Modified Yaml
This commit is contained in:
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-0943:Joomla! Component com_jashowcase - Directory Traversal
|
||||
id: a7b7151c-99e5-444b-89db-df927d1055ed
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JA Showcase (com_jashowcase)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter in a jashowcase action to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11090
|
||||
- https://www.cvedetails.com/cve/CVE-2010-0943
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jashowcase&view=jashowcase&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-0943:Joomla! Component com_jashowcase - Directory Traversal
|
||||
id: 6a99f28f-8626-4419-93c8-9aa9e75c0068
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JA Showcase (com_jashowcase)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter in a jashowcase action to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11090
|
||||
- https://www.cvedetails.com/cve/CVE-2010-0943
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jashowcase&view=jashowcase&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-0944:Joomla! Component com_jcollection - Directory Traversal
|
||||
id: c3a5750d-210b-4a15-b1f7-17444d634a6a
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JCollection (com_jcollection)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11088
|
||||
- https://www.cvedetails.com/cve/CVE-2010-0944
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jcollection&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-0944:Joomla! Component com_jcollection - Directory Traversal
|
||||
id: ae369f4d-5f22-4969-8715-c8908394f279
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JCollection (com_jcollection)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11088
|
||||
- https://www.cvedetails.com/cve/CVE-2010-0944
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jcollection&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: CVE-2010-1306:Joomla! Component Picasa 2.0 - Local File Inclusion
|
||||
id: 3cea101d-f72d-441f-8fdc-8462cfac20e7
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component
|
||||
2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_joomlapicasa2&controller=../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
@@ -1,23 +1,23 @@
|
||||
title: CVE-2010-1314:Joomla! Component Highslide 1.5 - Local File Inclusion
|
||||
id: 226602ff-06ce-4173-9b87-7c2d62b4b3a4
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Highslide JS (com_hsconfig)
|
||||
component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1314:Joomla! Component Highslide 1.5 - Local File Inclusion
|
||||
id: 9a7d17b2-ba50-4f83-bd75-92bcb0ba190f
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Highslide JS (com_hsconfig)
|
||||
component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,23 +1,23 @@
|
||||
title: CVE-2010-1345:Joomla! Component Cookex Agency CKForms - Local File Inclusion
|
||||
id: ff1015cf-e991-458c-a999-67e30fd34f9a
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms)
|
||||
component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via
|
||||
a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1345:Joomla! Component Cookex Agency CKForms - Local File Inclusion
|
||||
id: dc5198bb-73cc-4a07-8b6c-b178d6c25265
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms)
|
||||
component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via
|
||||
a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_ckforms&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1353:Joomla! Component LoginBox - Local File Inclusion
|
||||
id: dee9b22f-1e7c-44ec-ad34-555ea35c0a6e
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the view parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12068
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1353
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1353:Joomla! Component LoginBox - Local File Inclusion
|
||||
id: ad0a798b-87d2-4701-82d4-f7a253e44d69
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the LoginBox Pro (com_loginbox)
|
||||
component for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the view parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12068
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1353
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-1474:Joomla! Component Sweetykeeper 1.5 - Local File Inclusion
|
||||
id: b2a1a114-6d92-4cce-8b53-b82518abf56c
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper)
|
||||
component 1.5.x for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12182
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1474
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_sweetykeeper&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1474:Joomla! Component Sweetykeeper 1.5 - Local File Inclusion
|
||||
id: 1248cb2d-f96a-49a0-83b0-c1e2c74ae397
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Sweety Keeper (com_sweetykeeper)
|
||||
component 1.5.x for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12182
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1474
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_sweetykeeper&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1475:Joomla! Component Preventive And Reservation 1.0.5 - Local File
|
||||
Inclusion
|
||||
id: 6d1e0e6f-4e68-4f1c-8f60-467521d0c25b
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive)
|
||||
component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_preventive&controller==../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1475:Joomla! Component Preventive And Reservation 1.0.5 - Local File
|
||||
Inclusion
|
||||
id: 5cf9e456-3c79-4d1c-a926-a5a2d20b6f26
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive)
|
||||
component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_preventive&controller==../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1495:Joomla! Component Matamko 1.01 - Local File Inclusion
|
||||
id: 6edfc22e-9b33-43c4-8872-eb41d6cfb5bd
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Matamko (com_matamko) component
|
||||
1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot)
|
||||
in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12286
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1495
