Skip to content

Commit 7897372

Browse files
committed
update nuclei-templates 2022-07-10 02:54:1657392847
1 parent 9cb82cb commit 7897372

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+393
-73
lines changed

config/nuclei-templates/cnvd/2018/CNVD-2018-13393.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ info:
1010
classification:
1111
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1212
cvss-score: 8.6
13-
cve-id:
1413
cwe-id: CWE-22
1514
tags: metinfo,cnvd,cvnd2018,lfi
1615

config/nuclei-templates/cnvd/2020/CNVD-2020-67113.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,12 @@ info:
44
name: H5S CONSOLE - Unauthorized Access
55
author: ritikchaddha
66
severity: medium
7-
description: Zero Vision Technology (Shanghai) Co., Ltd. H5S CONSOLE is susceptible to an unauthorized access vulnerability.
7+
description: H5S CONSOLE is susceptible to an unauthorized access vulnerability.
88
reference:
99
- https://vul.wangan.com/a/CNVD-2020-67113
1010
classification:
1111
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1212
cvss-score: 5.3
13-
cve-id:
1413
cwe-id: CWE-425
1514
metadata:
1615
verified: true
@@ -49,4 +48,4 @@ requests:
4948
status:
5049
- 200
5150

52-
# Enhanced by mp on 2022/07/05
51+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cnvd/2021/CNVD-2021-10543.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ info:
1010
classification:
1111
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1212
cvss-score: 5.3
13-
cve-id:
1413
cwe-id: CWE-200
1514
tags: config,exposure,cnvd,cnvd2021
1615

config/nuclei-templates/cnvd/2021/CNVD-2021-28277.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: CNVD-2021-28277
22

33
info:
4-
name: Landray-OA - Local File Inclusion
4+
name: Landray-OA - Local File Inclusion
55
author: pikpikcu,daffainfo
66
severity: high
77
description: Landray-OA is susceptible to local file inclusion.
@@ -13,7 +13,6 @@ info:
1313
classification:
1414
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1515
cvss-score: 8.6
16-
cve-id:
1716
cwe-id: CWE-22
1817
tags: landray,lfi,cnvd,cnvd2021
1918

@@ -49,4 +48,4 @@ requests:
4948
status:
5049
- 200
5150

52-
# Enhanced by mp on 2022/07/05
51+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2006/CVE-2006-2842.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,18 @@ info:
44
name: Squirrelmail <=1.4.6 - Local File Inclusion
55
author: dhiyaneshDk
66
severity: high
7-
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
7+
description: SquirrelMail 1.4.6 and earlier versions are susceptible to a PHP local file inclusion vulnerability in functions/plugin.php if register_globals is enabled and magic_quotes_gpc is disabled. This allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.
88
reference:
99
- https://www.exploit-db.com/exploits/27948
1010
- http://squirrelmail.cvs.sourceforge.net/squirrelmail/squirrelmail/functions/global.php?r1=1.27.2.16&r2=1.27.2.17&view=patch&pathrev=SM-1_4-STABLE
1111
- http://www.squirrelmail.org/security/issue/2006-06-01
1212
- http://web.archive.org/web/20160915101900/http://secunia.com/advisories/20406/
1313
- https://nvd.nist.gov/vuln/detail/CVE-2006-2842
1414
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1517
cve-id: CVE-2006-2842
18+
cwe-id: CWE-22
1619
tags: cve,cve2006,lfi,squirrelmail
1720

1821
requests:
@@ -31,4 +34,4 @@ requests:
3134
status:
3235
- 200
3336

34-
# Enhanced by mp on 2022/07/05
37+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2007/CVE-2007-4504.yaml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,20 @@
11
id: CVE-2007-4504
22

