-
Notifications
You must be signed in to change notification settings - Fork 295
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
1be20b9
commit deeb63a
Showing
62 changed files
with
2,564 additions
and
405 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
20240910 | ||
20240911 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,13 +1,14 @@ | ||
id: s3-hunter | ||
info: | ||
name: Hunts for unreferenced AWS S3 Buckets | ||
author: glatisant | ||
severity: medium | ||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}' | ||
matchers: | ||
- type: word | ||
words: | ||
- 'ListBucketResult' | ||
id: s3-hunter | ||
|
||
info: | ||
name: Hunts for unreferenced AWS S3 Buckets | ||
author: glatisant | ||
severity: medium | ||
requests: | ||
- method: GET | ||
path: | ||
- '{{BaseURL}}' | ||
matchers: | ||
- type: word | ||
words: | ||
- 'ListBucketResult' |
59 changes: 59 additions & 0 deletions
59
poc/cve/CVE-2019-25212-cf8915aa91ee39b2dc6d30f9dfffa142.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
id: CVE-2019-25212-cf8915aa91ee39b2dc6d30f9dfffa142 | ||
|
||
info: | ||
name: > | ||
video carousel slider with lightbox <= 1.0.6 - Authenticated (Admin+) SQL Injection | ||
author: topscoder | ||
severity: low | ||
description: > | ||
The video carousel slider with lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||
reference: | ||
- https://github.com/topscoder/nuclei-wordfence-cve | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/85e70be3-3ed7-4ce1-a20c-046fb7c4ec31?source=api-prod | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H | ||
cvss-score: 9.1 | ||
cve-id: CVE-2019-25212 | ||
metadata: | ||
fofa-query: "wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" | ||
google-query: inurl:"/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/" | ||
shodan-query: 'vuln:CVE-2019-25212' | ||
tags: cve,wordpress,wp-plugin,wp-responsive-video-gallery-with-lightbox,low | ||
|
||
http: | ||
- method: GET | ||
redirects: true | ||
max-redirects: 3 | ||
path: | ||
- "{{BaseURL}}/wp-content/plugins/wp-responsive-video-gallery-with-lightbox/readme.txt" | ||
|
||
extractors: | ||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
internal: true | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
- type: regex | ||
name: version | ||
part: body | ||
group: 1 | ||
regex: | ||
- "(?mi)Stable tag: ([0-9.]+)" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: status | ||
status: | ||
- 200 | ||
|
||
- type: word | ||
words: | ||
- "wp-responsive-video-gallery-with-lightbox" | ||
part: body | ||
|
||
- type: dsl | ||
dsl: | ||
- compare_versions(version, '<= 1.0.6') |
Oops, something went wrong.