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1495:Joomla! Component Matamko 1.01 - Local File Inclusion
|
||||
id: 807aa121-81eb-418f-9bbb-a215d8c6f0e7
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Matamko (com_matamko) component
|
||||
1.01 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot)
|
||||
in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12286
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1495
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_matamko&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,24 +1,24 @@
|
||||
title: CVE-2010-1532:Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion
|
||||
id: d1890f8a-ef82-4d0c-a686-bace99bd54f2
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail)
|
||||
component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1532:Joomla! Component PowerMail Pro 1.5.3 - Local File Inclusion
|
||||
id: 3f5ed59b-1944-4325-b675-5ea2441069f1
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail)
|
||||
component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_powermail&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,23 +1,23 @@
|
||||
title: CVE-2010-1533:Joomla! Component TweetLA 1.0.1 - Local File Inclusion
|
||||
id: 432ecccc-dfd6-4c0f-8173-0f57f8eafe46
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the TweetLA (com_tweetla) component
|
||||
1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_tweetla&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1533:Joomla! Component TweetLA 1.0.1 - Local File Inclusion
|
||||
id: fb9d6f93-d5ce-45e5-abf4-51b092d082a2
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the TweetLA (com_tweetla) component
|
||||
1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_tweetla&controller=../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,24 +1,24 @@
|
||||
title: CVE-2010-1535:Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion
|
||||
id: 36a64564-5ba1-40ff-a85f-6a0a11215c35
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the TRAVELbook (com_travelbook)
|
||||
component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1535:Joomla! Component TRAVELbook 1.0.1 - Local File Inclusion
|
||||
id: 74d51ae3-410b-4654-bb2d-20cca140a39c
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the TRAVELbook (com_travelbook)
|
||||
component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_travelbook&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-1602:Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion
|
||||
id: e9519f69-b3b8-4695-88bb-5bf2d34e40aa
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment)
|
||||
component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12283
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1602
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_zimbcomment&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1602:Joomla! Component ZiMB Comment 0.8.1 - Local File Inclusion
|
||||
id: 78b8be95-2dac-4660-867b-3096670f1801
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment)
|
||||
component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12283
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1602
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_zimbcomment&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1657:Joomla! Component SmartSite 1.0.0 - Local File Inclusion
|
||||
id: b32928f2-521b-4e3b-b34c-cb49617727ca
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the SmartSite (com_smartsite) component
|
||||
1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12428
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1657
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1657:Joomla! Component SmartSite 1.0.0 - Local File Inclusion
|
||||
id: 1b858384-5226-47df-beb9-d9162c63b0da
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the SmartSite (com_smartsite) component
|
||||
1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot
|
||||
dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12428
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1657
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_smartsite&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,24 +1,24 @@
|
||||
title: CVE-2010-1718:Joomla! Component Archery Scores 1.0.6 - Local File Inclusion
|
||||
id: 60f6f1f4-0312-4416-bb31-fd376a59ce7b
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in archeryscores.php in the Archery
|
||||
Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to
|
||||
include and execute arbitrary local files via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_archeryscores&controller=../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1718:Joomla! Component Archery Scores 1.0.6 - Local File Inclusion
|
||||
id: 7f99cad1-85b6-4521-801e-aa27fa249207
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in archeryscores.php in the Archery
|
||||
Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to
|
||||
include and execute arbitrary local files via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_archeryscores&controller=../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1722:Joomla! Component Online Market 2.x - Local File Inclusion
|
||||
id: e33e435a-51b1-416d-b0f3-0965a0b73af9
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Online Market (com_market) component
|
||||
2.x for Joomla! allows remote attackers to read arbitrary files and possibly have
|
||||
unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12177
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1722
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_market&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1722:Joomla! Component Online Market 2.x - Local File Inclusion
|
||||
id: 2de26e96-5594-4743-a74b-d8687d807efa
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Online Market (com_market) component
|
||||
2.x for Joomla! allows remote attackers to read arbitrary files and possibly have
|
||||
unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12177
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1722
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_market&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-1875:Joomla! Component Property - Local File Inclusion
|
||||
id: d989a93e-8f69-4419-876d-12bd5f9bfc19
