Merge pull request #2694 from geeknik/geeknik-patch-1

MIscellaneous updates
patch-1
Sandeep Singh 2021-09-17 02:22:26 +05:30 committed by GitHub
commit f47c4da9e8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 13 additions and 13 deletions

View File

@ -1,7 +1,7 @@
id: adobe-component-login
info:
name: Adobe Component Brower Login
name: Adobe Component Browser Login
author: dhiyaneshDK
severity: info
reference: https://www.exploit-db.com/ghdb/6846

View File

@ -4,7 +4,7 @@ info:
name: bower.json file disclosure
author: oppsec
severity: info
description: Bower is a package manager which stores packages informations in bower.json file
description: Bower is a package manager which stores package information in the bower.json file
tags: exposure
requests:

View File

@ -3,7 +3,7 @@ id: squid-analysis-report-generator
info:
name: Squid Analysis Report Generator
author: geeknik
description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with informations about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.
description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.
reference: https://sourceforge.net/projects/sarg/
severity: high
tags: sarg,exposure,logs

View File

@ -244,7 +244,7 @@ requests:
- "(?i)rabbitmq[_-]?password(=| =|:| :)"
- "(?i)quip[_-]?token(=| =|:| :)"
- "(?i)qiita[_-]?token(=| =|:| :)"
- "(?i)pypi[_-]?passowrd(=| =|:| :)"
- "(?i)pypi[_-]?password(=| =|:| :)"
- "(?i)pushover[_-]?token(=| =|:| :)"
- "(?i)publish[_-]?secret(=| =|:| :)"
- "(?i)publish[_-]?key(=| =|:| :)"
@ -254,7 +254,7 @@ requests:
- "(?i)prod[_-]?password(=| =|:| :)"
- "(?i)prod[_-]?access[_-]?key[_-]?id(=| =|:| :)"
- "(?i)private[_-]?signing[_-]?password(=| =|:| :)"
- "(?i)pring[_-]?mail[_-]?username(=| =|:| :)"
- "(?i)print[_-]?mail[_-]?username(=| =|:| :)"
- "(?i)preferred[_-]?username(=| =|:| :)"
- "(?i)prebuild[_-]?auth(=| =|:| :)"
- "(?i)postgresql[_-]?pass(=| =|:| :)"

View File

@ -34,7 +34,7 @@ file:
regex:
- 'fcntl'
- type: regex
# The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice.
# The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to be bound to an address of their choice.
regex:
- 'bind'
- type: regex
@ -50,7 +50,7 @@ file:
regex:
- 'syscall'
- type: regex
# The second argument specifiying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data.
# The second argument specifying the packed address to bind to, should not be derived from user input. If the address is derived from user input, it is possible for a malicious user to cause the socket to connect to an arbitrary remote address, enabling hijacking of potentially sensitive network data.
regex:
- 'connect'
- type: regex
@ -58,7 +58,7 @@ file:
regex:
- 'system'
- type: regex
# The filename argument of open should be carefully checked if it is being created with any user-supplied string as a compontent of it. Strings should be checked for occurences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed.
# The filename argument of open should be carefully checked if it is being created with any user-supplied string as a component of it. Strings should be checked for occurrences of path backtracking/relative path components (../ as an example), or nulls, which may cause the underlying C call to interpret the filename to open differently than expected. It is also important to make sure that the final filename does not end in a "|", as this will cause the path to be executed.
regex:
- 'open'
- type: regex

View File

@ -3,7 +3,7 @@ info:
name: iis-shortname
author: nodauf
severity: info
description: When IIS uses an old .Net Framwork it's possible to enumeration folder with the symbol ~.
description: When IIS uses an old .Net Framework it's possible to enumeration folder with the symbol ~.
tags: fuzz
reference:

View File

@ -3,7 +3,7 @@ id: google-floc-disabled
info:
name: Google FLoC Disabled
author: geeknik
description: The detected website has decided to explicilty exclude itself from Google FLoC tracking.
description: The detected website has decided to explicitly exclude itself from Google FLoC tracking.
reference: https://www.bleepingcomputer.com/news/security/github-disables-google-floc-user-tracking-on-its-website/
severity: info
tags: google,floc,misc

View File

@ -1,7 +1,7 @@
id: rack-mini-profiler
info:
name: rack-mini-profiler environmnet information discloure
name: rack-mini-profiler environmnet information disclosure
author: vzamanillo
severity: high
tags: config,debug

View File

@ -4,7 +4,7 @@ info:
name: Detect Microsoft SQL Server Reporting
author: puzzlepeaches
severity: info
tags: tech,micrsoft
tags: tech,microsoft
requests:
- method: GET

View File

@ -1,7 +1,7 @@
id: jenkins-script
info:
name: Jenkins RCE due to accesible script functionality
name: Jenkins RCE due to accessible script functionality
author: philippedelteil
severity: critical
reference: https://hackerone.com/reports/403402