From 2ab1c4cacc863b7b2012820df87df04cec91087e Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 8 Feb 2022 11:36:43 -0500 Subject: [PATCH 1/7] Enhancement: cves/2020/CVE-2020-14882.yaml by mp --- cves/2020/CVE-2020-14882.yaml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 73eda467f81..ea331938b73 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -39,6 +39,4 @@ requests: part: interactsh_protocol words: - "http" -# Enhanced by mp on 2022/02/04 - -# Enhanced by mp on 2022/02/04 +# Enhanced by mp on 2022/02/08 From 35bcf2e36180a871fd6405f0c10918e39aa2ee6d Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 8 Feb 2022 11:40:30 -0500 Subject: [PATCH 2/7] Enhancement: cves/2021/CVE-2021-42237.yaml by mp --- cves/2021/CVE-2021-42237.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-42237.yaml b/cves/2021/CVE-2021-42237.yaml index 34c06043d1c..747e489ffb8 100644 --- a/cves/2021/CVE-2021-42237.yaml +++ b/cves/2021/CVE-2021-42237.yaml @@ -4,7 +4,7 @@ info: name: Sitecore Experience Platform Pre-Auth RCE author: pdteam severity: critical - description: Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. + description: Sitecore XP 7.5 to Sitecore XP 8.2 Update 7 is vulnerable to an insecure deserialization attack where remote commands can be executed by an attacker with no authentication or special configuration required. reference: - https://blog.assetnote.io/2021/11/02/sitecore-rce/ - https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 @@ -117,3 +117,5 @@ requests: part: body words: - "System.ArgumentNullException" + +# Enhanced by mp on 2022/02/08 From be25d5139e407d174ff9e8e587afd0a812b8baa5 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 8 Feb 2022 11:43:22 -0500 Subject: [PATCH 3/7] Enhancement: cves/2018/CVE-2018-17254.yaml by mp --- cves/2018/CVE-2018-17254.yaml | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index f5f21b83998..eef9386a74d 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -4,6 +4,7 @@ info: name: Joomla! JCK Editor SQL Injection author: Suman_Kar description: The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter. + remediation: Update or remove the affected plugin. severity: critical tags: joomla,sqli,cve,cve2018 reference: @@ -29,3 +30,5 @@ requests: - "nuclei-template" # Enhanced by cs on 2022/02/01 + +# Enhanced by mp on 2022/02/08 From 9f550a29ef319e673a8602efec0bb79e513febe3 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 8 Feb 2022 11:46:14 -0500 Subject: [PATCH 4/7] Enhancement: cves/2021/CVE-2021-37538.yaml by mp --- cves/2021/CVE-2021-37538.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml index 31912cb8037..765e00a3e78 100644 --- a/cves/2021/CVE-2021-37538.yaml +++ b/cves/2021/CVE-2021-37538.yaml @@ -4,7 +4,7 @@ info: name: PrestaShop SmartBlog SQL Injection author: whoever severity: critical - description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection in the blog archive functionality. + description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection vulnerability in the blog archive functionality. tags: cve,cve2021,prestashop,smartblog,sqli remediation: Apply the fix. reference: @@ -33,3 +33,5 @@ requests: part: body # Enhanced by mp on 2022/02/02 + +# Enhanced by mp on 2022/02/08 From 217dfffd9d4a0a9e9ec8181086b15b835853e05f Mon Sep 17 00:00:00 2001 From: sullo Date: Tue, 8 Feb 2022 14:36:53 -0500 Subject: [PATCH 5/7] Enhancements: add cvss & description --- technologies/fingerprinthub-web-fingerprints.yaml | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/technologies/fingerprinthub-web-fingerprints.yaml b/technologies/fingerprinthub-web-fingerprints.yaml index a6803f5b861..e989a57a159 100644 --- a/technologies/fingerprinthub-web-fingerprints.yaml +++ b/technologies/fingerprinthub-web-fingerprints.yaml @@ -2,10 +2,15 @@ id: fingerprinthub-web-fingerprints info: name: FingerprintHub Technology Fingerprint + description: FingerprintHub Technology Fingerprint tests run in nuclei. author: pdteam reference: https://github.com/0x727/FingerprintHub severity: info tags: tech + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cvss-score: 0.0 + cwe-id: CWE-200 requests: - method: GET @@ -15058,3 +15063,5 @@ requests: name: zzzcms words: - Powered by ZZZcms + +# Enhanced by cs on 2022/02/08 From db88cd41e990e3e8ab106c440e855b3bb9390c44 Mon Sep 17 00:00:00 2001 From: sullo Date: Tue, 8 Feb 2022 14:39:21 -0500 Subject: [PATCH 6/7] Remove duplicate enchanced tag --- cves/2018/CVE-2018-17254.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2018/CVE-2018-17254.yaml b/cves/2018/CVE-2018-17254.yaml index eef9386a74d..67d50adeca1 100644 --- a/cves/2018/CVE-2018-17254.yaml +++ b/cves/2018/CVE-2018-17254.yaml @@ -29,6 +29,4 @@ requests: words: - "nuclei-template" -# Enhanced by cs on 2022/02/01 - # Enhanced by mp on 2022/02/08 From a459b22355eae0c8d1b9e4d904c2a6e9de3294e4 Mon Sep 17 00:00:00 2001 From: sullo Date: Tue, 8 Feb 2022 17:03:36 -0500 Subject: [PATCH 7/7] Duplicate comment --- cves/2021/CVE-2021-37538.yaml | 2 -- 1 file changed, 2 deletions(-) diff --git a/cves/2021/CVE-2021-37538.yaml b/cves/2021/CVE-2021-37538.yaml index 765e00a3e78..c89bd18c24e 100644 --- a/cves/2021/CVE-2021-37538.yaml +++ b/cves/2021/CVE-2021-37538.yaml @@ -32,6 +32,4 @@ requests: - "c5fe25896e49ddfe996db7508cf00534" part: body -# Enhanced by mp on 2022/02/02 - # Enhanced by mp on 2022/02/08