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Real Estate Property (com_properties)
|
||||
component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files
|
||||
and possibly have unspecified other impact via a .. (dot dot) in the controller
|
||||
parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11851
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1875
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_properties&controller=../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1875:Joomla! Component Property - Local File Inclusion
|
||||
id: b2fa9b8b-da34-4598-b0dd-a77e409f786a
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Real Estate Property (com_properties)
|
||||
component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files
|
||||
and possibly have unspecified other impact via a .. (dot dot) in the controller
|
||||
parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/11851
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1875
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_properties&controller=../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1953:Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion
|
||||
id: 88a112bd-6581-4492-8d76-5c984d738c09
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap)
|
||||
component 1.0 for Joomla! allows remote attackers to read arbitrary files via a
|
||||
.. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12288
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1953
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_multimap&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1953:Joomla! Component iNetLanka Multiple Map 1.0 - Local File Inclusion
|
||||
id: 0dcfbc60-2e37-4b43-a916-19cb2b8566d1
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap)
|
||||
component 1.0 for Joomla! allows remote attackers to read arbitrary files via a
|
||||
.. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12288
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1953
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_multimap&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: CVE-2010-1954:Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
|
||||
id: b669a952-66dd-4336-9372-1a91f0f7df69
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot)
|
||||
component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1955:Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion
|
||||
id: 5eeaa5a1-e6d1-46f8-9bf3-ef141d6733f9
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory)
|
||||
component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via
|
||||
a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12238
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1955
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1955:Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion
|
||||
id: 25f05d16-2cb0-442b-9902-d3ad8cff11f7
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory)
|
||||
component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via
|
||||
a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12238
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1955
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_blogfactory&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1979:Joomla! Component Affiliate Datafeeds 880 - Local File Inclusion
|
||||
id: 0221e773-afea-48bf-b3b2-dd60ed509720
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds)
|
||||
component build 880 for Joomla! allows remote attackers to read arbitrary files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12088
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1979
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_datafeeds&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1979:Joomla! Component Affiliate Datafeeds 880 - Local File Inclusion
|
||||
id: 8d003d22-516d-445b-a8cf-809065ec3d2a
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds)
|
||||
component build 880 for Joomla! allows remote attackers to read arbitrary files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12088
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1979
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_datafeeds&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-1983:Joomla! Component redTWITTER 1.0 - Local File Inclusion
|
||||
id: b205e0d0-b61a-4a7a-a8db-45225cad643f
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the redTWITTER (com_redtwitter)
|
||||
component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary
|
||||
files via a .. (dot dot) in the view parameter to index.php
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12055
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1983
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_redtwitter&view=../../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-1983:Joomla! Component redTWITTER 1.0 - Local File Inclusion
|
||||
id: ef76c1fe-3653-4530-b55b-0676b399c927
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the redTWITTER (com_redtwitter)
|
||||
component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary
|
||||
files via a .. (dot dot) in the view parameter to index.php
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/12055
|
||||
- https://www.cvedetails.com/cve/CVE-2010-1983
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_redtwitter&view=../../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-2033:Joomla Percha Categories Tree 0.6 - Local File Inclusion
|
||||
id: d61b5ebd-9dc8-4dc5-b377-5e7cabfde00e
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach)
|
||||
component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly
|
||||
have unspecified other impact via a .. (dot dot) in the controller parameter to
|
||||
index.php.
|
||||
references:
|
||||
- https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2033
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_perchacategoriestree&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2033:Joomla Percha Categories Tree 0.6 - Local File Inclusion
|
||||
id: f953c147-a017-4f36-a20f-64c8bf4ec31a
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach)
|
||||
component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly
|
||||
have unspecified other impact via a .. (dot dot) in the controller parameter to
|
||||
index.php.
