Skip to content

Commit

Permalink
nuclei v2.9.14
Browse files Browse the repository at this point in the history
  • Loading branch information
SleepingBag945 committed Sep 16, 2023
1 parent f8b4fc0 commit 266e6f4
Show file tree
Hide file tree
Showing 2,500 changed files with 19,025 additions and 8,353 deletions.
63 changes: 31 additions & 32 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -212,68 +212,67 @@ coco@Mac dalaodddd % ./dddd -h
\__,_| \__,_| \__,_| \__,_|
_|"""""|_|"""""|_|"""""|_|"""""|
"`-0-0-'"`-0-0-'"`-0-0-`"`-0-0-'
dddd.version: 1.1
dddd.version: 1.2
Usage of ./dddd:
-Pn
禁用主机发现功能(icmp,arp)
禁用主机发现功能(icmp,arp)
-ffmc int
Fofa 查询资产条数 Max:10000 (default 100)
Fofa 查询资产条数 Max:10000 (default 100)
-fofa
从Fofa中获取资产,开启此选项后-t参数变更为需要在fofa中搜索的关键词
从Fofa中获取资产,开启此选项后-t参数变更为需要在fofa中搜索的关键词
-gopt int
GoPoc运行线程 (default 50)
GoPoc运行线程 (default 50)
-htpc int
Hunter 最大查询页数 (default 10)
Hunter 最大查询页数 (default 10)
-htps int
Hunter 每页资产条数 (default 100)
Hunter 每页资产条数 (default 100)
-hunter
从hunter中获取资产,开启此选项后-t参数变更为需要在hunter中搜索的关键词
从hunter中获取资产,开启此选项后-t参数变更为需要在hunter中搜索的关键词
-ld
允许域名解析到局域网
允许域名解析到局域网
-mp string
指定masscan路径 (default "masscan")
指定masscan路径 (default "masscan")
-nd
关闭主动指纹探测
关闭主动指纹探测
-ngp
关闭Golang Poc探测
关闭Golang Poc探测
-nsbf
关闭子域名爆破
关闭子域名爆破
-nsf
关闭被动子域名枚举
关闭被动子域名枚举
-o string
html格式输出报告
html格式输出报告
-p string
目标IP扫描的端口。 默认扫描Top1000
目标IP扫描的端口。 默认扫描Top1000
-pc int
一个IP的端口数量阈值,当一个端口的IP数量超过此数量,此IP将会被抛弃 (default 300)
一个IP的端口数量阈值,当一个端口的IP数量超过此数量,此IP将会被抛弃 (default 300)
-poc string
模糊匹配Poc名称
模糊匹配Poc名称
-proxy string
HTTP代理,在外网可利用云函数/代理池的多出口特性恶心防守 例: http://127.0.0.1:8080
HTTP代理,在外网可利用云函数/代理池的多出口特性恶心防守 例: http://127.0.0.1:8080
-psto int
TCP扫描超时时间(秒) (default 6)
TCP扫描超时时间(秒) (default 6)
-rod string
Set the default value of options used by rod.
Set the default value of options used by rod.
-sbft int
爆破子域名协程数量 (default 150)
爆破子域名协程数量 (default 150)
-sd
开启子域名枚举
开启子域名枚举
-st string
端口扫描方式 tcp使用TCP扫描(慢),syn为调用masscan进行扫描(需要masscan依赖) (default "tcp")
端口扫描方式 tcp使用TCP扫描(慢),syn为调用masscan进行扫描(需要masscan依赖) (default "tcp")
-synt int
SYN扫描线程(masscan) (default 10000)
SYN扫描线程(masscan) (default 10000)
-t string
被扫描的目标。 192.168.0.1 192.168.0.0/16 192.168.0.1:80 baidu.com:80 target.txt
被扫描的目标。 192.168.0.1 192.168.0.0/16 192.168.0.1:80 baidu.com:80 target.txt
-tc int
TCP全连接获取Banner的线程数量 (default 30)
TCP全连接获取Banner的线程数量 (default 30)
-tcpt int
TCP扫描线程 (default 600)
TCP扫描线程 (default 600)
-wt int
Web探针线程,根据网络环境调整 (default 100)
Web探针线程,根据网络环境调整 (default 100)
-wto int
Web探针超时时间,根据网络环境调整 (default 12)
Web探针超时时间,根据网络环境调整 (default 12)
```
Expand Down Expand Up @@ -461,7 +460,7 @@ apache-solr-log4j-rce.yaml
如果我写好一个名为solr-rce.yaml的nuclei poc,则应该在workflow.yaml的对应指纹的pocs下添加一行solr-rce.yaml。这样才能在识别到solr时调用到此poc。
如果我写好一个名为solr-rce.yaml的nuclei poc,则应该在workflow.yaml的对应指纹的pocs下添加一行solr-rce.yaml或者solr-rce。这样才能在识别到solr时调用到此poc。
Expand Down
55 changes: 55 additions & 0 deletions Update.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,60 @@
# 更新日志

## 2023.9.16

同步nuclei引擎 **v2.9.14**

现在workflow中填写可以添加.yaml后缀也可以不填了

添加整个程序结束后的提示



更新poc

同步nuclei poc至v9.6.3



添加Poc

```
CVE-2023-39600 (IceWarp 11.4.6.0 - Cross-Site Scripting)
CVE-2023-39598 (IceWarp Email Client - Cross Site Scripting)
CVE-2023-39361 (Cacti 1.2.24 - SQL Injection)
CVE-2023-36844 (Juniper Devices - Remote Code Execution)
CVE-2023-34192 (Zimbra Collaboration Suite (ZCS) v.8.8.15 - Cross-Site Scripting)
CVE-2023-34124 (SonicWall GMS and Analytics Web Services - Shell Injection)
CVE-2023-30150 (PrestaShop leocustomajax 1.0 & 1.0.0 - SQL Injection)
