Skip to content

Commit

Permalink
20241112
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Nov 12, 2024
1 parent 9cbc2cc commit 01ecb24
Show file tree
Hide file tree
Showing 31 changed files with 1,853 additions and 1 deletion.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20241111
20241112
29 changes: 29 additions & 0 deletions poc.txt
Original file line number Diff line number Diff line change
Expand Up @@ -31251,6 +31251,7 @@
./poc/cve/CVE-2023-50830.yaml
./poc/cve/CVE-2023-50831-530de1beee68f2e517e341bc43961155.yaml
./poc/cve/CVE-2023-50831-53249e749c4a821948ec65dc4fb7936f.yaml
./poc/cve/CVE-2023-50831-77e73bd17d0d01098051e07e0b0408e8.yaml
./poc/cve/CVE-2023-50831.yaml
./poc/cve/CVE-2023-50832-6ba1a3c0062d43bf5d716d12217d80de.yaml
./poc/cve/CVE-2023-50832.yaml
Expand Down Expand Up @@ -33707,6 +33708,7 @@
./poc/cve/CVE-2024-10168.yaml
./poc/cve/CVE-2024-10176-5fa3a3e54fe7dc27a4441a8eb1a55212.yaml
./poc/cve/CVE-2024-10176.yaml
./poc/cve/CVE-2024-10179-99e78b7be5cf73a1cef31eb112268c96.yaml
./poc/cve/CVE-2024-10180-cda9906f3b0afcef720a2edb145ba669.yaml
./poc/cve/CVE-2024-10180.yaml
./poc/cve/CVE-2024-10181-21fdb15695068521f367ac81bba91927.yaml
Expand All @@ -33732,6 +33734,7 @@
./poc/cve/CVE-2024-10232.yaml
./poc/cve/CVE-2024-10233-3e88623b9f3ddb06e9ba90e1e3bb7a8a.yaml
./poc/cve/CVE-2024-10233.yaml
./poc/cve/CVE-2024-10245-36e3bfba2394d4b95bdad2a14d8741f6.yaml
./poc/cve/CVE-2024-10250-381303a6df453508271ce4a14d6f5e15.yaml
./poc/cve/CVE-2024-10250.yaml
./poc/cve/CVE-2024-10261-13a111b77ff7242b7fd206b696ded4b9.yaml
Expand All @@ -33756,6 +33759,7 @@
./poc/cve/CVE-2024-10312.yaml
./poc/cve/CVE-2024-10319-5c0b2e6241c7af29d146faf4b6581f3b.yaml
./poc/cve/CVE-2024-10319.yaml
./poc/cve/CVE-2024-10323-3b68b4ce641de125944f01ebe9a88071.yaml
./poc/cve/CVE-2024-10325-402ce314182729d314273aac0547c13d.yaml
./poc/cve/CVE-2024-10325.yaml
./poc/cve/CVE-2024-10329-674336a2b18a0cf5dc2e5e17857d1636.yaml
Expand Down Expand Up @@ -33831,6 +33835,7 @@
./poc/cve/CVE-2024-1053.yaml
./poc/cve/CVE-2024-10535-b51eb8fc6cda61a894f8bb87a3120536.yaml
./poc/cve/CVE-2024-10535.yaml
./poc/cve/CVE-2024-10538-e25c635226b8822742424808d5a8c71a.yaml
./poc/cve/CVE-2024-1054-eba02697b8618c6807b4eae794b59362.yaml
./poc/cve/CVE-2024-1054.yaml
./poc/cve/CVE-2024-10540-c51c8b8ffe37ad945de4a85718f3c6a4.yaml
Expand Down Expand Up @@ -33873,6 +33878,7 @@
./poc/cve/CVE-2024-10667.yaml
./poc/cve/CVE-2024-10669-49437bffcf6782e8d80520956dcb05d6.yaml
./poc/cve/CVE-2024-10669.yaml
./poc/cve/CVE-2024-10672-f06b560779936067922e4ff20bfd967c.yaml
./poc/cve/CVE-2024-10673-682d2c4bd20eb7eb32fe9db89c67f59d.yaml
./poc/cve/CVE-2024-10673.yaml
./poc/cve/CVE-2024-10674-d13865d5abb138523bd7d89fc89087c4.yaml
Expand All @@ -33881,6 +33887,7 @@
./poc/cve/CVE-2024-1068.yaml
./poc/cve/CVE-2024-10683-734140ef8839eb2d2a43ce550e9b8229.yaml
./poc/cve/CVE-2024-10683.yaml
./poc/cve/CVE-2024-10685-c8410ba9f508a91574cf975f6a6e1bbc.yaml
./poc/cve/CVE-2024-10687-d9989207d8a257bce53d182b8cda1c6d.yaml
./poc/cve/CVE-2024-10687.yaml
