Skip to content

Commit

Permalink
20240915
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Sep 15, 2024
1 parent 3254da2 commit dd17764
Show file tree
Hide file tree
Showing 45 changed files with 2,688 additions and 289 deletions.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20240914
20240915
23 changes: 23 additions & 0 deletions poc.txt
Original file line number Diff line number Diff line change
Expand Up @@ -4146,6 +4146,7 @@
./poc/auth/nexus-default-password.yml
./poc/auth/nexus-repository-unauthentication.yaml
./poc/auth/nifi-api-unauthorized-access.yaml
./poc/auth/noauth-vnc.yaml
./poc/auth/nodered-default-login.yaml
./poc/auth/noescape-login.yaml
./poc/auth/novnc-login-panel.yaml
Expand Down Expand Up @@ -21024,6 +21025,7 @@
./poc/cve/CVE-2022-34534.yaml
./poc/cve/CVE-2022-34576.yaml
./poc/cve/CVE-2022-3459-f874164b02061f0298b7dc031fdb9eac.yaml
./poc/cve/CVE-2022-3459.yaml
./poc/cve/CVE-2022-34590.yaml
./poc/cve/CVE-2022-3462-ccd003276e3aa019c522c97354bbeff8.yaml
./poc/cve/CVE-2022-3462.yaml
Expand Down Expand Up @@ -27402,6 +27404,7 @@
./poc/cve/CVE-2023-3409.yaml
./poc/cve/CVE-2023-34096.yaml
./poc/cve/CVE-2023-3410-dda648f2ccaffe250c2835aba9f08374.yaml
./poc/cve/CVE-2023-3410.yaml
./poc/cve/CVE-2023-3411-4bb68b0a1ff203797dd994de340b8afb.yaml
./poc/cve/CVE-2023-3411.yaml
./poc/cve/CVE-2023-3412-3d1ceef933d1264cbbd03dc26c5b83ef.yaml
Expand Down Expand Up @@ -37969,6 +37972,7 @@
./poc/cve/CVE-2024-3474.yaml
./poc/cve/CVE-2024-3475-1233901f48139788794a7252044053ed.yaml
./poc/cve/CVE-2024-3475.yaml
./poc/cve/CVE-2024-34750.yaml
./poc/cve/CVE-2024-34751-8fefb0096cfe37c29f9bcc18ed431dbb.yaml
./poc/cve/CVE-2024-34751.yaml
./poc/cve/CVE-2024-34752-a2a693489a5ca358f1243ce5d57683db.yaml
Expand Down Expand Up @@ -39953,6 +39957,7 @@
./poc/cve/CVE-2024-4057.yaml
./poc/cve/CVE-2024-4061-7d27faa8767de65d446af82e8cb546ee.yaml
./poc/cve/CVE-2024-4061.yaml
./poc/cve/CVE-2024-40725.yaml
./poc/cve/CVE-2024-4077-810356fac1d68873d9e790939148b3f0.yaml
./poc/cve/CVE-2024-4077.yaml
./poc/cve/CVE-2024-4082-50825b3df742f81debb8f24874dd3aa4.yaml
Expand Down Expand Up @@ -40107,6 +40112,7 @@
./poc/cve/CVE-2024-4290.yaml
./poc/cve/CVE-2024-4295-f887ea45b60e88fcf428c70a1901be12.yaml
./poc/cve/CVE-2024-4295.yaml
./poc/cve/CVE-2024-43044.yaml
./poc/cve/CVE-2024-4305-637eadcd24b75860f6993f7f01fc3e2a.yaml
./poc/cve/CVE-2024-4305.yaml
./poc/cve/CVE-2024-43116-41d711f6515b000671ba62e9e183e8b2.yaml
Expand Down Expand Up @@ -42138,6 +42144,7 @@
./poc/cve/CVE-2024-6405.yaml
./poc/cve/CVE-2024-6408-313f9e2ba0a4ee6e8c1c902f6f31e4dd.yaml
./poc/cve/CVE-2024-6408.yaml
./poc/cve/CVE-2024-6409.yaml
./poc/cve/CVE-2024-6410-e0557d736e6d7ba9354551c87bc46975.yaml
./poc/cve/CVE-2024-6410.yaml
./poc/cve/CVE-2024-6411-78a7b3d7c96c66a5618e0f92b6cf3978.yaml
Expand Down Expand Up @@ -42178,6 +42185,7 @@
./poc/cve/CVE-2024-6481-8bb84297d1313840ad504743c863bb15.yaml
./poc/cve/CVE-2024-6481.yaml
./poc/cve/CVE-2024-6482-577fd97d26b95e756263126ef60c6a37.yaml
./poc/cve/CVE-2024-6482.yaml
./poc/cve/CVE-2024-6487-af8f4fe7694bfc08570956a253ee5369.yaml
./poc/cve/CVE-2024-6487.yaml
./poc/cve/CVE-2024-6489-bc7ee27fc8cd45d366588f7c757a9c55.yaml
Expand Down Expand Up @@ -42823,6 +42831,7 @@
./poc/cve/CVE-2024-8242-cdbbac228ad219af93b654766e13b83b.yaml
./poc/cve/CVE-2024-8242.yaml
./poc/cve/CVE-2024-8246-902383001b6a5bc20eed5f0cb307c0ed.yaml
./poc/cve/CVE-2024-8246.yaml
./poc/cve/CVE-2024-8247-7ddc0c06e971c1cf25a0f3f37508e6b0.yaml
./poc/cve/CVE-2024-8247.yaml
./poc/cve/CVE-2024-8252-2918e2ad48b79ca4c8bb4e4cd2023c96.yaml
Expand All @@ -42834,6 +42843,7 @@
./poc/cve/CVE-2024-8269-eb32a5853ffb2001bfd3e5a673037190.yaml
