parent
b4f84f4bed
commit
f44e8d1883
|
@ -5,9 +5,7 @@ info:
|
|||
author: dwisiswant0,Ph33r
|
||||
severity: critical
|
||||
description: |
|
||||
This F5 BIG-IP vulnerability can allow an unauthenticated attacker
|
||||
with network access to the BIG-IP system through the management
|
||||
port and/or self IP addresses to execute arbitrary system commands.
|
||||
F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, may allow undisclosed requests to bypass iControl REST authentication.
|
||||
reference:
|
||||
- https://twitter.com/GossiTheDog/status/1523566937414193153
|
||||
- https://www.horizon3.ai/f5-icontrol-rest-endpoint-authentication-bypass-technical-deep-dive/
|
||||
|
@ -64,3 +62,5 @@ requests:
|
|||
- "commandResult"
|
||||
- "8831-2202-EVC"
|
||||
condition: and
|
||||
|
||||
# Enhanced by mp on 2022/05/19
|
||||
|
|
|
@ -10,6 +10,8 @@ info:
|
|||
- https://www.exploit-db.com/exploits/50940
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29303
|
||||
- https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing
|
||||
classification:
|
||||
cve-id: CVE-2022-29303
|
||||
metadata:
|
||||
shodan-query: http.html:"SolarView Compact"
|
||||
verified: "true"
|
||||
|
|
|
@ -3,6 +3,10 @@ id: phpinfo-files
|
|||
info:
|
||||
name: phpinfo Disclosure
|
||||
author: pdteam,daffainfo,meme-lord,dhiyaneshDK
|
||||
description: |
|
||||
A "PHP Info" page was found. The output of the phpinfo() command can reveal detailed PHP environment information.
|
||||
remediation: |
|
||||
Remove PHP Info pages from publicly accessible sites, or restrict access to authorized users only.
|
||||
severity: low
|
||||
tags: config,exposure,phpinfo
|
||||
|
||||
|
|
|
@ -20,6 +20,4 @@ file:
|
|||
words:
|
||||
- "nodeIntegration: true"
|
||||
|
||||
|
||||
|
||||
# Enhanced by mp on 2022/05/19
|
||||
|
|
|
@ -4,7 +4,7 @@ info:
|
|||
name: HTTP Missing Security Headers
|
||||
author: socketz,geeknik,G4L1T0,convisoappsec,kurohost,dawid-czarnecki,forgedhallpass
|
||||
severity: info
|
||||
description: It searches for missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty.
|
||||
description: This template searches for missing HTTP security headers. The impact of these missing headers can vary.
|
||||
tags: misconfig,generic
|
||||
|
||||
requests:
|
||||
|
|
|
@ -4,7 +4,10 @@ info:
|
|||
name: Laravel Debug Enabled
|
||||
author: notsoevilweasel
|
||||
severity: medium
|
||||
description: Laravel with APP_DEBUG set to true is prone to show verbose errors.
|
||||
description: |
|
||||
Laravel with APP_DEBUG set to true is prone to show verbose errors.
|
||||
remediation: |
|
||||
Disable Laravel's debug mode by setting APP_DEBUG to false.
|
||||
tags: debug,laravel,misconfig
|
||||
|
||||
requests:
|
||||
|
|
|
@ -1,11 +1,15 @@
|
|||
id: deprecated-tls
|
||||
|
||||
info:
|
||||
name: Deprecated TLS Detection (inferior to TLS 1.2)
|
||||
name: Deprecated TLS Detection (TLS 1.1 or SSLv3)
|
||||
author: righettod
|
||||
severity: info
|
||||
reference:
|
||||
- https://ssl-config.mozilla.org/#config=intermediate
|
||||
description: |
|
||||
Both TLS 1.1 and SSLv3 are deprecated in favor of stronger encryption.
|
||||
remediation: |
|
||||
Update the web server's TLS configuration to disable TLS 1.1 and SSLv3.
|
||||
metadata:
|
||||
shodan-query: ssl.version:sslv2 ssl.version:sslv3 ssl.version:tlsv1 ssl.version:tlsv1.1
|
||||
tags: ssl
|
||||
|
|
|
@ -4,6 +4,10 @@ info:
|
|||
name: Laravel Ignition XSS
|
||||
author: 0x_Akoko
|
||||
severity: medium
|
||||
description: |
|
||||
Laravel's Ignition contains a cross-site scripting vulnerability when debug mode is enabled.
|
||||
remediation: |
|
||||
Disable Laravel's debug mode by setting APP_DEBUG to false.
|
||||
reference:
|
||||
- https://www.acunetix.com/vulnerabilities/web/laravel-ignition-reflected-cross-site-scripting/
|
||||
- https://github.com/facade/ignition/issues/273
|
||||
|
|
Loading…
Reference in New Issue