-
Notifications
You must be signed in to change notification settings - Fork 238
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
942d4ab
commit eb5f600
Showing
144 changed files
with
7,605 additions
and
424 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
20240823 | ||
20240824 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,33 +1,33 @@ | ||
id: time-based-sqli | ||
info: | ||
name: Time-Based Blind SQL Injection | ||
author: Coffinxp/lostsec | ||
severity: Critical | ||
description: Detects time-based blind SQL injection vulnerability | ||
http: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}" | ||
payloads: | ||
injection: | ||
- "(SELECT(0)FROM(SELECT(SLEEP(7)))a)" | ||
- "'%2b(select*from(select(sleep(7)))a)%2b'" | ||
- "'XOR(SELECT(0)FROM(SELECT(SLEEP(7)))a)XOR'Z" | ||
- "'XOR(if((select now()=sysdate()),sleep(7),0))XOR'Z" | ||
- "X'XOR(if(now()=sysdate(),/**/sleep(7)/**/,0))XOR'X" | ||
- "' AND (SELECT 4800 FROM (SELECT(SLEEP(7)))HoBG)--" | ||
- "X'XOR(if(now()=sysdate(),(sleep((((7))))),0))XOR'X" | ||
- "if(now()=sysdate(),SLEEP(7),0)" | ||
- "'XOR(if(now()=sysdate(),SLEEP(7),0))XOR'Z" | ||
- "'XOR(SELECT CASE WHEN(1234=1234) THEN SLEEP(7) ELSE 0 END)XOR'Z" | ||
fuzzing: | ||
- part: query | ||
type: replace | ||
mode: single | ||
fuzz: | ||
- "{{injection}}" | ||
stop-at-first-match: true | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- "duration>=7 && duration <=16" | ||
id: time-based-sqli | ||
info: | ||
name: Time-Based Blind SQL Injection | ||
author: KhukuriRimal | ||
severity: Critical | ||
description: Detects time-based blind SQL injection vulnerability | ||
http: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}" | ||
payloads: | ||
injection: | ||
- "(SELECT(0)FROM(SELECT(SLEEP(7)))a)" | ||
- "'XOR(SELECT(0)FROM(SELECT(SLEEP(7)))a)XOR'Z" | ||
- "' AND (SELECT 4800 FROM (SELECT(SLEEP(7)))HoBG)--" | ||
- "if(now()=sysdate(),SLEEP(7),0)" | ||
- "'XOR(if(now()=sysdate(),SLEEP(7),0))XOR'Z" | ||
- "'XOR(SELECT CASE WHEN(1234=1234) THEN SLEEP(7) ELSE 0 END)XOR'Z" | ||
- "XOR(if(now()=sysdate(),sleep(7),0))XOR" | ||
- "1%20AND%201337%3d(SELECT%201337%20FROM%20PG_SLEEP(7))--%201337" | ||
fuzzing: | ||
- part: query | ||
type: replace | ||
mode: single | ||
fuzz: | ||
- "{{injection}}" | ||
stop-at-first-match: true | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- "status_code == 200" | ||
- "duration>=7 && duration <=16" | ||
condition: and |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
id: login-as-users | ||
|
||
info: | ||
name: > | ||
Login As Users <= 1.4.2 - Authentication Bypass | ||
author: topscoder | ||
severity: critical | ||
description: > | ||
reference: | ||
- https://github.com/topscoder/nuclei-wordfence-cve | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/73a0d7a9-374b-430d-a7e5-3c7cdaff5785?source=api-scan | ||
classification: | ||
cvss-metrics: | ||
cvss-score: | ||
cve-id: | ||
metadata: | ||
fofa-query: "wp-content/plugins/login-as-users/" | ||
google-query: inurl:"/wp-content/plugins/login-as-users/" | ||
shodan-query: 'vuln:' | ||
tags: cve,wordpress,wp-plugin,login-as-users,critical | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/login-as-users/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "login-as-users" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 1.4.2') |
18 changes: 9 additions & 9 deletions
18
poc/cross_site_request_forgery/django-debug-exposure-csrf.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,25 +1,25 @@ | ||
id: django-debug-exposure | ||
|
||
info: | ||
name: Django Debug Exposure | ||
author: shelled | ||
severity: medium | ||
author: geeknik | ||
severity: high | ||
reference: | ||
- https://twitter.com/Alra3ees/status/1397660633928286208 | ||
tags: django,exposure | ||
|
||
requests: | ||
- method: POST | ||
path: | ||
- "{{BaseURL}}/admin/login/?next=/admin/" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 403 | ||
|
||
- 500 | ||
- type: word | ||
part: body | ||
words: | ||
- 'seeing the help section of this page because you have <code>DEBUG =' | ||
- 'True</code>' | ||
- "DB_HOST" | ||
- "DB_NAME" | ||
- "DJANGO" | ||