./poc/cve/CVE-2024-10688-4e865d55bfaf7ccff8ab4229b44e4c7b.yaml
Expand All @@ -33889,6 +33896,7 @@
./poc/cve/CVE-2024-1069.yaml
./poc/cve/CVE-2024-10693-c432d0b08f287a25140732c41d4a1ed1.yaml
./poc/cve/CVE-2024-10693.yaml
./poc/cve/CVE-2024-10695-d3f51a21505172dd3b75517abc1cda80.yaml
./poc/cve/CVE-2024-1070-2eaf969a3130409b034463b1e7ec7297.yaml
./poc/cve/CVE-2024-1070.yaml
./poc/cve/CVE-2024-10709-645acc80e460ffaad4f2931d5b432c17.yaml
Expand Down Expand Up @@ -33919,6 +33927,7 @@
./poc/cve/CVE-2024-1078.yaml
./poc/cve/CVE-2024-1079-1f12a336fd8362a1410d8995316f8026.yaml
./poc/cve/CVE-2024-1079.yaml
./poc/cve/CVE-2024-10790-115f35b4ad03b79cf9acee5edbae6dbb.yaml
./poc/cve/CVE-2024-1080-15318692234db11db0354155dd2f2282.yaml
./poc/cve/CVE-2024-1080.yaml
./poc/cve/CVE-2024-10801-59de47daf066d816c4d3a83b622ff763.yaml
Expand Down Expand Up @@ -40310,6 +40319,7 @@
./poc/cve/CVE-2024-38754-65c2208a89aab96cef4d108cef0be6fa.yaml
./poc/cve/CVE-2024-38754.yaml
./poc/cve/CVE-2024-38755-7411e64257ef418f9a4ff87b51f1bf51.yaml
./poc/cve/CVE-2024-38755-7d6dd53633f501284caca205917bb5e1.yaml
./poc/cve/CVE-2024-38755.yaml
./poc/cve/CVE-2024-38756-4901b973fc2703f401795015aea1655f.yaml
./poc/cve/CVE-2024-38756.yaml
Expand Down Expand Up @@ -42574,6 +42584,7 @@
./poc/cve/CVE-2024-49282-0303046377b12f014a91091c734e2e0b.yaml
./poc/cve/CVE-2024-49282-d08e420b69010710310ea59a07a28cb1.yaml
./poc/cve/CVE-2024-49282.yaml
./poc/cve/CVE-2024-49283-26576d539cf7cb10c221ba5437921160.yaml
./poc/cve/CVE-2024-49283-68f719c6344779fd11aa82ffe21e5d50.yaml
./poc/cve/CVE-2024-49283.yaml
./poc/cve/CVE-2024-49284-9c39a2881f2176d918c5784e1b99d70f.yaml
Expand Down Expand Up @@ -42601,6 +42612,7 @@
./poc/cve/CVE-2024-49296-ca08bbfc39e062f2c467c208a7177469.yaml
./poc/cve/CVE-2024-49296.yaml
./poc/cve/CVE-2024-49297-0506f4dacc10b626d9746496f1a40270.yaml
./poc/cve/CVE-2024-49297-2b687332347dfd5b292dced99cf8e7bc.yaml
./poc/cve/CVE-2024-49297.yaml
./poc/cve/CVE-2024-49298-81e113b77c7c960bb675069b8beb06f9.yaml
./poc/cve/CVE-2024-49298.yaml
Expand Down Expand Up @@ -43101,6 +43113,7 @@
./poc/cve/CVE-2024-50495-2562bb77e0a0fe5aad5022769d9bafec.yaml
./poc/cve/CVE-2024-50495.yaml
./poc/cve/CVE-2024-50496-530ff7fb4220f36522315aa8d600f273.yaml
./poc/cve/CVE-2024-50496-b371e5cc96a6339b95b333f607d85063.yaml
./poc/cve/CVE-2024-50496.yaml
./poc/cve/CVE-2024-50497-2703b05004790365fa73ddfc8c3938b8.yaml
./poc/cve/CVE-2024-50497.yaml
Expand Down Expand Up @@ -43366,6 +43379,7 @@
./poc/cve/CVE-2024-51625.yaml
./poc/cve/CVE-2024-51626-d9451db8814df75c961c880144a9d04b.yaml
./poc/cve/CVE-2024-51626.yaml
./poc/cve/CVE-2024-51627-1a2f197165f799b2b8827a1b9c1c6d42.yaml
./poc/cve/CVE-2024-51627-bb75f5e46d7f0f1ff4cc66453be7d241.yaml
./poc/cve/CVE-2024-51627.yaml
./poc/cve/CVE-2024-51628-ebbb99cca2116982e3a944f33d25b5fd.yaml
Expand Down Expand Up @@ -45759,6 +45773,7 @@
./poc/cve/CVE-2024-9352.yaml
./poc/cve/CVE-2024-9353-9de693d4e41071f01a7ec1909bb538f7.yaml
./poc/cve/CVE-2024-9353.yaml
./poc/cve/CVE-2024-9357-c4db257cbb3582805d4e4a79e0374022.yaml
