Changes fixes/around dynamic attributes ("additional-fields")
Related nuclei tickets: * #259 - dynamic key-value field support for template information * #940 - new infos in template * #834 * RES-84patch-1
parent
0b432b341b
commit
ffaff64565
|
@ -5,8 +5,9 @@ info:
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: high
|
severity: high
|
||||||
description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
|
description: Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file. Combined with ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
|
||||||
reference: https://www.phpmyadmin.net/security/PMASA-2009-3/
|
reference:
|
||||||
vulhub: https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
|
- https://www.phpmyadmin.net/security/PMASA-2009-3/
|
||||||
|
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
|
||||||
tags: cve,cve2009,phpmyadmin,rce,deserialization
|
tags: cve,cve2009,phpmyadmin,rce,deserialization
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,9 +4,10 @@ info:
|
||||||
name: Geddy before v13.0.8 LFI
|
name: Geddy before v13.0.8 LFI
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
issues: https://github.com/geddy/geddy/issues/697
|
|
||||||
description: Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.
|
description: Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.
|
||||||
reference: https://nodesecurity.io/advisories/geddy-directory-traversal
|
reference:
|
||||||
|
- https://nodesecurity.io/advisories/geddy-directory-traversal
|
||||||
|
- https://github.com/geddy/geddy/issues/697
|
||||||
tags: cve,cve2015,geddy,lfi
|
tags: cve,cve2015,geddy,lfi
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,8 +4,9 @@ info:
|
||||||
name: Apache Tika 1.15-1.17 Header Command Injection
|
name: Apache Tika 1.15-1.17 Header Command Injection
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: critical
|
severity: critical
|
||||||
reference: https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/
|
reference:
|
||||||
edb: https://www.exploit-db.com/exploits/47208
|
- https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/
|
||||||
|
- https://www.exploit-db.com/exploits/47208
|
||||||
tags: cve,cve2018,apache,tika,rce
|
tags: cve,cve2018,apache,tika,rce
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,11 +4,12 @@ info:
|
||||||
name: Timesheet 1.5.3 - Cross Site Scripting
|
name: Timesheet 1.5.3 - Cross Site Scripting
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2019-1010287
|
reference:
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-1010287
|
||||||
|
- http://www.mdh-tz.info/ # demo
|
||||||
tags: cve,cve2019,timesheet,xss
|
tags: cve,cve2019,timesheet,xss
|
||||||
|
additional-fields:
|
||||||
# Google-Dork: inurl:"/timesheet/login.php"
|
google-dork: inurl:"/timesheet/login.php"
|
||||||
# Demo: http://www.mdh-tz.info/
|
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw: # Metod POST From login.php
|
- raw: # Metod POST From login.php
|
||||||
|
|
|
@ -6,8 +6,9 @@ info:
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Web Port 1.19.1 allows XSS via the /log type parameter.
|
description: Web Port 1.19.1 allows XSS via the /log type parameter.
|
||||||
tags: cve,cve2019,xss
|
tags: cve,cve2019,xss
|
||||||
reference: https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS
|
reference:
|
||||||
software: https://webport.se/nedladdningar/
|
- https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS
|
||||||
|
- https://webport.se/nedladdningar/
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -6,12 +6,13 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
description: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
|
description: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
|
||||||
tags: cve,cve2019,lfi
|
tags: cve,cve2019,lfi
|
||||||
reference: https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt
|
reference:
|
||||||
|
- https://github.com/JameelNabbo/exploits/blob/master/IceWarp%20%3C%3D10.4.4%20local%20file%20include.txt
|
||||||
# reference: https://nvd.nist.gov/vuln/detail/CVE-2019-12593
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-12593
|
||||||
# Google Dork:-Powered By IceWarp 10.4.4
|
- http://www.icewarp.com # vendor homepage
|
||||||
# Vendor Homepage: http://www.icewarp.com
|
- https://www.icewarp.com/downloads/trial/ # software link
|
||||||
# Software Link: https://www.icewarp.com/downloads/trial/
|
additional-fields:
|
||||||
|
google-dork: Powered By IceWarp 10.4.4
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,8 +5,9 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.
