Commit Graph

338 Commits (9a46592f714d5fed6424931de12da048334e8865)

Author SHA1 Message Date
Prince Chaddha 9a46592f71
Update kevinlab-bems-sqli.yaml 2021-07-24 11:59:35 +05:30
Prince Chaddha 87b4c2e98b
Update kevinlab-bems-sqli.yaml 2021-07-24 11:47:05 +05:30
sandeep 47ea40bc55 Update kevinlab-bems-backdoor.yaml 2021-07-24 03:17:53 +05:30
GwanYeong Kim 69db0862ee Create kevinlab-bems-backdoor.yaml
The BEMS solution has an undocumented backdoor account and these sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the solution thru the RMI. Attacker could exploit this vulnerability by logging in using the backdoor account with highest privileges for administration and gain full system control. The backdoor user cannot be seen in the users settings in the admin panel and it also uses an undocumented privilege level (admin_pk=1) which allows full availability of the features that the BEMS is offering remotely.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-22 22:13:00 +09:00
GwanYeong Kim a4ec6a2b11 Create kevinlab-bems-sqli.yaml
The application suffers from an unauthenticated SQL Injection vulnerability. Input passed through 'input_id' POST parameter in '/http/index.php' is not properly sanitised before being returned to the user or used in SQL queries.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-22 21:46:18 +09:00
Prince Chaddha 403a73d1c7
Merge pull request #1085 from pikpikcu/patch-125
Create dedecms-carbuyaction-fileinclude.yaml
2021-07-21 18:27:45 +05:30
Prince Chaddha f5fc07dd72
Merge pull request #1581 from pikpikcu/patch-168
Create hiboss-rce
2021-07-21 18:27:38 +05:30
Prince Chaddha 08541f08c4
Update dedecms-carbuyaction-fileinclude.yaml 2021-07-21 18:26:36 +05:30
Prince Chaddha 00ce088daf
Merge pull request #1334 from projectdiscovery/princechaddha-patch-3
Create sangfor-edr-auth-bypass.yaml
2021-07-21 18:18:08 +05:30
Prince Chaddha 8d953c45ea
Update sangfor-edr-auth-bypass.yaml 2021-07-21 18:14:42 +05:30
Prince Chaddha da1ef3b031
Merge pull request #1568 from pikpikcu/patch-166
Create h3c-imc-rce
2021-07-21 18:11:11 +05:30
GwanYeong Kim 19fa522fec Create mirai-unknown-rce.yaml
The unknown exploit targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 22:44:29 +09:00
sandeep 63ae086b67 Payload + matcher update 2021-07-17 23:02:43 +05:30
Prince Chaddha 33a0ede229
Merge pull request #2009 from gy741/rule-add-v24
Create CVE-2020-26919, CVE-2020-25506, OptiLink ONT1GEW GPON RCE, CVE-2021-31755
2021-07-16 18:04:52 +05:30
Sandeep Singh 9286c79bc1
Rename optiLink-ont1gew-gpon-rce.yaml to optilink-ont1gew-gpon-rce.yaml 2021-07-15 23:15:45 +05:30
sandeep 6bf13454ae Update optiLink-ont1gew-gpon-rce.yaml 2021-07-15 23:15:22 +05:30
sandeep 642f71278d Added Yapi RCE 2021-07-15 22:11:22 +05:30
GwanYeong Kim 1eb999ce02 Create optiLink-ont1gew-gpon-rce.yaml
vulnerabilities in the web-based management interface of OptiLink could allow an authenticated, remote attacker to perform command injection attacks against an affected device.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-15 14:57:34 +09:00
Prince Chaddha 5182b88b54
Merge pull request #1871 from projectdiscovery/huijietong-cloud-fileread
Create huijietong-cloud-fileread.yaml
2021-07-14 19:27:43 +05:30
sandeep c8c49c5046 Update hasura-graphql-ssrf.yaml 2021-07-13 15:58:06 +05:30