./poc/cve/CVE-2024-8269.yaml
./poc/cve/CVE-2024-8271-13221a05cbda5251ef0c446e5653da53.yaml
./poc/cve/CVE-2024-8271.yaml
./poc/cve/CVE-2024-8274-bda8d98f83bd3baa9ee6eb35650a9ef1.yaml
./poc/cve/CVE-2024-8274.yaml
./poc/cve/CVE-2024-8276-abcb50055a0fdc77a95290d651b9dbcc.yaml
Expand Down Expand Up @@ -42866,6 +42876,7 @@
./poc/cve/CVE-2024-8478-2c5877806cf2b984d8159c04c86877bf.yaml
./poc/cve/CVE-2024-8478.yaml
./poc/cve/CVE-2024-8479-1ca994835b1b496ace2cec8e13acae4d.yaml
./poc/cve/CVE-2024-8479.yaml
./poc/cve/CVE-2024-8480-f1d8d42bfc1633b849f4ef6346a133c9.yaml
./poc/cve/CVE-2024-8480.yaml
./poc/cve/CVE-2024-8522-29b9e24c70ba3cd60461931eec1fd527.yaml
Expand All @@ -42887,9 +42898,11 @@
./poc/cve/CVE-2024-8665-d05eed41be11b2c07c036fabd71a8c1b.yaml
./poc/cve/CVE-2024-8665.yaml
./poc/cve/CVE-2024-8669-48017cad1d0f5431615877a08826da9a.yaml
./poc/cve/CVE-2024-8669.yaml
./poc/cve/CVE-2024-8714-03b5605b5eeba70097fb089d33700336.yaml
./poc/cve/CVE-2024-8714.yaml
./poc/cve/CVE-2024-8724-9019a55c2cb51d14586e3502543ceb09.yaml
./poc/cve/CVE-2024-8724.yaml
./poc/cve/CVE-2024-8730-efc3370bbeb807667af618ae74e58df1.yaml
./poc/cve/CVE-2024-8730.yaml
./poc/cve/CVE-2024-8731-b5fad8172a537c5460328250b82e6ef6.yaml
Expand All @@ -42905,6 +42918,7 @@
./poc/cve/CVE-2024-8747-f757d510ac120bf89329e22a6153766c.yaml
./poc/cve/CVE-2024-8747.yaml
./poc/cve/CVE-2024-8797-c59dee142d9f249969c44faf56beb682.yaml
./poc/cve/CVE-2024-8797.yaml
./poc/cve/CVE_2023_49442.yaml
./poc/cve/CVE_2023_51467.yaml
./poc/cve/CVE_2024_0195.yaml
Expand Down Expand Up @@ -52490,6 +52504,7 @@
./poc/detect/hikvision-detection-7954.yaml
./poc/detect/hikvision-detection-7955.yaml
./poc/detect/hikvision-detection.yaml
./poc/detect/hipcam-detect.yaml
./poc/detect/home-assistant-detect.yaml
./poc/detect/hp-blade-admin-detect-8003.yaml
./poc/detect/hp-blade-admin-detect-8004.yaml
Expand Down Expand Up @@ -53036,6 +53051,7 @@
./poc/detect/rhymix-cms-detect-9879.yaml
./poc/detect/rhymix-cms-detect.yaml
./poc/detect/riak-detect.yaml
./poc/detect/rockwell-plc-detect.yaml
./poc/detect/room-alert-detect.yaml
./poc/detect/rosariosis-detect.yaml
./poc/detect/routeros-version-detect.yaml
Expand Down Expand Up @@ -54601,6 +54617,7 @@
./poc/exposed/flink-exposure-7511.yaml
./poc/exposed/flink-exposure.yaml
./poc/exposed/forgejo-repo-exposure.yaml
./poc/exposed/frontpage-exposure.yaml
./poc/exposed/ftp-credentials-exposure-7567.yaml
./poc/exposed/ftp-credentials-exposure-7568.yaml
./poc/exposed/ftp-credentials-exposure.yaml
Expand Down Expand Up @@ -75102,6 +75119,7 @@
./poc/other/garmin-connect.yaml
./poc/other/gate-one.yaml
./poc/other/gateone-workflow.yaml
./poc/other/gavazzi-automation.yaml
./poc/other/gb-gallery-slideshow-00a9466671a0e69d0aedfaee9145654e.yaml
./poc/other/gb-gallery-slideshow.yaml
./poc/other/gc-testimonials-51b93fe3d2a5697bc6c0c88b51bb094c.yaml
Expand Down Expand Up @@ -77306,6 +77324,7 @@
./poc/other/institutions-directory-05c9e1ca16738cd78fe38ca1f2073848.yaml
./poc/other/institutions-directory.yaml
./poc/other/instructables.yaml
./poc/other/intank-iiot.yaml
./poc/other/integracao-rd-station-198030404c9ce55b50e42f8d3447992c.yaml
./poc/other/integracao-rd-station-f273da08ce04eb7ca8ff220d5e6ae640.yaml
./poc/other/integracao-rd-station.yaml
Expand Down Expand Up @@ -87591,6 +87610,7 @@
./poc/other/sidekiq-dashboard.yaml
./poc/other/sidekiq-workflow.yaml
./poc/other/sidekiq.yaml
./poc/other/siemens-simatic.yaml
./poc/other/sigma_wide.yaml
./poc/other/signal-phish.yaml
./poc/other/signature-verification-management-system.yaml
Expand Down Expand Up @@ -98799,6 +98819,7 @@