./poc/cve/CVE-2024-9361-ae08a2363aeae9e478390a36b3137512.yaml
./poc/cve/CVE-2024-9361.yaml
./poc/cve/CVE-2024-9364-247afd95e97573e50cc26fa4abafe629.yaml
Expand Down Expand Up @@ -45835,6 +45850,7 @@
./poc/cve/CVE-2024-9465.yaml
./poc/cve/CVE-2024-9475-d454aa0f8e831ad96768c0f42bd26d3a.yaml
./poc/cve/CVE-2024-9475.yaml
./poc/cve/CVE-2024-9487.yaml
./poc/cve/CVE-2024-9488-71bbc14254aeeb3532913cac8f75c128.yaml
./poc/cve/CVE-2024-9488.yaml
./poc/cve/CVE-2024-9501-75b9d56a40fe1396bb3b9ef1c7d11ff3.yaml
Expand Down Expand Up @@ -45918,6 +45934,7 @@
./poc/cve/CVE-2024-9610.yaml
./poc/cve/CVE-2024-9611-e3d072056298fd4e81d4dfecee6ae07e.yaml
./poc/cve/CVE-2024-9611.yaml
./poc/cve/CVE-2024-9613-34d52f215d262d91ee2a7e025d6f5179.yaml
./poc/cve/CVE-2024-9613-749d376baf8bd777cc22e9c75fddf8e1.yaml
./poc/cve/CVE-2024-9613.yaml
./poc/cve/CVE-2024-9616-74cbb74314a998222d17f0108bdd1b47.yaml
Expand Down Expand Up @@ -65155,6 +65172,7 @@
./poc/open_redirect/caddy-open-redirect-836.yaml
./poc/open_redirect/caddy-open-redirect-837.yaml
./poc/open_redirect/caddy-open-redirect.yaml
./poc/open_redirect/cf7-redirect-thank-you-page-4e62d702840163dd602f2ce41676d78a.yaml
./poc/open_redirect/cf7-redirect-thank-you-page-ea1e6381dbae7882ca5c498271c956f8.yaml
./poc/open_redirect/cf7-redirect-thank-you-page.yaml
./poc/open_redirect/custom-login-redirect-065cab9298d59d25ad6e368755cf2c99.yaml
Expand Down Expand Up @@ -78815,6 +78833,7 @@
./poc/other/admin-side-data-storage-for-contact-form-7-ed9faf8f1ab136ae7625ad15dcbe2644.yaml
./poc/other/admin-side-data-storage-for-contact-form-7.yaml
./poc/other/admin-site-enhancements-79589d0ea9816223a68a2d499e59f99f.yaml
./poc/other/admin-site-enhancements-7ce7b5fee30c82bebc0bd0014aecc874.yaml
./poc/other/admin-site-enhancements.yaml
./poc/other/admin-trim-interface-348ce0962023cf1f1cc4a5f4973fe3f7.yaml
./poc/other/admin-trim-interface.yaml
Expand Down Expand Up @@ -91898,6 +91917,7 @@
./poc/other/happy-elementor-addons-47b6615804f43fb7cca256b1f1e3e8fb.yaml
./poc/other/happy-elementor-addons-52501450fa724fb947f1eecbba7f7628.yaml
./poc/other/happy-elementor-addons-55347e9ac58126992d50d45693e54288.yaml
./poc/other/happy-elementor-addons-58fc68d33029a13992692df3b49a9006.yaml
./poc/other/happy-elementor-addons-5bf2507a24baf8cead858a7cded61be9.yaml
./poc/other/happy-elementor-addons-5cede0d281193ad0a23c9783f0ab6047.yaml
./poc/other/happy-elementor-addons-621a86ac69fc43f58c97e1a34ee9115f.yaml
Expand Down Expand Up @@ -93856,6 +93876,7 @@
./poc/other/jetwidgets-for-elementor-128e35efbb2d241525a7693a04a51c32.yaml
./poc/other/jetwidgets-for-elementor-4874353f40e4476ee478bc5de4247381.yaml
./poc/other/jetwidgets-for-elementor-577d0584727a1a98e242584484994725.yaml
./poc/other/jetwidgets-for-elementor-7148cffd0e2a52538c2306f3a2cf4ab1.yaml
./poc/other/jetwidgets-for-elementor-a2fe4ce9d736fad42c3860a5c4e30ad0.yaml
./poc/other/jetwidgets-for-elementor-faf0864005babbc64b01b03c2d125141.yaml
./poc/other/jetwidgets-for-elementor.yaml
Expand Down Expand Up @@ -97358,6 +97379,7 @@
./poc/other/multiple-pages-generator-by-porthas-1584c8fc63e37d0a2ddfe8a3faec9555.yaml
./poc/other/multiple-pages-generator-by-porthas-3b964e78e064e5d87c753341b4c801ca.yaml
./poc/other/multiple-pages-generator-by-porthas-3bd0524a19604fd1e505d173a760ec1e.yaml
./poc/other/multiple-pages-generator-by-porthas-4280a6e6af5e0e4d6713144988b88741.yaml
./poc/other/multiple-pages-generator-by-porthas-67139a45838f60d90b17050a692e27f3.yaml
./poc/other/multiple-pages-generator-by-porthas-69b3ea1ce6a839499bbbb5dd62b9b12c.yaml
./poc/other/multiple-pages-generator-by-porthas-6b0febdfb7549dc5cc367667a054034c.yaml
Expand Down Expand Up @@ -104874,6 +104896,7 @@
./poc/other/sliced-invoices-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml
./poc/other/sliced-invoices-plugin.yaml
./poc/other/sliced-invoices.yaml
./poc/other/slick-engagement-7fe8e0ee434256ec0735b9adf674b56d.yaml
./poc/other/slick-popup-367b1d0ae28d236a263c69fc6d21a912.yaml
./poc/other/slick-popup-d0150a99caaa6248301d6fa79ded5a4a.yaml
./poc/other/slick-popup-plugin-d41d8cd98f00b204e9800998ecf8427e.yaml
Expand Down Expand Up @@ -111378,6 +111401,7 @@
./poc/other/xhlis-oa.yaml
./poc/other/xiaomayi.yaml
./poc/other/xiaonaodai.yaml
./poc/other/xili-tidy-tags-8fd8cfc9ba7e2d33a1f1244b5fd78ebc.yaml
./poc/other/xili-tidy-tags-f8a72bec1f59269b16faebdabb35356f.yaml
./poc/other/xili-tidy-tags.yaml
./poc/other/xing.yaml
Expand Down Expand Up @@ -115288,6 +115312,7 @@
./poc/remote_code_execution/vmware-vcenter-unauthorized-rce-cve-2021-21972.yaml
./poc/remote_code_execution/vmware-vcenter-unauthorized-rce-cve-2021-21972.yml
./poc/remote_code_execution/vmware-workspace-one-log4j-rce.yaml
./poc/remote_code_execution/voipmonitor-rce.yaml
./poc/remote_code_execution/voipmonitorrce-220331-222339.yaml
./poc/remote_code_execution/voiprce(1).yaml
./poc/remote_code_execution/voiprce.yaml
Expand Down Expand Up @@ -120076,6 +120101,7 @@
./poc/sql/CVE-2024-10710-d2fbfd03c3d5939dbb6d102830eb5fa9.yaml
./poc/sql/CVE-2024-10711-67db13badffeeb4f5ca81cc9213c6c29.yaml
./poc/sql/CVE-2024-1076-9a7188ec2ba0e2d447a5f9982f48db9b.yaml
./poc/sql/CVE-2024-10790-115f35b4ad03b79cf9acee5edbae6dbb.yaml
./poc/sql/CVE-2024-1080-15318692234db11db0354155dd2f2282.yaml
./poc/sql/CVE-2024-1090-a9aeeecd0f05b7b98544db6b38f584fb.yaml
./poc/sql/CVE-2024-1095-741eaa5507c75edbe90bc3ba4e40e5a9.yaml
Expand Down Expand Up @@ -120784,6 +120810,7 @@
./poc/sql/CVE-2024-9225-8aa496476e08c8c664db47cbf34e8cf4.yaml
./poc/sql/CVE-2024-9228-b8423e6fcac2024db44fa444099a9f5b.yaml
./poc/sql/CVE-2024-9231-db808094493fa9c79c27a8695747553b.yaml
./poc/sql/CVE-2024-9357-c4db257cbb3582805d4e4a79e0374022.yaml
./poc/sql/CVE-2024-9376-dbbbe5df90e59d17c7c7d8c8dd600952.yaml
./poc/sql/CVE-2024-9382-4e97289b6d15924ff13ebdb1ff9d487d.yaml
./poc/sql/CVE-2024-9505-bbf8db303ac965c608b6fcb6b5637bca.yaml
Expand Down Expand Up @@ -122776,6 +122803,7 @@
./poc/sql/fushion-theme-f5f50455a3255db857081d4e726d3048.yaml
./poc/sql/fusion-builder-fde4dbc1536b247a205ddac8a2a684c9.yaml