|
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.
|
||||||
issues: https://github.com/goharbor/harbor/issues/8951
|
reference:
|
||||||
reference: https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/
|
- https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/
|
||||||
|
- https://github.com/goharbor/harbor/issues/8951
|
||||||
tags: cve,cve2019,intrusive,harbor
|
tags: cve,cve2019,intrusive,harbor
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -3,12 +3,13 @@ info:
|
||||||
name: Oracle Fusion - "getPreviewImage" Directory Traversal/Local File Inclusion
|
name: Oracle Fusion - "getPreviewImage" Directory Traversal/Local File Inclusion
|
||||||
description: 'Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - "getPreviewImage" Directory Traversal/Local File Inclusion'
|
description: 'Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - "getPreviewImage" Directory Traversal/Local File Inclusion'
|
||||||
author: Ivo Palazzolo (@palaziv)
|
author: Ivo Palazzolo (@palaziv)
|
||||||
cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'
|
|
||||||
severity: high
|
severity: high
|
||||||
tags: cve,cve2020,oracle,lfi
|
tags: cve,cve2020,oracle,lfi
|
||||||
reference:
|
reference:
|
||||||
- http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html
|
- http://packetstormsecurity.com/files/159748/Oracle-Business-Intelligence-Enterprise-Edition-5.5.0.0.0-12.2.1.3.0-12.2.1.4.0-LFI.html
|
||||||
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
||||||
|
additional-fields:
|
||||||
|
cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,8 +4,9 @@ info:
|
||||||
name: TileServer GL Reflected XSS
|
name: TileServer GL Reflected XSS
|
||||||
author: Akash.C
|
author: Akash.C
|
||||||
severity: medium
|
severity: medium
|
||||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2020-15500
|
reference:
|
||||||
source: https://github.com/maptiler/tileserver-gl/issues/461
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-15500
|
||||||
|
- https://github.com/maptiler/tileserver-gl/issues/461
|
||||||
tags: cve,cve2020,xss,tileserver
|
tags: cve,cve2020,xss,tileserver
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -5,8 +5,9 @@ info:
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: bigip,cve,cve2021,rce
|
tags: bigip,cve,cve2021,rce
|
||||||
description: The iControl REST interface has an unauthenticated remote command execution vulnerability.
|
description: The iControl REST interface has an unauthenticated remote command execution vulnerability.
|
||||||
reference: https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986
|
reference:
|
||||||
advisory: https://support.f5.com/csp/article/K03009991
|
- https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986
|
||||||
|
- https://support.f5.com/csp/article/K03009991
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
description: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
|
description: LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
|
||||||
reference: https://github.com/linkedin/oncall/issues/341
|
reference: https://github.com/linkedin/oncall/issues/341
|
||||||
tags: cve,cve2021,linkedin,xss
|
tags: cve,cve2021,linkedin,xss
|
||||||
issues: https://github.com/linkedin/oncall/issues/341
|
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,7 +5,8 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: low
|
severity: low
|
||||||
tags: szhe,default-login
|
tags: szhe,default-login
|
||||||
vendor: https://github.com/Cl0udG0d/SZhe_Scan
|
reference:
|
||||||
|
- https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- method: POST
|
||||||
|
|
|
@ -5,7 +5,8 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: info
|
severity: info
|
||||||
tags: frp,unauth,panel
|
tags: frp,unauth,panel
|
||||||
vendor: https://github.com/fatedier/frp/
|
reference:
|
||||||
|
- https://github.com/fatedier/frp/ # vendor homepage
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -4,8 +4,9 @@ info:
|
||||||
name: F5 BIGIP Unencrypted Cookie
|
name: F5 BIGIP Unencrypted Cookie
|
||||||
author: PR3R00T
|
author: PR3R00T
|
||||||
severity: info
|
severity: info
|
||||||
reference: https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values
|
reference:
|
||||||
mitigation: https://support.f5.com/csp/article/K23254150
|
- https://www.intelisecure.com/how-to-decode-big-ip-f5-persistence-cookie-values
|
||||||
|
- https://support.f5.com/csp/article/K23254150
|
||||||
tags: misc
|
tags: misc
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Unauthenticated Nacos access v1.x
|
name: Unauthenticated Nacos access v1.x
|
||||||
author: taielab,pikpikcu
|
author: taielab,pikpikcu
|
||||||
severity: critical
|
severity: critical
|
||||||
issues: https://github.com/alibaba/nacos/issues/4593
|
reference: https://github.com/alibaba/nacos/issues/4593
|
||||||
tags: nacos,unauth
|
tags: nacos,unauth
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -4,8 +4,9 @@ info:
|
||||||
author: 0xelkomy
|
author: 0xelkomy
|
||||||
severity: low
|
severity: low
|
||||||
description: As per guideline one should protect purges with ACLs from unauthorized hosts.