CVE-2023-27034 (Blind SQL injection vulnerability in Jms Blog)
CVE-2023-2648 (Weaver E-Office 9.5 - Remote Code Execution)
CVE-2023-26469 (Jorani 1.0.0 - Remote Code Execution)
CVE-2023-20073 (Cisco VPN Routers - Unauthenticated Arbitrary File Upload)
CVE-2022-22897 (PrestaShop Ap Pagebuilder <= 2.4.4 SQL Injection)
CVE-2021-46107 (Ligeo Archives Ligeo Basics - Server Side Request Forgery)
CVE-2020-11798 (Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal)
CVE-2020-10220 (rConfig 3.9 - SQL injection)
CVE-2018-17153 (Western Digital MyCloud NAS - Authentication Bypass)
CVE-2016-10108 (Western Digital MyCloud NAS - Command Injection)
jorani-benjamin-xss (Jorani v1.0.3-2014-2023 Benjamin BALET - Cross-Site Scripting)
prestashop-apmarketplace-sqli (PrestaShop Ap Marketplace SQL Injection)
ecology-info-leak (Ecology - Information Exposure)
php-debugbar-exposure (Php Debug Bar - Exposure)
```



部分Poc移动至Nuclei官方模版

```
CNVD-2021-32799 (360 Xintianqing - SQL Injection)
hikvision-fastjson-rce (HIKVISION applyCT Fastjson - Remote Command Execution)
```





## 2023.9.15

9月13号的更新报告写入有问题,现在修了。
Expand Down
24 changes: 15 additions & 9 deletions common/callnuclei/callnuclei.go
Original file line number Diff line number Diff line change
Expand Up @@ -153,10 +153,12 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
// automatic web scan using wappalyzer technology detection to tags mapping
// 使用wappalyzer技术检测tags,自动web扫描
// 这里被魔改了,根据提供的目标与Pocs的映射进行自动扫描
// 必须设置为true
options.AutomaticScan = true

// list of template or template directory to run (comma-separated, file)
// 要运行的模板或模板目录列表(逗号分隔,文件) -t 指定的模板目录 这个就不嵌入了
// 要运行的模板或模板目录列表(逗号分隔,文件) -t 指定的模板目录
// 不嵌入可执行文件是为了方便增删poc。内网版本嵌入
options.Templates = []string{pwd + "/config/pocs/"}

// list of template urls to run (comma-separated, file)
Expand Down Expand Up @@ -189,7 +191,7 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear

// allowed domain list to load remote templates from
// 允许域列表从以下位置加载远程模板
options.RemoteTemplateDomainList = []string{"api.nuclei.sh"}
options.RemoteTemplateDomainList = []string{"templates.nuclei.sh"}

// templates to run based on authors (comma-separated, file)
// 执行指定作者的模板(逗号分隔,文件)
Expand Down Expand Up @@ -330,6 +332,8 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
// 当DNS错误时使用系统DNS
options.SystemResolvers = false

options.DisableClustering = false

// 启用被动扫描处理HTTP响应
options.OfflineHTTP = false

Expand All @@ -354,9 +358,9 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
// 指定tls sni的主机名(默认为输入的域名)
options.SNI = ""

// sandbox nuclei for safe templates execution
// 在沙箱中安全运行模板
options.Sandbox = false
options.AllowLocalFileAccess = false

options.RestrictLocalNetworkAccess = false

// 指定网卡
options.Interface = ""
Expand All @@ -377,6 +381,8 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
// 最大储存响应大小(默认:1 * 1024 * 1024字节)
options.ResponseSaveSize = 1 * 1024 * 1024

options.TlsImpersonate = false

// 使用interactsh反连检测平台(默认为oast.pro,oast.live,oast.site,oast.online,oast.fun,oast.me)
options.InteractshURL = ""

Expand Down Expand Up @@ -417,7 +423,7 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
// uncover results to return
options.UncoverLimit = 100
// delay between uncover query requests in seconds (0 to disable)
options.UncoverDelay = 1
options.UncoverRateLimit = 60

// 每秒最大请求量(默认:150)
options.RateLimit = 150
Expand All @@ -433,9 +439,9 @@ func readConfig(TargetAndPocsName map[string][]string, proxy string, nameForSear
options.HeadlessTemplateThreads = 10

// 超时时间(默认为10秒)
options.Timeout = 10