./poc/remote_code_execution/woocommerce-multiple-customer-addresses-e58fd6fc55781d41aa60974eac75f757.yaml
./poc/remote_code_execution/woocommerce-multiple-customer-addresses.yaml
./poc/remote_code_execution/woocommerce-multiple-free-gift-939e3a08a9f8b49368755587a40c875e.yaml
./poc/remote_code_execution/woocommerce-multiple-free-gift.yaml
./poc/remote_code_execution/woocommerce-ninjaforms-product-addons-fe7479a6b6025e86397ca09e26459aa3.yaml
./poc/remote_code_execution/woocommerce-ninjaforms-product-addons.yaml
./poc/remote_code_execution/woocommerce-one-page-checkout-0fb2ac203a6e2b270723afe1dd3e678a.yaml
Expand Down Expand Up @@ -106012,6 +106033,7 @@
./poc/sql/marmoset-viewer-d601c9bb70361b55fc57dbc9a11ed725.yaml
./poc/sql/mashsharer-99c04b0c6cdb3ef571a7d8d62a6a8e40.yaml
./poc/sql/mass-pagesposts-creator-6477bf18cad6c823db485408d49b337b.yaml
./poc/sql/mass-sqli.yaml
./poc/sql/master-addons-6477bf18cad6c823db485408d49b337b.yaml
./poc/sql/master-addons-daa4129ec4b09b68fe1dbfb68e8ccb96.yaml
./poc/sql/master-blocks-6477bf18cad6c823db485408d49b337b.yaml
Expand Down Expand Up @@ -109204,6 +109226,7 @@
./poc/sql_injection/leaguemanager-sqli.yaml
./poc/sql_injection/loancms-sqli.yaml
./poc/sql_injection/magicflow-sqli.yaml
./poc/sql_injection/mass-sqli.yaml
./poc/sql_injection/material-dashboard-2-by-creative-sql-injection.yaml
./poc/sql_injection/maticsoft-shop-sqli.yaml
./poc/sql_injection/mcms-list-do-sqli.yaml
Expand Down
79 changes: 43 additions & 36 deletions poc/auth/jenkins-weak-password.yaml
100755 → 100644
Original file line number Diff line number Diff line change
@@ -1,45 +1,52 @@
id: jenkins-weak-password
info:
name: Jenkins Default Login
author:
- l0ne1y
tags:
- jenkins
- default-login
description: |-
Jenkins 默认口令登录漏洞
CloudBees Jenkins(Hudson Labs)是美国CloudBees公司的一套基于Java开发的持续集成工具。该产品主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。Audit Trail Plugin是使用在其中的一个审核日志记录插件。其管理后台存在默认账户admin/admin,攻击者可通过默认账户登录后台实施高危操作。
author: Zandros0
severity: high
tags: jenkins,default-login
description: Jenkins default admin login information was discovered.
classification:
cwe-id:
- cwe-522
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
cvss-score: 8.3
remediation: |-
1、建议系统管理人员将已发现的弱口令立即改成强口令,并拉网式排查所有系统管理员、用户、设备的弱口令,清扫未发现的弱口令。
2、弱口令重在管理。企业应制定强口令制度(如:密码需包含大小写字母、数字、特殊字符至少三种格式,长度不少于十位,并且密码键盘排列无序,密码企业、个人信息无关联。
3、弱口令排查方式可以通过汇总企业所有人员账户后根据强口令规则匹配自查、个性化制定字典暴力破解两种方式。
4、推荐强口令在线生成:[https://suijimimashengcheng.51240.com/](https://suijimimashengcheng.51240.com/)
5、推荐口令强度在线检测:[https://howsecureismypassword.net/](https://howsecureismypassword.net/)
cve-id:
cwe-id: CWE-522
requests:
- matchers:
- type: dsl
condition: and
dsl:
- contains(body_3, "/logout")
- contains(body_3, "Dashboard [Jenkins]")
raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /j_spring_security_check HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- raw:
- |
GET /login HTTP/1.1
Host: {{Hostname}}
- |
POST /j_spring_security_check HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Cookie: {{cookie}}
j_username=admin&j_password=admin&from=%2F&Submit=Sign+in
- |
GET / HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
req-condition: true
j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in
- |
GET / HTTP/1.1
Host: {{Hostname}}
Cookie: {{cookie}}
attack: pitchfork
payloads:
username:
- admin
- jenkins
password:
- admin
- password
extractors:
- type: regex
name: cookie
internal: true
part: header
regex:
- 'JSESSIONID\..*=([a-z0-9.]+)'
req-condition: true
matchers:
- type: dsl
condition: and
dsl:
- 'contains(body_3, "/logout")'
- 'contains(body_3, "Dashboard [Jenkins]")'