sandeep 5fe872788f minor update 2021-07-13 15:57:10 +05:30
Prince Chaddha 4ef8ed8e97
Create hasura-graphql-ssrf.yaml 2021-07-12 20:49:09 +05:30
Prince Chaddha a0d643561f
Update icewarp-webclient-rce.yaml 2021-07-10 09:18:32 +05:30
GwanYeong Kim ef74a354ca Create icewarp-webclient-rce.yaml
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-09 13:52:28 +09:00
Prince Chaddha 808712f772
Update clockwatch-enterprise-rce.yaml 2021-07-08 14:20:18 +05:30
Prince Chaddha 6e6d383b6c
Update clockwatch-enterprise-rce.yaml 2021-07-08 14:00:27 +05:30
Prince Chaddha 7695526e13
Update clockwatch-enterprise-rce.yaml 2021-07-08 14:00:01 +05:30
GwanYeong Kim a722b9fff6 Create clockwatch-enterprise-rce.yaml
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-08 13:18:31 +09:00
sandeep edc0f1a775 Update opensns-rce.yaml 2021-07-07 18:30:48 +05:30
sandeep 9588eadaed minor updates 2021-07-07 18:30:15 +05:30
GwanYeong Kim c3cbee2794 Create opensns-rce.yaml
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-07 18:49:36 +09:00
Sandeep Singh f683e0bade
Merge pull request #1837 from gy741/rule-add-v10
Create huawei-router-auth-bypass.yaml
2021-07-06 23:33:47 +05:30
sandeep cc4244d36c Update huawei-router-auth-bypass.yaml 2021-07-06 23:32:45 +05:30
Prince Chaddha 7c06dfaf70
Create huijietong-cloud-fileread.yaml 2021-07-05 21:59:12 +05:30
Prince Chaddha f55aef6a1b
Merge pull request #1839 from gy741/rule-add-v11
Create netgear-router-auth-bypass.yaml
2021-07-05 21:46:00 +05:30
sandeep 457ce76e34 minor updates 2021-07-04 17:09:45 +05:30
PikPikcU ecdd86167a
Create lotuscms-rce.yaml 2021-07-04 11:11:19 +00:00
sandeep d50459eb9b Added missing matcher 2021-07-04 01:26:41 +05:30
sandeep afcbe4cfe4 minor updates 2021-07-04 01:22:08 +05:30
Dhiyaneshwaran 127673455a
Update coldfusion-debug-xss.yaml 2021-07-02 20:55:33 +05:30
Dhiyaneshwaran e259c3dd2f
Update jfrog-unauth-build-exposed.yaml 2021-07-02 20:53:02 +05:30
Dhiyaneshwaran 2787fc01b6
Update jfrog-unauth-build-exposed.yaml 2021-07-02 08:25:40 +05:30
Dhiyaneshwaran 2fa4382ef5
Create jfrog-unauth-build-exposed.yaml 2021-07-02 08:23:42 +05:30
Dhiyaneshwaran 453b09d3ff
Create coldfusion-debug-xss.yaml 2021-07-01 22:31:01 +05:30
GwanYeong Kim c0ebf56f85 Create netgear-router-auth-bypass.yaml
NETGEAR decided to use to check if a page has “.jpg”, “.gif” or “ess_” substrings, trying to match the entire URL. We can therefore access any page on the device, including those that require authentication, by appending a GET variable with the relevant substring (like “?.gif”).

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-01 14:39:10 +09:00
GwanYeong Kim 4d56d47c69 Create huawei-router-auth-bypass.yaml
The default password of this router is the last 8 characters of the
device's serial number which exist in the back of the device.

Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-01 09:28:30 +09:00
Sandeep Singh 039a41e790
Merge pull request #1774 from pikpikcu/patch-185
Create huawei-hg659-lfi.yaml
2021-06-28 21:46:51 +05:30
sandeep 24a3fab9d3 Added missing condition 2021-06-26 19:35:52 +05:30
Sandeep Singh e84c784fa2
Merge pull request #1689 from nrathaus/master
CVE-2021-28164 and some fixes
2021-06-24 23:58:29 +05:30
PikPikcU cb18f313fd
Create huawei-hg659-lfi.yaml 2021-06-24 15:41:18 +00:00