33
info:
4-
name: Joomla! Component RSfiles <=1.0.2 - Arbitrary File Retrieval
4+
name: Joomla! RSfiles <=1.0.2 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: An arbitrary file retrieval vulnerability in index.php in the RSfiles component (com_rsfiles) <=1.0.2 for Joomla! allows remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action.
7+
description: Joomla! RSfiles 1.0.2 and earlier is susceptible to local file inclusion in index.php in the RSfiles component (com_rsfiles). This could allow remote attackers to arbitrarily read files via a .. (dot dot) in the path parameter in a files.display action.
88
reference:
99
- https://www.exploit-db.com/exploits/4307
1010
- https://www.cvedetails.com/cve/CVE-2007-4504
1111
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36222
12+
- https://nvd.nist.gov/vuln/detail/CVE-2007-4504
1213
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
15+
cvss-score: 8.6
1316
cve-id: CVE-2007-4504
17+
cwe-id: CWE-22
1418
tags: cve,cve2007,joomla,lfi
1519

1620
requests:
@@ -28,3 +32,5 @@ requests:
2832
- type: status
2933
status:
3034
- 200
35+
36+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-2650.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,17 @@ info:
55
author: pussycat0x
66
severity: high
77
description: |
8-
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled, which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
8+
CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number.
99
reference:
1010
- http://www.cmsimple.com/forum/viewtopic.php?f=2&t=17
1111
- http://web.archive.org/web/20210121182016/https://www.securityfocus.com/bid/29450/
1212
- http://web.archive.org/web/20140729144732/http://secunia.com:80/advisories/30463
1313
- https://nvd.nist.gov/vuln/detail/CVE-2008-2650
1414
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1517
cve-id: CVE-2008-2650
18+
cwe-id: CWE-22
1619
tags: cve,cve2008,lfi,cmsimple
1720

1821
requests:
@@ -34,4 +37,4 @@ requests:
3437
status:
3538
- 200
3639

37-
# Enhanced by mp on 2022/07/05
40+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-4668.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,4 @@ requests:
3131
status:
3232
- 200
3333

34-
# Enhanced by mp on 2022/07/05
34+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-4764.yaml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
id: CVE-2008-4764
22

33
info:
4-
name: Joomla! Component com_extplorer 2.0.0 RC2 - Directory Traversal
4+
name: Joomla! <=2.0.0 RC2 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: Directory traversal vulnerability in the eXtplorer module (com_extplorer) 2.0.0 RC2 and earlier in Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
7+
description: Joomla! 2.0.0 RC2 and earlier are susceptible to local file inclusion in the eXtplorer module (com_extplorer) that allows remote attackers to read arbitrary files via a .. (dot dot) in the dir parameter in a show_error action.
88
reference:
99
- https://www.exploit-db.com/exploits/5435
1010
- https://www.cvedetails.com/cve/CVE-2008-4764
1111
- http://web.archive.org/web/20210121181347/https://www.securityfocus.com/bid/28764/
1212
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41873
13+
- https://nvd.nist.gov/vuln/detail/CVE-2008-4764
1314
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1417
cve-id: CVE-2008-4764
18+
cwe-id: CWE-22
1519
tags: cve,cve2008,joomla,lfi
1620

1721
requests:
@@ -29,3 +33,5 @@ requests:
2933
- type: status
3034
status:
3135
- 200
36+
37+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-6080.yaml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
id: CVE-2008-6080
22

33
info:
4-
name: Joomla! Component ionFiles 4.4.2 - File Disclosure
4+
name: Joomla! ionFiles 4.4.2 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: Directory traversal vulnerability in download.php in the ionFiles (com_ionfiles) 4.4.2 component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
7+
description: Joomla! ionFiles 4.4.2 is susceptible to local file inclusion in download.php in the ionFiles (com_ionfiles) that allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
88
reference:
99
- https://www.exploit-db.com/exploits/6809
1010
- https://www.cvedetails.com/cve/CVE-2008-6080
1111
- http://web.archive.org/web/20140804231654/http://secunia.com/advisories/32377/
1212
- http://web.archive.org/web/20210121184101/https://www.securityfocus.com/bid/31877/
13+
- https://nvd.nist.gov/vuln/detail/CVE-2008-6080
1314
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1417
cve-id: CVE-2008-6080
18+
cwe-id: CWE-22
1519
tags: cve,cve2008,joomla,lfi
1620

