummy1
- dummy2 - dummy2
threads: 10 threads: 10
stop-at-first-match: true stop-at-first-match: true
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:

View File

@ -1,7 +1,7 @@
id: mssql-weak-credentials id: mssql-default-logins
info: info:
name: Microsoft Sql - Weak Credentials name: Microsoft Sql - Default Logins
author: Ice3man543,tarunKoyalwar author: Ice3man543,tarunKoyalwar
severity: high severity: high
description: | description: |
@ -9,7 +9,7 @@ info:
metadata: metadata:
max-request: 7 max-request: 7
shodan-query: port:1433 shodan-query: port:1433
tags: js,mssql,default-login,network tags: js,mssql,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |

View File

@ -8,7 +8,7 @@ info:
metadata: metadata:
max-request: 9 max-request: 9
shodan-query: port:5432 shodan-query: port:5432
tags: js,postgres,default-login,network tags: js,postgres,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |

View File

@ -8,7 +8,7 @@ info:
metadata: metadata:
max-request: 6 max-request: 6
shodan-query: product:"redis" shodan-query: product:"redis"
tags: js,redis,default-login,network tags: js,redis,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |

View File

@ -6,7 +6,7 @@ info:
severity: critical severity: critical
metadata: metadata:
shodan-query: port:1433 shodan-query: port:1433
tags: js,ssh,default-login,network tags: js,ssh,default-login,network
javascript: javascript:
- pre-condition: | - pre-condition: |

View File

@ -7,7 +7,7 @@ info:
metadata: metadata:
max-request: 1 max-request: 1
shodan-query: port:1433 shodan-query: port:1433
tags: js,mssql,detect,network tags: js,mssql,detect,network
javascript: javascript:
- code: | - code: |

View File

@ -23,8 +23,9 @@ javascript:
Port: "22" Port: "22"
matchers: matchers:
- type: dsl - type: word
dsl: part: body
words:
- '"UserAuth":' - '"UserAuth":'
- '"password"' - '"password"'
condition: and condition: and

View File

@ -7,7 +7,7 @@ info:
metadata: metadata:
verified: true verified: true
shodan-query: product:"OpenSSH" shodan-query: product:"OpenSSH"
max-request: 1 max-request: 1
tags: js,ssh,enum,network tags: js,ssh,enum,network
javascript: javascript: