示例#1
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.SOLR
     self.name = 'solr template rce'
     self.keyword = ['solr']
     self.info = 'solr template rce'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'https://github.com/chaitin/xray/blob/master/pocs/solr-velocity-template-rce.yml'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#2
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'directory list'
     self.keyword = ['web']
     self.info = 'directory list'
     self.type = VUL_TYPE.INFO
     self.level = VUL_LEVEL.LOWER
     self.refer = 'https://github.com/WyAtu/Perun/blob/master/vuln/web/directory_listing.py'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#3
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'php7cms getshell'
     self.keyword = ['php7cms']
     self.info = 'php7cms getshell'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://paper.tuisec.win/detail/2139f76293bdb43'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#4
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEBLOGIC
     self.name = 'CNVD-C-2019-48814'
     self.keyword = ['weblogic']
     self.info = 'CNVD-C-2019-48814'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'http://www.cnvd.org.cn/webinfo/show/4999'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#5
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'CVE-2018-12613'
     self.keyword = ['phpmyadmin', 'php']
     self.info = 'CVE-2018-12613'
     self.type = VUL_TYPE.LFI
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://mp.weixin.qq.com/s/HZcS2HdUtqz10jUEN57aog'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#6
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.CONFLUENCE
     self.name = 'CVE-2019-3396'
     self.keyword = ['confluence']
     self.info = 'Get the web application status and title'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'https://www.seebug.org/vuldb/ssvid-97898'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#7
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 's-cms download'
     self.keyword = ['s-cms', 'download']
     self.info = 's-cms download'
     self.type = VUL_TYPE.INFO
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://xz.aliyun.com/t/3614'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#8
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'thinkphp 5.1.31 getshell'
     self.keyword = ['thinkphp']
     self.info = 'Thinkphp 5.1.x < 5.1.31 and 5.0.x <= 5.0.23 get shell. e.g. FastAdmin,layuiAdmin,DZHCMS,tpAdmin'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'https://mp.weixin.qq.com/s/oWzDIIjJS2cwjb4rzOM4DQ,http://www.vulnspy.com/cn-thinkphp-5.x-rce/thinkphp_5.x_(v5.0.23%E5%8F%8Av5.1.31%E4%BB%A5%E4%B8%8B%E7%89%88%E6%9C%AC)_%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%EF%BC%88getshell%EF%BC%89/'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#9
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEBLOGIC
     self.name = 'CVE-2018-2628'
     self.keyword = ['weblogic']
     self.info = 'CVE-2018-2628'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'https://github.com/ysrc/xunfeng/blob/master/vulscan/vuldb/weblogic_CVE_2018_2628.py'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#10
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEBLOGIC
     self.name = 'CVE-2018-2894'
     self.keyword = ['weblogic']
     self.info = 'CVE-2018-2894'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'https://github.com/111ddea/cve-2018-2894'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#11
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'CVE-2019-11580'
     self.keyword = ['atlassian', 'crowd']
     self.info = 'atlassian crowd getshell'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'https://github.com/jas502n/CVE-2019-11580'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#12
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'dedecms win manager'
     self.keyword = ['dedecms', 'win', 'manager']
     self.info = 'Find manager for dedecms'
     self.type = 'burst'
     self.level = 'medium'
     self.refer = 'https://xz.aliyun.com/t/2064'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#13
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'niushop getshell'
     self.keyword = ['niushop']
     self.info = 'niushop getshell'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://xz.aliyun.com/t/3767'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#14
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'thinkphp v6 file write'
     self.keyword = ['thinkphp']
     self.info = 'thinkphp v6 file write'
     self.type = 'other'
     self.level = VUL_LEVEL.HIGH
     self.refer = ''
     Script.__init__(self, target=target, service_type=self.service_type)
示例#15
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEBLOGIC
     self.name = 'CVE-2017-10271'
     self.keyword = ['weblogic']
     self.info = 'CVE-2017-10271'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'http://www.cnvd.org.cn/webinfo/show/4999'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#16
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'thinkcmf 2.2.3 sql'