// 重试次数(默认:1)
options.Retries = 1
options.Timeout = 12
// 重试次数(默认:1)设置2为降低糟糕网络环境的影响
options.Retries = 2
// 指定HTTP/HTTPS默认端口(例如:host:80,host:443)
options.LeaveDefaultPorts = false
// 某主机扫描失败次数,跳过该主机(默认:30)
Expand Down
2 changes: 1 addition & 1 deletion common/flag.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ func showBanner() {
\__,_| \__,_| \__,_| \__,_|
_|"""""|_|"""""|_|"""""|_|"""""|
"` + "`" + `-0-0-'"` + "`" + `-0-0-'"` + "`" + `-0-0-` + "`" + `"` + "`" + `-0-0-'
dddd.version: 1.1
dddd.version: 1.2
`
fmt.Println(banner)
}
Expand Down
16 changes: 14 additions & 2 deletions common/http/http.go
Original file line number Diff line number Diff line change
Expand Up @@ -133,17 +133,29 @@ func URLParse(URLRaw string) *url.URL {
return URL
}

func AddYamlSuffix(s string) string {
s = strings.TrimSpace(s)
if strings.HasSuffix(s, ".yaml") {
return s
} else {
return s + ".yaml"
}
}

func addPocs(target string, result *map[string][]string, workflowEntity structs.WorkFlowEntity) {
// 判断有没有加入过
_, ok := (*result)[target]
if !ok { // 没有添加过这个目标
(*result)[target] = workflowEntity.PocsName
(*result)[target] = []string{}
for _, pocName := range workflowEntity.PocsName {
(*result)[target] = append((*result)[target], AddYamlSuffix(pocName))
}
} else { // 添加过就逐个比较
existPocNames, _ := (*result)[target]
for _, pocName := range workflowEntity.PocsName {
// 没有就添加
if utils.GetItemInArray(existPocNames, pocName) == -1 {
(*result)[target] = append((*result)[target], pocName)
(*result)[target] = append((*result)[target], AddYamlSuffix(pocName))
}
}
}
Expand Down
16 changes: 15 additions & 1 deletion config/finger.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15984,4 +15984,18 @@ Maltrail:
RedisInsight:
- title="RedisInsight"
OfficeWeb365:
- header="OfficeWeb365"
- header="OfficeWeb365"
SonicWall-GMS:
- title="Global Management System" && header="/sgms"
SonicWall-Analytics:
- title="SonicWall Analytics Login"
Jorani:
- title="Jorani"
Ligeo:
- title="Ligeo"
MiCollab:
- body="MiCollab"
Mitel:
- body="Mitel"
PHPDebugBar:
- body="phpdebugbar"
Original file line number Diff line number Diff line change
@@ -1 +1 @@
6.2.0
6.2.1
Original file line number Diff line number Diff line change
@@ -1 +1 @@
4.4.4
4.4.5.1
Original file line number Diff line number Diff line change
@@ -1 +1 @@
8.1.7
8.1.8
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.2.1
2.2.2
Original file line number Diff line number Diff line change
@@ -1 +1 @@
3.29.3
3.29.4
Original file line number Diff line number Diff line change
@@ -1 +1 @@
3.1.2
3.1.4
Original file line number Diff line number Diff line change
@@ -1 +1 @@
3.1.2
3.1.3
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.0.2
2.1.0
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.4.4
2.4.5
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.9.0
2.9.2
Original file line number Diff line number Diff line change
@@ -1 +1 @@
5.8.6
5.8.8
Original file line number Diff line number Diff line change
@@ -1 +1 @@
7.2.0
7.2.1
Original file line number Diff line number Diff line change
@@ -1 +1 @@
3.0.32
3.0.33
Original file line number Diff line number Diff line change
@@ -1 +1 @@
5.0.7
5.0.9
Original file line number Diff line number Diff line change
@@ -1 +1 @@
6.4.1
6.4.2
Original file line number Diff line number Diff line change
@@ -1 +1 @@
4.12.6
4.12.7
Original file line number Diff line number Diff line change
@@ -1 +1 @@
2.5.3
2.5.5
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.107.0
1.108.0

0 comments on commit 266e6f4

Please sign in to comment.