Skip to content

Commit d694ffe

Browse files
committed
updated templates with multiple payloads / request with flow
1 parent 8b16a85 commit d694ffe

23 files changed

+391
-23
lines changed

http/cves/2014/CVE-2014-2383.yaml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,12 +26,28 @@ info:
2626
cpe: cpe:2.3:a:dompdf:dompdf:*:beta3:*:*:*:*:*:*
2727
metadata:
2828
verified: true
29-
max-request: 11
29+
max-request: 13
3030
vendor: dompdf
3131
product: dompdf
3232
tags: cve2014,cve,lfi,wp-plugin,wpscan,dompdf,wordpress,wp,edb,seclists
3333

34+
flow: http(1) && http(2)
35+
3436
http:
37+
- method: GET
38+
path:
39+
- "{{BaseURL}}/dompdf.php"
40+
- "{{BaseURL}}/wp-content/plugins/"
41+
42+
stop-at-first-match: true
43+
matchers:
44+
- type: word
45+
words:
46+
- "dompdf"
47+
- "WordPress"
48+
condition: or
49+
internal: true
50+
3551
- method: GET
3652
path:
3753
- "{{BaseURL}}{{paths}}"

http/cves/2017/CVE-2017-17562.yaml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,28 @@ info:
2525
epss-percentile: 0.99889
2626
cpe: cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*
2727
metadata:
28-
max-request: 65
28+
max-request: 66
2929
vendor: embedthis
3030
product: goahead
3131
shodan-query: cpe:"cpe:2.3:a:embedthis:goahead"
3232
tags: cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis
3333

34+
flow: http(1) && http(2)
35+
3436
http:
37+
- raw:
38+
- |
39+
GET /cgi-bin/ HTTP/1.1
40+
Host: {{Hostname}}
41+
42+
matchers:
43+
- type: word
44+
words:
45+
- "GoAhead"
46+
- "cgi-bin"
47+
condition: or
48+
internal: true
49+
3550
- raw:
3651
- |
3752
GET /cgi-bin/{{endpoint}}?LD_DEBUG=help HTTP/1.1

http/cves/2021/CVE-2021-26084.yaml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ info:
2424
epss-percentile: 0.99978
2525
cpe: cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
2626
metadata:
27-
max-request: 13
27+
max-request: 14
2828
vendor: atlassian
2929
product: confluence_data_center
3030
shodan-query:
@@ -33,7 +33,23 @@ info:
3333
fofa-query: app="atlassian-confluence"
3434
tags: cve2021,cve,rce,confluence,injection,ognl,kev,atlassian
3535

36+
flow: http(1) && http(2)
37+
3638
http:
39+
- raw:
40+
- |
41+
GET / HTTP/1.1
42+
Host: {{Hostname}}
43+
44+
matchers:
45+
- type: word
46+
words:
47+
- "confluence"
48+
- "atlassian"
49+
condition: or
50+
internal: true
51+
52+
- raw:
3753
- raw:
3854
- |
3955
POST /{{path}} HTTP/1.1

http/cves/2022/CVE-2022-2034.yaml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,28 @@ info:
2424
cpe: cpe:2.3:a:automattic:sensei_lms:*:*:*:*:*:wordpress:*:*
2525
metadata:
2626
verified: true
27-
max-request: 100
27+
max-request: 101
2828
vendor: automattic
2929
product: sensei_lms
3030
framework: wordpress
3131
tags: cve,cve2022,wp,disclosure,wpscan,sensei-lms,fuzz,hackerone,wordpress,wp-plugin,automattic
3232

33+
flow: http(1) && http(2)
34+
3335
http:
36+
- method: GET
37+
path:
38+
- "{{BaseURL}}/wp-json/wp/v2/"
39+
40+
matchers:
41+
- type: word
42+
words:
43+
- "sensei"
44+
- "wp-json"
45+
condition: or
46+
internal: true
47+
48+
- method: GET
3449
- method: GET
3550
path:
3651
- "{{BaseURL}}/wp-json/wp/v2/sensei-messages/{{num}}"

http/cves/2023/CVE-2023-24489.yaml

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ info:
2626
cpe: cpe:2.3:a:citrix:sharefile_storage_zones_controller:*:*:*:*:*:*:*:*
2727
metadata:
2828
verified: true
29-
max-request: 256
29+
max-request: 257
3030
vendor: citrix
3131
product: sharefile_storage_zones_controller
3232
shodan-query:
@@ -38,7 +38,24 @@ info:
3838
variables:
3939
fileName: '{{rand_base(8)}}'
4040