|
||||
references:
|
||||
- https://packetstormsecurity.com/files/89654/Joomla-Percha-Categories-Tree-0.6-Local-File-Inclusion.html
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2033
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_perchacategoriestree&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-2036:Joomla! Component Percha Fields Attach 1.0 - Directory Traversal
|
||||
id: 1859e4d6-2965-4bee-897f-bded883e7364
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach)
|
||||
component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly
|
||||
have unspecified other impact via a .. (dot dot) in the controller parameter to
|
||||
index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/34004
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2036
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_perchafieldsattach&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2036:Joomla! Component Percha Fields Attach 1.0 - Directory Traversal
|
||||
id: 3036ae41-8549-429e-ba64-a3dd5991f7f2
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Percha Fields Attach (com_perchafieldsattach)
|
||||
component 1.x for Joomla! allows remote attackers to read arbitrary files and possibly
|
||||
have unspecified other impact via a .. (dot dot) in the controller parameter to
|
||||
index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/34004
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2036
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_perchafieldsattach&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-2259:Joomla! Component com_bfsurvey - Local File Inclusion
|
||||
id: 0f74c630-3e11-41d3-8352-66961fc12085
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the BF Survey (com_bfsurvey) component
|
||||
for Joomla! allows remote attackers to include and execute arbitrary local files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/10946
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2259
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_bfsurvey&controller=../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2259:Joomla! Component com_bfsurvey - Local File Inclusion
|
||||
id: 9876750e-ffd6-41a6-9486-31f17db8ab87
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the BF Survey (com_bfsurvey) component
|
||||
for Joomla! allows remote attackers to include and execute arbitrary local files
|
||||
via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/10946
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2259
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_bfsurvey&controller=../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,27 +1,27 @@
|
||||
title: CVE-2010-2307:Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM
|
||||
- Directory Traversal
|
||||
id: f03488dd-2c62-4541-9f0e-a11e8a7e1750
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Multiple directory traversal vulnerabilities in the web server for Motorola
|
||||
SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow
|
||||
remote attackers to read arbitrary files via (1) "//" (multiple leading slash),
|
||||
(2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
|
||||
references:
|
||||
- https://www.securityfocus.com/bid/40550/info
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-2307
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /../../etc/passwd
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2307:Motorola SBV6120E SURFboard Digital Voice Modem SBV6X2X-1.0.0.5-SCM
|
||||
- Directory Traversal
|
||||
id: c2979f47-e361-4ce4-9f69-8a6a8bdf8916
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Multiple directory traversal vulnerabilities in the web server for Motorola
|
||||
SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow
|
||||
remote attackers to read arbitrary files via (1) "//" (multiple leading slash),
|
||||
(2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.
|
||||
references:
|
||||
- https://www.securityfocus.com/bid/40550/info
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-2307
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /../../etc/passwd
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-2682:Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion
|
||||
id: 99824e58-3cce-4172-9970-04e0a6de5108
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Realtyna Translator (com_realtyna)
|
||||
component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/14017
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2682
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_realtyna&controller=../../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2682:Joomla! Component Realtyna Translator 1.0.15 - Local File Inclusion
|
||||
id: a6e33159-2c73-4bde-b40c-cf013d639d8c
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the Realtyna Translator (com_realtyna)
|
||||
component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and
|
||||
possibly have unspecified other impact via a .. (dot dot) in the controller parameter
|
||||
to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/14017
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2682
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_realtyna&controller=../../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,27 +1,27 @@
|
||||
title: CVE-2010-2861:Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI
|
||||
id: e22f6ee2-341a-44b8-a58b-33a0960fa8e0
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Multiple directory traversal vulnerabilities in the administrator console
|
||||
in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files
|
||||
via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm,
|
||||
(3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm
|
||||
in CFIDE/administrator/.
|
||||
references:
|
||||
- https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
|
||||
- http://www.adobe.com/support/security/bulletins/apsb10-18.html
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-2861:Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI
|
||||
id: 422116aa-40e3-4e44-a32f-b6c6f5855200
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Multiple directory traversal vulnerabilities in the administrator console
|
||||
in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files
|
||||
via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm,
|
||||
(3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm
|
||||
in CFIDE/administrator/.
