Skip to content

Commit 963841d

Browse files
committed
up PoCs 2022-08-29
1 parent 7ab1d0c commit 963841d

30 files changed

+51
-780
lines changed

brute/dicts/filedic.txt

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1596,6 +1596,7 @@
15961596
/access-log.1
15971597
/access.1
15981598
/access.log
1599+
/accounts.sql
15991600
/activeMQ/
16001601
/activemq
16011602
/activity
@@ -1747,6 +1748,7 @@
17471748
/axis2/
17481749
/axis2/axis2-admin/login
17491750
/b.php
1751+
/back.sql
17501752
/back.tar.bz2
17511753
/backup
17521754
/backup.7z
@@ -1759,6 +1761,7 @@
17591761
/backup.tar.gz
17601762
/backup.tgz
17611763
/backup.zip
1764+
/backups.sql
17621765
/bbs
17631766
/bbs.tar
17641767
/bbs.tar.gz
@@ -1792,6 +1795,7 @@
17921795
/checkLogin.do
17931796
/classes.war
17941797
/cleanup.log
1798+
/clients.sql
17951799
/cloudstore/config/mysql.xml
17961800
/cm.php
17971801
/code.tar.gz
@@ -1851,6 +1855,7 @@
18511855
/cri
18521856
/css.asp
18531857
/customers.log
1858+
/customers.sgl
18541859
/dama.asp
18551860
/dama.aspx
18561861
/dama.jsp
@@ -1877,8 +1882,10 @@
18771882
/database.log
18781883
/database.properties
18791884
/database.rar
1885+
/database.sgl
18801886
/database.sql
18811887
/database.sql.gz
1888+
/database.sqlite
18821889
/database.tar.bz2
18831890
/database.tar.gz
18841891
/database.tgz
@@ -1906,7 +1913,10 @@
19061913
/db.yaml
19071914
/db.yml
19081915
/db.zip
1916+
/db_backup.sql
19091917
/dbaccess.log
1918+
/dbase.sql
1919+
/dbdump.sql
19101920
/dbeaver-data-sources.xml
19111921
/debug
19121922
/debug.log
@@ -2156,6 +2166,7 @@
21562166
/monitoring
21572167
/mw-config/
21582168
/myadmin/login.php
2169+
/mysql.sql
21592170
/nacos/
21602171
/nagios
21612172
/nginx.conf
@@ -2324,6 +2335,7 @@
23242335
/sql.html
23252336
/sql.log
23262337
/sql.rar
2338+
/sql.sql
23272339
/sql.tar.bz2
23282340
/sql.tar.gz
23292341
/sql.tgz
@@ -2367,6 +2379,7 @@
23672379
/temp.7z
23682380
/temp.gz
23692381
/temp.rar
2382+
/temp.sql
23702383
/temp.tar.bz2
23712384
/temp.tar.gz
23722385
/temp.tgz
@@ -2473,6 +2486,7 @@
24732486
/uploads/dump.sql
24742487
/user-login.html
24752488
/users.log
2489+
/users.sql
24762490
/users/sign_in
24772491
/v1/health/service/consul
24782492
/v1/swagger

config/nuclei-templates/cves/2022/CVE-2022-32159.yaml

Lines changed: 0 additions & 44 deletions
This file was deleted.

config/nuclei-templates/cves/2022/CVE-2022-38463.yaml

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,23 @@
11
id: CVE-2022-38463
22

3-
info:
4-
name: ServiceNow - Cross Site Scripting
5-
author: amanrawat
6-
severity: medium
7-
description: |
8-
There exists a reflected XSS within the logout functionality of ServiceNow. This enables an unauthenticated remote attacker to execute arbitrary JavaScript.
9-
reference:
10-
- https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1156793
11-
- https://nvd.nist.gov/vuln/detail/CVE-2022-38463
12-
classification:
13-
cve-id: CVE-2022-38463
14-
metadata:
15-
verified: true
16-
shodan-query: http.title:"ServiceNow"
17-
tags: cve,cve2022,servicenow,xss
18-
3+
info:
4+
name: ServiceNow - Cross Site Scripting
5+
author: amanrawat
6+
severity: medium
7+
description: |
8+
There exists a reflected XSS within the logout functionality of ServiceNow. This enables an unauthenticated remote attacker to execute arbitrary JavaScript.
9+
reference:
10+
- https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1156793
11+
- https://nvd.nist.gov/vuln/detail/CVE-2022-38463
12+
classification:
13+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
14+
cvss-score: 6.1
15+
cve-id: CVE-2022-38463
16+
cwe-id: CWE-79
17+
metadata:
18+
shodan-query: http.title:"ServiceNow"
19+
verified: "true"
20+
tags: cve,cve2022,servicenow,xss
1921
requests:
2022
- method: GET
2123
path:

config/nuclei-templates/exposed-panels/apache/tomcat-pathnormalization.yaml

Lines changed: 0 additions & 36 deletions
This file was deleted.

config/nuclei-templates/exposures/configs/magento-information-disclosure.yaml renamed to config/nuclei-templates/exposures/configs/magento-config-disclosure.yaml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,16 @@
1-
id: magento-information-disclosure
1+
id: magento-config-disclosure
22

33
info:
4-
name: Magento - Information Disclosure
5-
author: ptonewreckin,danigoland
4+
name: Magento - Config Disclosure
5+
author: ptonewreckin,danigoland,geeknik
66
severity: high
77
description: |
88
Misconfigured instances of Magento may disclose usernames, passwords, and database configurations via /app/etc/local.xml
99
reference:
1010
- https://github.com/ptonewreckin/cmsDetector/blob/master/signatures/magento.py
1111
metadata:
1212
verified: true
13+
shodan-query: http.component:"Magento"
1314
tags: magento,exposure,credential,config
1415

1516
requests:

config/nuclei-templates/exposures/configs/magento-config.yaml

Lines changed: 0 additions & 31 deletions
This file was deleted.

config/nuclei-templates/misconfiguration/unauthenticated-influxdb.yaml

Lines changed: 0 additions & 27 deletions
This file was deleted.

config/nuclei-templates/takeovers/wix-takeover.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ requests:
1717
matchers-condition: and
1818
matchers:
1919
- type: word
20-
condition: or
2120
words:
2221
- 'Error ConnectYourDomain occurred'
2322
- 'wixErrorPagesApp'
23+
condition: and
2424

2525
- type: status
2626
status:

config/nuclei-templates/tb.sh

Lines changed: 0 additions & 2 deletions
This file was deleted.

config/nuclei-templates/vulnerabilities/other/concrete-xss.yaml

Lines changed: 0 additions & 35 deletions
This file was deleted.

config/nuclei-templates/vulnerabilities/other/gnuboard-sms-xss.yaml

Lines changed: 0 additions & 35 deletions
This file was deleted.

0 commit comments

Comments
 (0)