# Enhanced by mp on 2022/03/10
32 changes: 32 additions & 0 deletions poc/auth/noauth-vnc.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
id: exposed-vnc-no-auth

info:
name: Exposed VNC Server No-Auth
author: Redflare Cyber
severity: high
description: This template checks for VNC servers that do not require authentication, which can allow unauthorized access to the system.
classification:
cwe-id: CWE-306
metadata:
max-request: 1
shodan-query: 'port:5900 product:"VNC"'
tags: network,vnc,exposed,no-auth,tcp

tcp:
- inputs:
- data: "\r\n"
host:
- "{{Hostname}}"
port: 5900,5901,5902

matchers:
- type: word
words:
- "RFB"

extractors:
- type: regex
part: body
regex:
- "Authentication disabled"

59 changes: 59 additions & 0 deletions poc/cve/CVE-2022-3459.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2022-3459

info:
name: >
WooCommerce Multiple Free Gift <= 1.2.3 - Insufficient Server-Side Validation to Arbitrary Gift Adding
author: topscoder
severity: medium
description: >
The WooCommerce Multiple Free Gift plugin for WordPress is vulnerable to gift manipulation in all versions up to, and including, 1.2.3. This is due to plugin not enforcing server-side checks on the products that can be added as a gift. This makes it possible for unauthenticated attackers to add non-gift items to their cart as a gift.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cdb9c321-1a2c-4593-9947-2071a908ee1c?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score: 5.3
cve-id: CVE-2022-3459
metadata:
fofa-query: "wp-content/plugins/woocommerce-multiple-free-gift/"
google-query: inurl:"/wp-content/plugins/woocommerce-multiple-free-gift/"
shodan-query: 'vuln:CVE-2022-3459'
tags: cve,wordpress,wp-plugin,woocommerce-multiple-free-gift,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/woocommerce-multiple-free-gift/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "woocommerce-multiple-free-gift"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.2.3')
Loading

0 comments on commit dd17764

Please sign in to comment.