update tags

patch-1
Prince Chaddha 2022-10-13 15:42:07 +05:30
parent 4f44275a63
commit fdaae66c37
74 changed files with 78 additions and 72 deletions

View File

@ -9,7 +9,7 @@ info:
shodan-query:
- html:"angular.json"
- html:"angular-cli.json"
tags: exposure,angularjs
tags: exposure,angularjs,files
requests:
- method: GET

View File

@ -10,7 +10,7 @@ info:
- https://twitter.com/hacker_/status/1518003548855930882?s=20&t=BVauK0yUjVl5yL7rwy0Eag
metadata:
verified: true
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
It discloses username and password created by remote-sync for Atom, contains FTP and/or SCP/SFTP/SSH server details and credentials
metadata:
verified: true
tags: atom,exposure,config
tags: atom,exposure,config,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Axis Happyaxis Exposure
author: dogasantos
severity: info
tags: axis,axis2,middleware,exposure,apache
tags: axis,axis2,middleware,exposure,apache,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"azure-pipelines.yml"
tags: config,exposure,azure,microsoft,cloud,devops
tags: config,exposure,azure,microsoft,cloud,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"bitbucket-pipelines.yml"
tags: exposure,bitbucket,devops,cicd
tags: exposure,bitbucket,devops,cicd,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: oppsec
severity: info
description: Bower is a package manager which stores package information in the bower.json file
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "build.properties"
tags: exposure,config
tags: exposure,config,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
shodan-query: html:"cloud-config.yml"
tags: exposure,cloud,devops
tags: exposure,cloud,devops,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
- https://securiteam.com/windowsntfocus/5bp081f0ac/
metadata:
shodan-query: http.component:"Adobe ColdFusion"
tags: exposure,coldfusion,adobe
tags: exposure,coldfusion,adobe,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intext:"index of /" ".composer-auth.json"
tags: exposure,devops
tags: exposure,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "credentials.json"
tags: google,secret,exposure
tags: google,secret,exposure,files
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info
reference:
- https://www.acunetix.com/vulnerabilities/web/insecure-crossdomain-xml-file
tags: exposure,generic
tags: exposure,generic,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: geeknik
severity: info
description: This file is auto-generated from the current state of the database.
tags: exposure,backup
tags: exposure,backup,files
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
severity: info
metadata:
shodan-query: 'html:"desktop.ini"'
tags: exposure,config
tags: exposure,config,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
shodan-query: html:settings.py
tags: django,exposure
tags: django,exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "docker-cloud.yml"
tags: exposure,cloud,devops,docker
tags: exposure,cloud,devops,docker,files
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
severity: low
reference:
- https://twitter.com/Wh11teW0lf/status/1295594085445709824
tags: exposure,lotus
tags: exposure,lotus,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Directory Listing via DS_Store
author: 0w4ys
severity: info
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
description: The Dreamweaver file dwsync.xml was discovered. The dwsync.xml file is a file generated by Dreamweaver which contains information related to what files are in the website directory.
classification:
cwe-id: CWE-200
tags: dwsync,exposure,dreamweaver
tags: dwsync,exposure,dreamweaver,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "environment.rb"
tags: ruby,devops,exposure
tags: ruby,devops,exposure,files
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
severity: medium
reference:
- https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/
tags: exposure,spring
tags: exposure,spring,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Filezilla
author: amsda
severity: medium
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
shodan-query: html:ftpconfig
tags: atom,ftp,config,exposure
tags: atom,ftp,config,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"access_tokens.db"
tags: google,cloud,devops,exposure
tags: google,cloud,devops,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"credentials.db"
tags: google,cloud,devops,exposure
tags: google,cloud,devops,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "get_access_token.json"
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
shodan-query: html:mailmap
tags: config,exposure,git,mailmap
tags: config,exposure,git,mailmap,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: hahwul
severity: info
description: Find github page files(Gemfile / Gemfile.lock)
tags: github,exposure
tags: github,exposure,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: hahwul
severity: info
description: Find github pages config file.
tags: github,exposure,config
tags: github,exposure,config,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: GLPI Status Domain Disclosure
author: dogasantos
severity: info
tags: glpi,exposure,status
tags: glpi,exposure,status,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Gogs (Go Git Service) - Install Exposure
author: dhiyaneshDk
severity: high
tags: gogs,exposure
tags: gogs,exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "google-api-private-key.json"
tags: exposure,cloud,google,devops
tags: exposure,cloud,google,devops,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "google-services.json"
tags: google,cloud,exposure
tags: google,cloud,exposure,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: martincodes-de
severity: info
description: Searches for .idea Folder by querying the /.idea and a few other files with sensitive data.
tags: phpstorm,jetbrains,idea,exposure
tags: phpstorm,jetbrains,idea,exposure,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "jsapi_ticket.json"
tags: exposure,jsapi
tags: exposure,jsapi,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: Keycloak Json File
author: oppsec
severity: info
tags: exposure,keycloak,config
tags: exposure,keycloak,config,files
requests:
- method: GET

View File

@ -10,6 +10,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/lfm.php"
matchers-condition: and
matchers:
- type: status