./poc/sql/fusionspan-impexium-single-sign-on-6477bf18cad6c823db485408d49b337b.yaml
./poc/sql/futurio-extra-1bd8c631efc74bc4fb81bca4148f51db.yaml
./poc/sql/futurio-extra-926af7d5ab965db39088747d2566cc39.yaml
./poc/sql/fuzz-sqli-detection.yaml
./poc/sql/fv-wordpress-flowplayer-16a8cdccb2f9e3068f83db4e3063e970.yaml
Expand Down Expand Up @@ -124158,6 +124186,7 @@
./poc/sql/regenerate-post-permalinks-cdb1afad2999a79a78d3dcf11d21d6c6.yaml
./poc/sql/register-plus-22264db95da9196d43a1bdf2e5521ff8.yaml
./poc/sql/register-plus-redux-bfa960a7de764bc4ebc9934add9db5eb.yaml
./poc/sql/relais-2fa-4e63bf8535f0db922ef9a969b49392a2.yaml
./poc/sql/related-posts-d735a79e2fa282de80b5a7aabcc877db.yaml
./poc/sql/related-posts-for-wp-e8355991c166a9db9087416fb98054c7.yaml
./poc/sql/relevanssi-083c1e79640f4f1eb036db49a088252d.yaml
Expand Down
59 changes: 59 additions & 0 deletions poc/cve/CVE-2023-50831-77e73bd17d0d01098051e07e0b0408e8.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2023-50831-77e73bd17d0d01098051e07e0b0408e8

info:
name: >
CURCY – Multi Currency for WooCommerce <= 2.2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
author: topscoder
severity: low
description: >
The CURCY – Multi Currency for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.2.0.1 due to insufficient input sanitization and output escaping on user supplied input. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7b7dee9e-1272-4e70-926c-a73e2897968c?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2023-50831
metadata:
fofa-query: "wp-content/plugins/woo-multi-currency/"
google-query: inurl:"/wp-content/plugins/woo-multi-currency/"
shodan-query: 'vuln:CVE-2023-50831'
tags: cve,wordpress,wp-plugin,woo-multi-currency,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/woo-multi-currency/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "woo-multi-currency"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.2.0.1')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10179-99e78b7be5cf73a1cef31eb112268c96.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10179-99e78b7be5cf73a1cef31eb112268c96

info:
name: >
Slickstream: Engagement and Conversions <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via slick-grid Shortcode
author: topscoder
severity: low
description: >
The Slickstream: Engagement and Conversions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's slick-grid shortcode in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/28216197-20b4-4d12-a610-661dca6fbbf2?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-10179
metadata:
fofa-query: "wp-content/plugins/slick-engagement/"
google-query: inurl:"/wp-content/plugins/slick-engagement/"
shodan-query: 'vuln:CVE-2024-10179'
tags: cve,wordpress,wp-plugin,slick-engagement,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/slick-engagement/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "slick-engagement"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.4.4')
Loading

0 comments on commit 01ecb24

Please sign in to comment.