Add a cve-id
Content enhancements
patch-1
sullo 2022-05-19 16:45:08 -04:00
parent b4f84f4bed
commit f44e8d1883
8 changed files with 23 additions and 8 deletions

View File

@ -5,9 +5,7 @@ info:
author: dwisiswant0,Ph33r
severity: critical
description: |
This F5 BIG-IP vulnerability can allow an unauthenticated attacker
with network access to the BIG-IP system through the management
port and/or self IP addresses to execute arbitrary system commands.
F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, may allow undisclosed requests to bypass iControl REST authentication.
reference:
- https://twitter.com/GossiTheDog/status/1523566937414193153
- https://www.horizon3.ai/f5-icontrol-rest-endpoint-authentication-bypass-technical-deep-dive/
@ -64,3 +62,5 @@ requests:
- "commandResult"
- "8831-2202-EVC"
condition: and
# Enhanced by mp on 2022/05/19

View File

@ -10,6 +10,8 @@ info:
- https://www.exploit-db.com/exploits/50940
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29303
- https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing
classification:
cve-id: CVE-2022-29303
metadata:
shodan-query: http.html:"SolarView Compact"
verified: "true"

View File

@ -3,6 +3,10 @@ id: phpinfo-files
info:
name: phpinfo Disclosure
author: pdteam,daffainfo,meme-lord,dhiyaneshDK
description: |
A "PHP Info" page was found. The output of the phpinfo() command can reveal detailed PHP environment information.
remediation: |
Remove PHP Info pages from publicly accessible sites, or restrict access to authorized users only.
severity: low
tags: config,exposure,phpinfo

View File

@ -20,6 +20,4 @@ file:
words:
- "nodeIntegration: true"
# Enhanced by mp on 2022/05/19

View File

@ -4,7 +4,7 @@ info:
name: HTTP Missing Security Headers
author: socketz,geeknik,G4L1T0,convisoappsec,kurohost,dawid-czarnecki,forgedhallpass
severity: info
description: It searches for missing security headers, but obviously, could be so less generic and could be useless for Bug Bounty.
description: This template searches for missing HTTP security headers. The impact of these missing headers can vary.
tags: misconfig,generic
requests:

View File

@ -4,7 +4,10 @@ info:
name: Laravel Debug Enabled
author: notsoevilweasel
severity: medium
description: Laravel with APP_DEBUG set to true is prone to show verbose errors.
description: |
Laravel with APP_DEBUG set to true is prone to show verbose errors.
remediation: |
Disable Laravel's debug mode by setting APP_DEBUG to false.
tags: debug,laravel,misconfig
requests:

View File

@ -1,11 +1,15 @@
id: deprecated-tls
info:
name: Deprecated TLS Detection (inferior to TLS 1.2)
name: Deprecated TLS Detection (TLS 1.1 or SSLv3)
author: righettod
severity: info
reference:
- https://ssl-config.mozilla.org/#config=intermediate
description: |
Both TLS 1.1 and SSLv3 are deprecated in favor of stronger encryption.
remediation: |
Update the web server's TLS configuration to disable TLS 1.1 and SSLv3.
metadata:
shodan-query: ssl.version:sslv2 ssl.version:sslv3 ssl.version:tlsv1 ssl.version:tlsv1.1
tags: ssl

View File

@ -4,6 +4,10 @@ info:
name: Laravel Ignition XSS
author: 0x_Akoko
severity: medium
description: |
Laravel's Ignition contains a cross-site scripting vulnerability when debug mode is enabled.
remediation: |
Disable Laravel's debug mode by setting APP_DEBUG to false.
reference:
- https://www.acunetix.com/vulnerabilities/web/laravel-ignition-reflected-cross-site-scripting/
- https://github.com/facade/ignition/issues/273