1721
requests:
@@ -29,3 +33,5 @@ requests:
2933
- type: status
3034
status:
3135
- 200
36+
37+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-6222.yaml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
id: CVE-2008-6222
22

33
info:
4-
name: Joomla! Component ProDesk 1.0/1.2 - Local File Inclusion
4+
name: Joomla! ProDesk 1.0/1.2 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: Directory traversal vulnerability in the Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
7+
description: Joomla! Pro Desk Support Center (com_pro_desk) component 1.0 and 1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the include_file parameter to index.php.
88
reference:
99
- https://www.exploit-db.com/exploits/6980
1010
- https://www.cvedetails.com/cve/CVE-2008-6222
1111
- http://web.archive.org/web/20111223225601/http://secunia.com/advisories/32523/
1212
- http://web.archive.org/web/20210121184244/https://www.securityfocus.com/bid/32113/
13+
- https://nvd.nist.gov/vuln/detail/CVE-2008-6222
1314
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1417
cve-id: CVE-2008-6222
18+
cwe-id: CWE-22
1519
tags: cve,cve2008,joomla,lfi
1620

1721
requests:
@@ -29,3 +33,5 @@ requests:
2933
- type: status
3034
status:
3135
- 200
36+
37+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2008/CVE-2008-6668.yaml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,20 @@
11
id: CVE-2008-6668
22

33
info:
4-
name: nweb2fax <=0.2.7- Local File Inclusion
4+
name: nweb2fax <=0.2.7 - Local File Inclusion
55
author: geeknik
66
severity: high
7-
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php (aka local file inclusion).
7+
description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.
88
reference:
99
- https://www.exploit-db.com/exploits/5856
1010
- http://web.archive.org/web/20210130035550/https://www.securityfocus.com/bid/29804
1111
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43173
1212
- https://nvd.nist.gov/vuln/detail/CVE-2008-6668
1313
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
15+
cvss-score: 8.6
1416
cve-id: CVE-2008-6668
17+
cwe-id: CWE-22
1518
tags: cve,cve2008,nweb2fax,lfi,traversal
1619

1720
requests:
@@ -31,4 +34,5 @@ requests:
3134
- type: status
3235
status:
3336
- 200
34-
# Enhanced by mp on 2022/07/05
37+
38+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2009/CVE-2009-0932.yaml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,20 @@
11
id: CVE-2009-0932
22

33
info:
4-
name: Horde - Horde_Image::factory driver Argument LFI
4+
name: Horde/Horde Groupware - Local File Inclusion
55
author: pikpikcu
66
severity: high
7-
description: Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
7+
description: Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 are susceptible to local file inclusion in framework/Image/Image.php because it allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
88
reference:
99
- https://www.exploit-db.com/exploits/16154
10-
- https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2
1110
- http://cvs.horde.org/co.php/groupware/docs/groupware/CHANGES?r=1.28.2.5
1211
- http://web.archive.org/web/20161228102217/http://secunia.com/advisories/33695
12+
- https://nvd.nist.gov/vuln/detail/CVE-2009-0932?cpeVersion=2.2
1313
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
15+
cvss-score: 8.6
1416
cve-id: CVE-2009-0932
17+
cwe-id: CWE-22
1518
tags: cve,cve2009,horde,lfi,traversal
1619

1720
requests:
@@ -29,3 +32,5 @@ requests:
2932
- type: status
3033
status:
3134
- 200
35+
36+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2009/CVE-2009-1151.yaml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
id: CVE-2009-1151
22

