Skip to content

Commit

Permalink
20240901
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Sep 1, 2024
1 parent c22ff79 commit 52b8e5a
Show file tree
Hide file tree
Showing 35 changed files with 1,223 additions and 412 deletions.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20240831
20240901
15 changes: 15 additions & 0 deletions poc.txt
Original file line number Diff line number Diff line change
Expand Up @@ -2600,6 +2600,7 @@
./poc/auth/dbeaver-credentials-6781.yaml
./poc/auth/dbeaver-credentials-6782.yaml
./poc/auth/dbeaver-credentials.yaml
./poc/auth/default-cred-hertzbeat.yaml
./poc/auth/dell-emc-ecom-default-credentials-6917.yaml
./poc/auth/dell-emc-ecom-default-credentials.yaml
./poc/auth/dell-idrac-default-login-6942.yaml
Expand Down Expand Up @@ -21643,6 +21644,7 @@
./poc/cve/CVE-2022-4099-efabe65e0636127b900f654341e2d21b.yaml
./poc/cve/CVE-2022-4099.yaml
./poc/cve/CVE-2022-4100-6846e3140a5dc10367fd9a3bbcde3cfd.yaml
./poc/cve/CVE-2022-4100.yaml
./poc/cve/CVE-2022-4101-ff9c428babf09501938ec8b47a7ff0b5.yaml
./poc/cve/CVE-2022-4101.yaml
./poc/cve/CVE-2022-4102-211a125e03141593ca6a2a03eab40ec0.yaml
Expand Down Expand Up @@ -22365,6 +22367,7 @@
./poc/cve/CVE-2022-45359-b36586431dff2aad1fae7b081e9eb505.yaml
./poc/cve/CVE-2022-45359.yaml
./poc/cve/CVE-2022-4536-cbca2c22fe44b388466f971246767370.yaml
./poc/cve/CVE-2022-4536.yaml
./poc/cve/CVE-2022-45360-207ef17540c22dd0793408d606b91bda.yaml
./poc/cve/CVE-2022-45360.yaml
./poc/cve/CVE-2022-45361-aa79324e8a1a2b2db7d009a7aa76d972.yaml
Expand Down Expand Up @@ -22404,6 +22407,7 @@
./poc/cve/CVE-2022-45377-f99be6f5db095fa34ac8836d9c3bf756.yaml
./poc/cve/CVE-2022-45377.yaml
./poc/cve/CVE-2022-4539-7a30287ecd3463157871780d6cb74779.yaml
./poc/cve/CVE-2022-4539.yaml
./poc/cve/CVE-2022-4542-f62d4c5bcf581eb4208970f7bf92c622.yaml
./poc/cve/CVE-2022-4542.yaml
./poc/cve/CVE-2022-4544-4a43b5c1e9b5ac07f83a1ad6288e2487.yaml
Expand Down Expand Up @@ -39501,6 +39505,7 @@
./poc/cve/CVE-2024-3885-9e0a7124350833ada45c8c2089abea17.yaml
./poc/cve/CVE-2024-3885.yaml
./poc/cve/CVE-2024-3886-5b264146b1ead99350dd9d50b9b165a5.yaml
./poc/cve/CVE-2024-3886.yaml
./poc/cve/CVE-2024-3887-c69a35937d64f9aabf71399960d846ed.yaml
./poc/cve/CVE-2024-3887.yaml
./poc/cve/CVE-2024-3888-73a7dff9e7fc032d9c7b3504d9e32105.yaml
Expand Down Expand Up @@ -40923,6 +40928,7 @@
./poc/cve/CVE-2024-5039.yaml
./poc/cve/CVE-2024-5041-683fbe7656aac22ccbf1456af0532a73.yaml
./poc/cve/CVE-2024-5041.yaml
./poc/cve/CVE-2024-5053-efd2b0e65d76d17f35c9856f865d744c.yaml
./poc/cve/CVE-2024-5057-b5cd1f63e71feb762d09590f74da1942.yaml
./poc/cve/CVE-2024-5057.yaml
./poc/cve/CVE-2024-5058-63a03ea4af4d1f6d04449e3cd1d991f1.yaml
Expand Down Expand Up @@ -41022,6 +41028,7 @@
./poc/cve/CVE-2024-5207-dfe92838983c441ca6954031b5866f4e.yaml
./poc/cve/CVE-2024-5207.yaml
./poc/cve/CVE-2024-5212-26e8ea237e5eb184a7a3f6926818b07b.yaml
./poc/cve/CVE-2024-5212.yaml
./poc/cve/CVE-2024-5215-0170d5acc9b537b31bb3fad32634325d.yaml
./poc/cve/CVE-2024-5215.yaml
./poc/cve/CVE-2024-5217.yaml
Expand Down Expand Up @@ -42166,6 +42173,7 @@
./poc/cve/CVE-2024-7422-687a511b4014fc6e48564ef68ecc160f.yaml