     self.keyword = ['thinkcmf', 'php']
     self.info = 'thinkcmf 2.2.3 sql'
     self.type = 'sql'
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://xz.aliyun.com/t/3529'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#17
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.ELASTICSEARCH
     self.name = 'CVE-2018-1000600'
     self.keyword = ['jenkins']
     self.info = 'CVE-2018-1000600'
     self.type = VUL_TYPE.SSRF
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://devco.re/blog/2019/01/16/hacking-Jenkins-part1-play-with-dynamic-routing/'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#18
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.ELASTICSEARCH
     self.name = 'CVE-2018-1000861'
     self.keyword = ['jenkins']
     self.info = 'CVE-2018-1000861'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'https://github.com/chaitin/xray/blob/master/pocs/jenkins-cve-2018-1000861-rce.yml'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#19
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'thinkphp debug'
     self.keyword = ['thinkphp']
     self.info = 'thinkphp debug'
     self.type = 'info'
     self.level = 'info'
     self.refer = ''
     Script.__init__(self, target=target, service_type=self.service_type)
示例#20
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'discuz x3.4 ssrf'
     self.keyword = ['discuz']
     self.info = 'discuz x3.4 ssrf'
     self.type = 'ssrf'
     self.level = 'high'
     self.refer = 'https://zhuanlan.zhihu.com/p/51907363, https://www.seebug.org/vuldb/ssvid-97709'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#21
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'phpmyadmin burst'
     self.keyword = ['phpmyadmin', 'burst', 'php']
     self.info = 'phpmyadmin burst'
     self.type = VUL_TYPE.WEAKPASS
     self.level = VUL_LEVEL.CRITICAL
     self.refer = 'https://github.com/ysrc/xunfeng/blob/master/vulscan/vuldb/phpmyadmin_crackpass.py'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#22
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.CONFLUENCE
     self.name = 'CVE-2015-8399'
     self.keyword = ['confluence']
     self.info = 'CVE-2015-8399'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://www.exploit-db.com/exploits/39170/'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#23
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'CVE-2019-9978'
     self.keyword = ['wordpress']
     self.info = 'WordPress social-warfare <= 3.5.2'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'https://paper.seebug.org/919/'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#24
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'thinkcmf 2.2.3 template inject'
     self.keyword = ['thinkcmf', 'php']
     self.info = 'thinkcmf 2.2.3 template inject'
     self.type = 'rce'
     self.level = 'high'
     self.refer = 'https://xz.aliyun.com/t/3529'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#25
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.SOLR
     self.name = 'CVE-2017-12629'
     self.keyword = ['solr']
     self.info = 'CVE-2017-12629'
     self.type = VUL_TYPE.XXE
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://github.com/chaitin/xray/blob/master/pocs/solr-cve-2017-12629-xxe.yml'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#26
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'kindeditor upload json'
     self.keyword = ['web', 'kindeditor', 'upload', 'json']
     self.info = 'Kindeditor <= 4.1.12 upload'
     self.type = 'upload'
     self.level = VUL_LEVEL.MEDIUM
     self.refer = 'https://github.com/kindsoft/kindeditor/issues/249'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#27
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'flexpaper 2.3.6 getshell'
     self.keyword = ['flexpaper']
     self.info = 'FlexPaper <= 2.3.6 RCE.(CVE-2018-11686)'
     self.type = VUL_TYPE.RCE
     self.level = VUL_LEVEL.HIGH
     self.refer = 'https://mp.weixin.qq.com/s/8eBwfW231Nm02Lz8La2P1w'
     Script.__init__(self, target=target, service_type=self.service_type)
示例#28
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'http basic auth burst'
     self.keyword = ['tomcat', 'burst', 'tomcat']
     self.info = 'http basic auth burst'
     self.type = VUL_TYPE.WEAKPASS
     self.level = VUL_LEVEL.HIGH
     self.repair = ''
     self.refer = ''
     Script.__init__(self, target=target, service_type=self.service_type)
示例#29
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'CVE-2018-11759'
     self.keyword = ['web', 'tomcat']
     self.info = 'CVE-2018-11759'
     self.type = VUL_TYPE.BYPASS
     self.level = VUL_LEVEL.HIGH
     self.repair = ''
     self.refer = ''
     Script.__init__(self, target=target, service_type=self.service_type)
示例#30
0
 def __init__(self, target=None):
     self.service_type = SERVICE_PORT_MAP.WEB
     self.name = 'druid-monitor-unauth'
     self.keyword = ['web', 'druid']
     self.info = 'druid-monitor-unauth'
     self.type = VUL_TYPE.UNAUTH
     self.level = VUL_LEVEL.HIGH
     self.repair = ''
     self.refer = ''
     Script.__init__(self, target=target, service_type=self.service_type)