- "ADMIN_PASSWORD" | ||
condition: and |
59 changes: 59 additions & 0 deletions
59
poc/cve/CVE-2023-0926-9e5bd7af9323069d7f5b80fe13c3adbc.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
id: CVE-2023-0926-9e5bd7af9323069d7f5b80fe13c3adbc | ||
|
||
info: | ||
name: > | ||
Custom Permalinks <= 2.6.0 - Authenticated(Editor+) Stored Cross-Site Scripting | ||
author: topscoder | ||
severity: low | ||
description: > | ||
The Custom Permalinks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.6.0 due to insufficient input sanitization and output escaping on tag names. This allows authenticated users, with editor-level permissions or greater to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, even when 'unfiltered_html' has been disabled. | ||
reference: | ||
- https://github.com/topscoder/nuclei-wordfence-cve | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/97f8549a-292d-4a6d-8ec0-550467e5cf0f?source=api-prod | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N | ||
cvss-score: 4.4 | ||
cve-id: CVE-2023-0926 | ||
metadata: | ||
fofa-query: "wp-content/plugins/custom-permalinks/" | ||
google-query: inurl:"/wp-content/plugins/custom-permalinks/" | ||
shodan-query: 'vuln:CVE-2023-0926' | ||
tags: cve,wordpress,wp-plugin,custom-permalinks,low | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/custom-permalinks/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "custom-permalinks" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 2.6.0') |
59 changes: 59 additions & 0 deletions
59
poc/cve/CVE-2023-6987-c1c87c85e30a10fc9ff9a903c209fbf6.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
id: CVE-2023-6987-c1c87c85e30a10fc9ff9a903c209fbf6 | ||
|
||
info: | ||
name: > | ||
String Locator <= 2.6.5 - Reflected Cross-Site Scripting | ||
author: topscoder | ||
severity: medium | ||
description: > | ||
The String locator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sql-column' parameter in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This required WP_DEBUG to be enabled in order to be exploited. | ||
reference: | ||
- https://github.com/topscoder/nuclei-wordfence-cve | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/18e0140e-ac24-48c6-aea0-bb0da203a817?source=api-prod | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 6.1 | ||
cve-id: CVE-2023-6987 | ||
metadata: | ||
fofa-query: "wp-content/plugins/string-locator/" | ||
google-query: inurl:"/wp-content/plugins/string-locator/" | ||
shodan-query: 'vuln:CVE-2023-6987' | ||
tags: cve,wordpress,wp-plugin,string-locator,medium | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/string-locator/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "string-locator" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 2.6.5') |
59 changes: 59 additions & 0 deletions
59
poc/cve/CVE-2024-2254-fff7de08f6116735e0400b319113ddc3.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
id: CVE-2024-2254-fff7de08f6116735e0400b319113ddc3 | ||
|
||
info: | ||
name: > | ||
RT Easy Builder – Advanced addons for Elementor <= 2.2 - Authenticated (Contributor+) Stored Cross-site Scripting | ||
author: topscoder | ||
severity: low | ||
description: > | ||
The RT Easy Builder – Advanced addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ||
reference: | ||
- https://github.com/topscoder/nuclei-wordfence-cve | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a5fb289e-bd38-42ea-86a4-7816b59bd0b2?source=api-prod | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N | ||
cvss-score: 6.4 | ||
cve-id: CVE-2024-2254 | ||
metadata: | ||
fofa-query: "wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" | ||
google-query: inurl:"/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/" | ||
shodan-query: 'vuln:CVE-2024-2254' | ||
tags: cve,wordpress,wp-plugin,rt-easy-builder-advanced-addons-for-elementor,low | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/rt-easy-builder-advanced-addons-for-elementor/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "rt-easy-builder-advanced-addons-for-elementor" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 2.2') |
Oops, something went wrong.