./poc/cve/CVE-2024-7422.yaml
./poc/cve/CVE-2024-7435-56bbd99bfe68d581fd709483401a1c1a.yaml
./poc/cve/CVE-2024-7435.yaml
./poc/cve/CVE-2024-7447-616934177af234fd0293527159d2650e.yaml
./poc/cve/CVE-2024-7447.yaml
./poc/cve/CVE-2024-7484-5be14b55ae30eebe36f1e5fcad1d160a.yaml
Expand Down Expand Up @@ -42242,6 +42250,7 @@
./poc/cve/CVE-2024-7703-7d232ae776193850ef9d74eec7d98698.yaml
./poc/cve/CVE-2024-7703.yaml
./poc/cve/CVE-2024-7717-8b2d72f894c49fa210faf06966bb467e.yaml
./poc/cve/CVE-2024-7717.yaml
./poc/cve/CVE-2024-7775-cb89a9bf3c0d813debb09dc21c3f085f.yaml
./poc/cve/CVE-2024-7775.yaml
./poc/cve/CVE-2024-7777-e2bdcc8b58b83d53647a50d88143707d.yaml
Expand Down Expand Up @@ -42315,6 +42324,7 @@
./poc/cve/CVE-2024-8091-2a76422fe65a9439ffb66d6cccbb9f37.yaml
./poc/cve/CVE-2024-8091.yaml
./poc/cve/CVE-2024-8108-388981d89511f13ba76287252ce2c890.yaml
./poc/cve/CVE-2024-8108.yaml
./poc/cve/CVE-2024-8120-3613ebb9d30f84ec400bcf99e23d31d1.yaml
./poc/cve/CVE-2024-8120.yaml
./poc/cve/CVE-2024-8195-55ed6b4889c7dbecb6bd9deee053ca6e.yaml
Expand All @@ -42330,6 +42340,7 @@
./poc/cve/CVE-2024-8274-bda8d98f83bd3baa9ee6eb35650a9ef1.yaml
./poc/cve/CVE-2024-8274.yaml
./poc/cve/CVE-2024-8276-abcb50055a0fdc77a95290d651b9dbcc.yaml
./poc/cve/CVE-2024-8276.yaml
./poc/cve/CVE-2024-8319-f52695adcae621062e419e0168d0ec9c.yaml
./poc/cve/CVE-2024-8319.yaml
./poc/cve/CVE_2023_49442.yaml
Expand Down Expand Up @@ -50308,6 +50319,7 @@
./poc/default/default-config-6835.yaml
./poc/default/default-config-6836.yaml
./poc/default/default-config.yaml
./poc/default/default-cred-hertzbeat.yaml
./poc/default/default-detect-generic-6837.yaml
./poc/default/default-detect-generic-6838.yaml
./poc/default/default-detect-generic-6839.yaml
Expand Down Expand Up @@ -64212,6 +64224,7 @@
./poc/other/attire-018e03e3d84deb0b9ea4b368a9e735bb.yaml
./poc/other/attire-blocks-4d0bda665c71d62ec3979730095585b3.yaml
./poc/other/attire-blocks.yaml
./poc/other/attire.yaml
./poc/other/attorney-75ae42f95c5029a5c34276ce81634c4d.yaml
./poc/other/attorney-9c2d3a40daf25f855f3ce9f2c18eba21.yaml
./poc/other/attorney.yaml
Expand Down Expand Up @@ -73143,6 +73156,7 @@
./poc/other/fluent-security-2950b8c12fea2a10540f20704f5aa9d1.yaml
./poc/other/fluent-security.yaml
./poc/other/fluent-support.yaml
./poc/other/fluentform-026589d017c577988978620b6f7c244f.yaml
./poc/other/fluentform-1a2efa41a2d05e264321477edc4bb700.yaml
./poc/other/fluentform-359dafd9ea2acf47f5a3f1c1b3277d92.yaml
./poc/other/fluentform-42675b86d66431173f7276d369b78de4.yaml
Expand Down Expand Up @@ -114674,6 +114688,7 @@
./poc/wordpress/wp-events-939c8e41990e721256330f6828258871.yaml
./poc/wordpress/wp-events-d41d8cd98f00b204e9800998ecf8427e.yaml
./poc/wordpress/wp-events-manager-29722e1d187e63b6b325ae129c9c70d3.yaml
./poc/wordpress/wp-events-manager.yaml
./poc/wordpress/wp-events-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml
./poc/wordpress/wp-events-plugin.yaml
./poc/wordpress/wp-events.yaml
Expand Down
33 changes: 33 additions & 0 deletions poc/auth/default-cred-hertzbeat.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
id: apache-hertzbeat-default-login

