Merge pull request #1088 from nrathaus/master

Smarter Regex
patch-1
PD-Team 2021-03-16 13:52:26 +05:30 committed by GitHub
commit f099ed021f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 21 additions and 8 deletions

View File

@ -4,7 +4,9 @@ info:
name: Apache Cocoon 2.1.12 XML Injection
author: pikpikcu
severity: high
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11991
description: |
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
reference: https://lists.apache.org/thread.html/r77add973ea521185e1a90aca00ba9dae7caa8d8b944d92421702bb54%40%3Cusers.cocoon.apache.org%3E
requests:
- method: POST

View File

@ -6,6 +6,8 @@ info:
description: Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
severity: medium
tags: cve,cve2020,apache,xss
reference:
- https://lists.apache.org/thread.html/rf867d9a25fa656b279b16e27b8ff6fcda689cfa4275a26655c685702%40%3Cdev.ofbiz.apache.org%3E
requests:
- method: GET

View File

@ -3,7 +3,10 @@ info:
name: Cisco SD-WAN vManage Software Directory Traversal
author: madrobot
severity: high
reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26073
description: |
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
reference:
- https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-vman-traversal-hQh24tmk.html
tags: cve,cve2020,cisco,lfi
requests:

View File

@ -23,13 +23,11 @@ requests:
- 200
- type: regex
regex:
- 'name":"Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'
- 'name": "Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'
- 'name":\s*"Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'
condition: or
- type: regex
regex:
- 'provider":"ldap"'
- 'provider": "ldap"'
- 'provider":\s*"ldap"'
condition: or
extractors:
- type: regex
@ -37,5 +35,4 @@ requests:
name: alerta-version
group: 1
regex:
- 'name":"Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'
- 'name": "Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'
- 'name":\s*"Alerta ([0-7]\.[0-9]\.[0-9]|8\.0.[0-9])"'

View File

@ -5,6 +5,10 @@ info:
author: dwisiswant0
severity: high
tags: cve,cve2020,citrix
description: |
Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download.
reference:
- https://support.citrix.com/article/CTX276688
requests:
- raw:

View File

@ -6,6 +6,8 @@ info:
severity: high
description: Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server
tags: cve,cve2020,apache
reference:
- http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
requests:
- method: GET

View File

@ -6,6 +6,9 @@ info:
severity: medium
description: XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
tags: cve,cve2020,apache
reference:
- http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html
- http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html
# This template detects a Java deserialization vulnerability in Apache