33
info:
4-
name: PhpMyAdmin Scripts/setup.php Deserialization Vulnerability
4+
name: PhpMyAdmin Scripts - Remote Code Execution
55
author: princechaddha
6-
severity: high
7-
description: Setup script used to create PhpMyAdmin configurations can be fooled by using a crafted POST request to include arbitrary PHP code in the generated configuration file. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
6+
severity: critical
7+
description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
88
reference:
99
- https://www.phpmyadmin.net/security/PMASA-2009-3/
1010
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
1111
- http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301
1212
- http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php
13+
- https://nvd.nist.gov/vuln/detail/CVE-2009-1151
1314
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
16+
cvss-score: 10
1417
cve-id: CVE-2009-1151
18+
cwe-id: CWE-77
1519
tags: cve,cve2009,phpmyadmin,rce,deserialization,cisa
1620

1721
requests:
@@ -34,3 +38,5 @@ requests:
3438
- type: regex
3539
regex:
3640
- "root:.*:0:0:"
41+
42+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2009/CVE-2009-1496.yaml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,20 @@
11
id: CVE-2009-1496
22

33
info:
4-
name: Joomla! Component Cmimarketplace - 'viewit' Directory Traversal
4+
name: Joomla! Cmimarketplace 0.1 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: Directory traversal vulnerability in the Cmi Marketplace (com_cmimarketplace) component 0.1 for Joomla! allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
7+
description: |
8+
Joomla! Cmimarketplace 0.1 is susceptible to local file inclusion because com_cmimarketplace allows remote attackers to list arbitrary directories via a .. (dot dot) in the viewit parameter to index.php.
89
reference:
910
- https://www.exploit-db.com/exploits/8367
10-
- https://www.cvedetails.com/cve/CVE-2009-1496
1111
- http://web.archive.org/web/20210121190149/https://www.securityfocus.com/bid/34431/
12+
- https://nvd.nist.gov/vuln/detail/CVE-2009-1496
1213
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
15+
cvss-score: 8.6
1316
cve-id: CVE-2009-1496
17+
cwe-id: CWE-22
1418
tags: cve,cve2009,joomla,lfi
1519

1620
requests:
@@ -28,3 +32,5 @@ requests:
2832
- type: status
2933
status:
3034
- 200
35+
36+
# Enhanced by mp on 2022/07/06

config/nuclei-templates/cves/2009/CVE-2009-1558.yaml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
id: CVE-2009-1558
22

33
info:
4-
name: Linksys WVC54GCA 1.00R22/1.00R24 (Wireless-G) - Directory Traversal
4+
name: Cisco Linksys WVC54GCA 1.00R22/1.00R24 - Local File Inclusion
55
author: daffainfo
66
severity: high
7-
description: Directory traversal vulnerability in adm/file.cgi on the Cisco Linksys WVC54GCA wireless video camera with firmware 1.00R22 and 1.00R24 allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
7+
description: Cisco Linksys WVC54GCA 1.00R22/1.00R24 is susceptible to local file inclusion in adm/file.cgi because it allows remote attackers to read arbitrary files via a %2e. (encoded dot dot) or an absolute pathname in the next_file parameter.
88
reference:
99
- https://www.exploit-db.com/exploits/32954
1010
- https://web.archive.org/web/20210119151410/http://www.securityfocus.com/bid/34713
1111
- http://www.vupen.com/english/advisories/2009/1173
1212
- http://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/
13+
- https://nvd.nist.gov/vuln/detail/CVE-2009-1558
1314
classification:
15+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
16+
cvss-score: 8.6
1417
cve-id: CVE-2009-1558
18+
cwe-id: CWE-22
1519
tags: cve,cve2009,iot,lfi,linksys,camera,cisco,firmware,traversal
1620

1721
requests:
@@ -28,3 +32,5 @@ requests:
2832
- type: status
2933
status:
3034
- 200
35+
36+
# Enhanced by mp on 2022/07/06

0 commit comments

Comments
 (0)