View File

@ -9,7 +9,7 @@ info:
metadata:
verified: true
shodan-query: html:"anonymous-cli-metrics.json"
tags: exposure,file,npm,config
tags: exposure,npm,config,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"anonymous-cli-metrics.json"
tags: npm,devops,exposure
tags: npm,devops,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"npm-shrinkwrap.json"
tags: config,exposure,npm
tags: config,exposure,npm,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "oauth-credentials.json"
tags: exposure,oauth
tags: exposure,oauth,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "pantheon.upstream.yml"
tags: exposure,devops,patheon,config
tags: exposure,devops,patheon,config,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
shodan-query: php.ini
tags: config,exposure
tags: config,exposure,files
requests:
- method: GET

View File

@ -6,7 +6,7 @@ info:
severity: medium
reference:
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/php-user-ini-disclosure.json
tags: exposure,config
tags: exposure,config,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: ".phpunit.result.cache"
tags: config,exposure,devops
tags: config,exposure,devops,files
requests:
- method: GET

View File

@ -10,12 +10,13 @@ info:
classification:
cwe-id: CWE-200
remediation: Ensure the approved and updated version is installed.
tags: exposure
tags: exposure,files
requests:
- method: GET
path:
- "{{BaseURL}}/phpunit.xml"
matchers-condition: and
matchers:
- type: word
@ -23,6 +24,7 @@ requests:
- "<phpunit"
- "</phpunit>"
condition: and
- type: status
status:
- 200

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"pipeline.yaml"
tags: devops,exposure,cicd
tags: devops,exposure,cicd,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"Pipfile"
tags: exposure,pip,devops,cicd
tags: exposure,pip,devops,cicd,files
requests:
- method: GET

View File

@ -12,6 +12,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/config/initializers/secret_token.rb"
matchers-condition: and
matchers:
- type: word

View File

@ -7,7 +7,7 @@ info:
description: Internal documentation file often used in projects which can contain sensitive information.
metadata:
shodan-query: html:"README.MD"
tags: exposure,markdown
tags: exposure,markdown,files
requests:
- method: GET

View File

@ -9,7 +9,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" configuration.yml
tags: exposure,redmine,devops,edb
tags: exposure,redmine,devops,edb,files
requests:
- method: GET
@ -19,7 +19,6 @@ requests:
- "{{BaseURL}}/redmine/config/configuration.yml"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "settings.yml"
tags: misconfig,redmine,devops
tags: misconfig,redmine,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" storage.yml
tags: exposure,ruby,devops
tags: exposure,ruby,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "secret_token.rb"
tags: redmine,devops,exposure,ruby
tags: redmine,devops,exposure,ruby,files
requests:
- method: GET

View File

@ -8,7 +8,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "secrets.yml"
tags: misconfig,cloud,devops
tags: misconfig,cloud,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"sendgrid.env"
tags: exposure,sendgrid,key,api
tags: exposure,sendgrid,key,api,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
description: Searches for sensitive keys file,logs,debugbar,app.
reference:
- https://www.exploit-db.com/ghdb/6304
tags: expose,listing,config,logs,storage,edb
tags: expose,listing,config,logs,storage,edb,files
requests:
- method: GET
@ -18,6 +18,7 @@ requests:
- "{{BaseURL}}/server/storage/"
- "{{BaseURL}}/intikal/storage/"
- "{{BaseURL}}/elocker_old/storage/"
stop-at-first-match: true
matchers-condition: and
matchers:
@ -27,6 +28,7 @@ requests:
- "oauth-private.key"
- "oauth-private.key"
condition: and
- type: status
status:
- 200

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "service-Account-Credentials.json"
tags: privatekey,exposure
tags: privatekey,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: ".styleci.yml"
tags: config,exposure,devops
tags: config,exposure,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "properties.ini"
tags: symfony,exposure
tags: symfony,exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "security.yml"
tags: symfony,devops,exposure
tags: symfony,devops,exposure,files
requests:
- method: GET

View File

@ -12,6 +12,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/Thumbs.db"
matchers-condition: and
matchers:
- type: binary

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "token_info.json"
tags: exposure
tags: exposure,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"index of" "token.json"
tags: exposure,cloud,google,devops
tags: exposure,cloud,google,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"uwsgi.ini"
tags: exposure,uwsgi
tags: exposure,uwsgi,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"Vagrantfile"
tags: config,exposure,vagrant,oss
tags: config,exposure,vagrant,oss,files
requests:
- method: GET

View File

@ -9,7 +9,7 @@ info:
metadata:
verified: true
shodan-query: html:"sftp.json"
tags: exposure,vscode,sftp,ssh
tags: exposure,vscode,sftp,ssh,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"webpack.mix.js"
tags: config,exposure,devops
tags: config,exposure,devops,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:".wget-hsts"
tags: devops,exposure,wget
tags: devops,exposure,wget,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
shodan-query: html:"wp-cli.yml"
tags: config,exposure,wp-cli
tags: config,exposure,wp-cli,files
requests:
- method: GET

View File

@ -7,7 +7,7 @@ info:
metadata:
verified: true
google-query: intitle:"Index of" ws_ftp.ini
tags: exposure,ftp
tags: exposure,ftp,files
requests:
- method: GET

View File

@ -4,7 +4,7 @@ info:
name: XAMPP Environment Variables Exposure
author: melbadry9,DhiyaneshDK
severity: low
tags: exposure,xampp
tags: exposure,xampp,files
requests:
- method: GET

View File

@ -5,7 +5,7 @@ info:
author: oppsec
severity: info
description: The yarn.lock file stores the versions of each Yarn dependency installed.
tags: exposure
tags: exposure,files
requests:
- method: GET