41+
flow: http(1) && http(2)
42+
4143
http:
44+
- raw:
45+
- |
46+
GET / HTTP/1.1
47+
Host: {{Hostname}}
48+
49+
matchers:
50+
- type: word
51+
words:
52+
- "ShareFile Storage Server"
53+
- "ShareFile"
54+
- "documentum"
55+
condition: or
56+
internal: true
57+
58+
- raw:
4259
- raw:
4360
- |
4461
POST /documentum/upload.aspx?parentid={{url_encode(padding)}}&raw=1&unzip=on&uploadid={{fileName}}\..\..\..\cifs&filename={{fileName}}.aspx HTTP/1.1

http/cves/2023/CVE-2023-27524.yaml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ info:
2525
cpe: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
2626
metadata:
2727
verified: true
28-
max-request: 45
28+
max-request: 46
2929
vendor: apache
3030
product: superset
3131
shodan-query:
@@ -37,7 +37,23 @@ info:
3737
- icon_hash=1582430156
3838
tags: packetstorm,cve,cve2023,apache,superset,auth-bypass,kev
3939

40+
flow: http(1) && http(2)
41+
4042
http:
43+
- raw:
44+
- |
45+
GET / HTTP/1.1
46+
Host: {{Hostname}}
47+
48+
matchers:
49+
- type: word
50+
words:
51+
- "Apache Superset"
52+
- "superset"
53+
condition: or
54+
internal: true
55+
56+
- raw:
4157
- raw:
4258
- |
4359
GET /api/v1/database/{{path}} HTTP/1.1

http/cves/2023/CVE-2023-2825.yaml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ info:
2424
cpe: cpe:2.3:a:gitlab:gitlab:16.0.0:*:*:*:community:*:*:*
2525
metadata:
2626
verified: true
27-
max-request: 16
27+
max-request: 17
2828
vendor: gitlab
2929
product: gitlab
3030
shodan-query:
@@ -37,7 +37,23 @@ info:
3737
variables:
3838
data: "{{rand_base(5)}}"
3939

40+
flow: http(1) && http(2)
41+
4042
http:
43+
- raw:
44+
- |
45+
GET / HTTP/1.1
46+
Host: {{Hostname}}
47+
48+
matchers:
49+
- type: word
50+
words:
51+
- "GitLab"
52+
- "gitlab"
53+
condition: or
54+
internal: true
55+
56+
- raw:
4157
- raw:
4258
- |
4359
GET /users/sign_in HTTP/1.1

http/cves/2023/CVE-2023-6379.yaml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ info:
2424
cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*
2525
metadata:
2626
verified: true
27-
max-request: 11
27+
max-request: 12
2828
vendor: alkacon
2929
product: opencms
3030
shodan-query:
@@ -36,7 +36,22 @@ info:
3636
google-query: intitle:"opencms"
3737
tags: cve2023,cve,opencms,xss,alkacon
3838

39+
flow: http(1) && http(2)
40+
3941
http:
42+
- method: GET
43+
path:
44+
- "{{BaseURL}}/"
45+
46+
matchers:
47+
- type: word
48+
words:
49+
- "OpenCms"
50+
- "opencms"
51+
condition: or
52+
internal: true
53+
54+
- method: GET
4055
- method: GET
4156
path:
4257
- "{{BaseURL}}{{paths}}"

http/default-logins/apache/tomcat-default-login.yaml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,28 @@ info:
1111
classification:
1212
cpe: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
1313
metadata:
14-
max-request: 405
14+
max-request: 406
1515
vendor: apache
1616
product: tomcat
1717
shodan-query: title:"Apache Tomcat"
1818
tags: tomcat,apache,default-login
1919

20+
flow: http(1) && http(2)
21+
2022
http:
23+
- raw:
24+
- |
25+
GET /manager/html HTTP/1.1
26+
Host: {{Hostname}}
27+
28+
matchers:
29+
- type: word
30+
words:
31+
- "Apache Tomcat"
32+
- "401 Unauthorized"
33+
condition: or
34+
internal: true
35+
2136
- raw:
2237
- |
2338
GET /manager/html HTTP/1.1

http/default-logins/couchdb/couchdb-default-login.yaml

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,29 @@ info:
1313
cpe: cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*
1414
metadata:
1515
verified: true
16-
max-request: 16
16+
max-request: 17
1717
fofa-query: app="APACHE-CouchDB"
1818
product: couchdb
1919
vendor: apache
2020
tags: default-login,couchdb,misconfig
2121

22+
flow: http(1) && http(2)
23+
2224
http:
25+
- raw:
26+
- |
27+
GET / HTTP/1.1
28+
Host: {{Hostname}}
29+
30+
matchers:
31+
- type: word
32+
words:
33+
- "CouchDB"
34+
- "couchdb"
35+
condition: or
36+
internal: true
37+
38+
- raw:
2339
- raw:
2440
- |
2541
POST /_session HTTP/1.1

0 commit comments

Comments
 (0)