|
||||
references:
|
||||
- https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
|
||||
- http://www.adobe.com/support/security/bulletins/apsb10-18.html
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,23 +1,23 @@
|
||||
title: CVE-2010-3426:Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion
|
||||
id: 8df31def-3d71-4f01-85ab-4891fa481a8c
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in jphone.php in the JPhone (com_jphone)
|
||||
component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute
|
||||
arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jphone&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-3426:Joomla! Component Jphone 1.0 Alpha 3 - Local File Inclusion
|
||||
id: 542e1a33-d6b0-4843-9a27-ad846c2daf22
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in jphone.php in the JPhone (com_jphone)
|
||||
component 1.0 Alpha 3 for Joomla! allows remote attackers to include and execute
|
||||
arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
|
||||
references:
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jphone&controller=../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-4231:Camtron CMNC-200 IP Camera - Directory Traversal
|
||||
id: e097e932-b39e-4e00-ac6f-1f03e43fc716
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: The CMNC-200 IP Camera has a built-in web server that is enabled by default.
|
||||
The server is vulnerable to directory transversal attacks, allowing access to any
|
||||
file on the camera file system.
|
||||
references:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-4231
|
||||
- https://www.exploit-db.com/exploits/15505
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /../../../../../../../../../../../../../etc/passwd
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-4231:Camtron CMNC-200 IP Camera - Directory Traversal
|
||||
id: aa46c601-90ce-48b3-b45e-c56eefd86134
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: The CMNC-200 IP Camera has a built-in web server that is enabled by default.
|
||||
The server is vulnerable to directory transversal attacks, allowing access to any
|
||||
file on the camera file system.
|
||||
references:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2010-4231
|
||||
- https://www.exploit-db.com/exploits/15505
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /../../../../../../../../../../../../../etc/passwd
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,25 +1,25 @@
|
||||
title: CVE-2010-4617:Joomla! Component JotLoader 2.2.1 - Local File Inclusion
|
||||
id: 3965e578-e509-41e2-a572-12522bbcf4fd
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JotLoader (com_jotloader) component
|
||||
2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory
|
||||
traversal sequences in the section parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/15791
|
||||
- https://www.cvedetails.com/cve/CVE-2010-4617
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jotloader§ion=../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-4617:Joomla! Component JotLoader 2.2.1 - Local File Inclusion
|
||||
id: 44d2ed53-964a-420c-a410-c4d44356a0f4
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in the JotLoader (com_jotloader) component
|
||||
2.2.1 for Joomla! allows remote attackers to read arbitrary files via directory
|
||||
traversal sequences in the section parameter to index.php.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/15791
|
||||
- https://www.cvedetails.com/cve/CVE-2010-4617
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /index.php?option=com_jotloader§ion=../../../../../../../../../../../../../../etc/passwd%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
title: CVE-2010-5278:MODx manager - Local File Inclusion
|
||||
id: 5f6499cc-97a6-49ed-af28-00278c2c954e
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php
|
||||
in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled,
|
||||
allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key
|
||||
parameter.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/34788
|
||||
- https://www.cvedetails.com/cve/CVE-2010-5278
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
title: CVE-2010-5278:MODx manager - Local File Inclusion
|
||||
id: 0ed9f57e-d400-4f95-aaa4-6356b8e7eaeb
|
||||
Author: Subhash Popuri (@pbssubhash)
|
||||
date: 25/08/2021
|
||||
status: experimental
|
||||
description: Directory traversal vulnerability in manager/controllers/default/resource/tvs.php
|
||||
in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled,
|
||||
allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key
|
||||
parameter.
|
||||
references:
|
||||
- https://www.exploit-db.com/exploits/34788
|
||||
- https://www.cvedetails.com/cve/CVE-2010-5278
|
||||
- https://github.com/projectdiscovery/nuclei-templates
|
||||
detection:
|
||||
selection:
|
||||
c-uri|contains:
|
||||
- /manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00
|
||||
condition: selection
|
||||
false_positives:
|
||||
- Scanning from Nuclei
|
||||
- Penetration Testing Activity
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1190
|
||||
level: critical
|
||||
|
||||
Reference in New Issue
Block a user