|
description: As per guideline one should protect purges with ACLs from unauthorized hosts.
|
||||||
reference: https://book.varnish-software.com/4.0/chapters/Cache_Invalidation.html
|
reference:
|
||||||
hackerone: https://hackerone.com/reports/154278
|
- https://book.varnish-software.com/4.0/chapters/Cache_Invalidation.html
|
||||||
|
- https://hackerone.com/reports/154278
|
||||||
tags: varnish,misconfig,cache
|
tags: varnish,misconfig,cache
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
|
@ -6,7 +6,8 @@ info:
|
||||||
severity: medium
|
severity: medium
|
||||||
description: Searches for reflected XSS in the server response via GET-requests.
|
description: Searches for reflected XSS in the server response via GET-requests.
|
||||||
tags: xss
|
tags: xss
|
||||||
parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p
|
additional-fields:
|
||||||
|
parameters: q,s,search,id,action,keyword,query,page,keywords,url,view,cat,name,key,p
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
|
@ -5,13 +5,15 @@ info:
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: high
|
severity: high
|
||||||
tags: bullwark,lfi
|
tags: bullwark,lfi
|
||||||
reference: https://www.exploit-db.com/exploits/47773
|
reference:
|
||||||
|
- https://www.exploit-db.com/exploits/47773
|
||||||
|
- http://www.bullwark.net/ # vendor homepage
|
||||||
|
- http://www.bullwark.net/Kategoriler.aspx?KategoriID=24 # software link
|
||||||
|
|
||||||
# Vendor Homepage: http://www.bullwark.net/
|
additional-fields:
|
||||||
# Version : Bullwark Momentum Series Web Server JAWS/1.0
|
version: Bullwark Momentum Series Web Server JAWS/1.0
|
||||||
# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24
|
shodan-dork: https://www.shodan.io/search?query=Bullwark&page=1
|
||||||
# Shodan Dork: https://www.shodan.io/search?query=Bullwark&page=1
|
fofa-dork: https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D
|
||||||
# fofa dork:-https://fofa.so/result?q=Bullwark&qbase64=QnVsbHdhcms%3D
|
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
|
|
@ -4,8 +4,9 @@ info:
|
||||||
name: Ruijie Networks-EWEB Network Management System RCE
|
name: Ruijie Networks-EWEB Network Management System RCE
|
||||||
author: pikpikcu
|
author: pikpikcu
|
||||||
severity: critical
|
severity: critical
|
||||||
reference: https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py
|
reference:
|
||||||
vendor: https://www.ruijienetworks.com
|
- https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py
|
||||||
|
- https://www.ruijienetworks.com # vendor homepage
|
||||||
tags: ruijie,rce
|
tags: ruijie,rce
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
|
|
Loading…
Reference in New Issue