info:
name: Apache HertzBeat Default Credentials
author: securitytaters
severity: high
description: Apache HertzBeat enables default admin credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://github.com/apache/hertzbeat?tab=readme-ov-file#1install-quickly-via-docker
tags: hertzbeat,default-login

variables:
username: admin
password: hertzbeat

http:
- raw:
- |-
POST /api/account/auth/form HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"type":0,"identifier":"{{username}}","credential":"{{password}}"}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"token":"eyJ'
- type: status
status:
- 200
59 changes: 59 additions & 0 deletions poc/cve/CVE-2022-4100.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2022-4100

info:
name: >
WP Cerber Security <= 9.4 - IP Protection Bypass
author: topscoder
severity: medium
description: >
The WP Cerber Security plugin for WordPress is vulnerable to IP Protection bypass in versions up to, and including 9.4 due to the plugin improperly checking for a visitor's IP address. This makes it possible for an attacker whose IP address has been blocked to bypass this control by setting the X-Forwarded-For: HTTP header to an IP Address that hasn't been blocked.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/03ccd474-42f4-4cbb-823e-93fe4db1bf80?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2022-4100
metadata:
fofa-query: "wp-content/plugins/wp-cerber/"
google-query: inurl:"/wp-content/plugins/wp-cerber/"
shodan-query: 'vuln:CVE-2022-4100'
tags: cve,wordpress,wp-plugin,wp-cerber,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/wp-cerber/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "wp-cerber"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 9.4')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2022-4536.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2022-4536

info:
name: >
IP Vault – WP Firewall <= 1.1 - IP Address Spoofing to Protection Mechanism Bypass
author: topscoder
severity: medium
description: >
The IP Vault – WP Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/66e89753-f83e-4e60-b165-6d3d101d6c59?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2022-4536
metadata:
fofa-query: "wp-content/plugins/ip-vault-wp-firewall/"
google-query: inurl:"/wp-content/plugins/ip-vault-wp-firewall/"
shodan-query: 'vuln:CVE-2022-4536'
tags: cve,wordpress,wp-plugin,ip-vault-wp-firewall,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/ip-vault-wp-firewall/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "ip-vault-wp-firewall"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.1')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2022-4539.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2022-4539

info:
name: >
Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass
author: topscoder
severity: medium
description: >
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0e99531c-8742-4f91-8525-65bb3cb06644?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2022-4539
metadata:
fofa-query: "wp-content/plugins/web-application-firewall/"
google-query: inurl:"/wp-content/plugins/web-application-firewall/"
shodan-query: 'vuln:CVE-2022-4539'
tags: cve,wordpress,wp-plugin,web-application-firewall,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/web-application-firewall/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "web-application-firewall"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.1.2')
Loading

0 comments on commit 52b8e5a

Please sign in to comment.