Skip to content

Commit 0de31c6

Browse files
authored
Merge branch 'master' into dependabot/github_actions/actions/checkout-4.1.1
Signed-off-by: Sam Stepanyan <[email protected]>
2 parents faf711c + b1a4643 commit 0de31c6

File tree

6 files changed

+158
-9
lines changed

6 files changed

+158
-9
lines changed

core/load_modules.py

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ def load_all_modules(limit=-1, full_details=False):
236236
"""
237237
# Search for Modules
238238
from config import nettacker_paths
239-
from core.utility import sort_dictonary
239+
from core.utility import sort_dictionary
240240
if full_details:
241241
import yaml
242242
module_names = {}
@@ -260,7 +260,7 @@ def load_all_modules(limit=-1, full_details=False):
260260
if len(module_names) == limit:
261261
module_names['...'] = {}
262262
break
263-
module_names = sort_dictonary(module_names)
263+
module_names = sort_dictionary(module_names)
264264
module_names['all'] = {}
265265

266266
return module_names
@@ -273,7 +273,7 @@ def load_all_profiles(limit=-1):
273273
Returns:
274274
an array of all profile names
275275
"""
276-
from core.utility import sort_dictonary
276+
from core.utility import sort_dictionary
277277
all_modules_with_details = load_all_modules(limit=limit, full_details=True)
278278
profiles = {}
279279
if '...' in all_modules_with_details:
@@ -287,11 +287,11 @@ def load_all_profiles(limit=-1):
287287
else:
288288
profiles[tag].append(key)
289289
if len(profiles) == limit:
290-
profiles = sort_dictonary(profiles)
290+
profiles = sort_dictionary(profiles)
291291
profiles['...'] = []
292292
profiles['all'] = []
293293
return profiles
294-
profiles = sort_dictonary(profiles)
294+
profiles = sort_dictionary(profiles)
295295
profiles['all'] = []
296296
return profiles
297297

core/utility.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -563,7 +563,7 @@ def expand_step(step):
563563
return [step]
564564

565565

566-
def sort_dictonary(dictionary):
566+
def sort_dictionary(dictionary):
567567
etc_flag = '...' in dictionary
568568
if etc_flag:
569569
del dictionary['...']
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
info:
2+
name: confluence_version_scan
3+
author: Jimmy Ly
4+
severity: 3
5+
description: Fetch Confluence version from target
6+
reference:
7+
profiles:
8+
- scan
9+
- http
10+
- backup
11+
- low_severity
12+
- confluence
13+
- atlassian
14+
15+
payloads:
16+
- library: http
17+
steps:
18+
- method: get
19+
timeout: 3
20+
headers:
21+
User-Agent: "{user_agent}"
22+
allow_redirects: false
23+
ssl: false
24+
url:
25+
nettacker_fuzzer:
26+
input_format: "{{schema}}://{target}:{{ports}}/dashboard.action"
27+
prefix: ""
28+
suffix: ""
29+
interceptors:
30+
data:
31+
schema:
32+
- "http"
33+
- "https"
34+
ports:
35+
- 80
36+
- 443
37+
response:
38+
condition_type: or
39+
conditions:
40+
content:
41+
regex: <span id=\'footer-build-information\'>(.+?)</span>
42+
reverse: false
43+
log: "response_dependent['content']"

modules/vuln/citrix_cve_2023_4966.yaml

Lines changed: 54 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
info:
2+
name: confluence_cve_2023_22515_vuln
3+
author: Jimmy Ly
4+
severity: 10
5+
description: Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
6+
reference:
7+
- https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html
8+
- https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis
9+
- https://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html
10+
- https://jira.atlassian.com/browse/CONFSERVER-92475
11+
- https://www.cisa.gov/news-events/alerts/2023/10/05/cisa-adds-three-known-exploited-vulnerabilities-catalog
12+
- https://nvd.nist.gov/vuln/detail/CVE-2023-22515
13+
profiles:
14+
- vuln
15+
- vulnerability
16+
- http
17+
- critical_severity
18+
- cve
19+
- confluence
20+
- atlassian
21+
22+
payloads:
23+
- library: http
24+
steps:
25+
- method: get
26+
timeout: 3
27+
headers:
28+
User-Agent: "{{user_agent}}"
29+
allow_redirects: false
30+
ssl: false
31+
url:
32+
nettacker_fuzzer:
33+
input_format: "{{schema}}://{target}:{{ports}}/dashboard.action"
34+
prefix: ""
35+
suffix: ""
36+
interceptors:
37+
data:
38+
schema:
39+
- "http"
40+
- "https"
41+
ports:
42+
- 80
43+
- 443
44+
response:
45+
condition_type: and
46+
conditions:
47+
status_code:
48+
regex: '200'
49+
reverse: false
50+
content:
51+
regex: <span id=\'footer-build-information\'>8\.(0\.[0-4]|1\.[0-4]|2\.[0-3]|3\.[0-2]|4\.[0-2]|5\.[0-1])</span>
52+
reverse: false

tests/core/utility.test.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ class UtilityTesting(unittest.TestCase):
1515
This is the class that tests the utility module functions.
1616
"""
1717

18-
def test_sort_dictonary(self):
19-
"""Tests if the function sorts the input dictionary."""
18+
def test_sort_dictionary(self):
19+
"""Tests if the function sorts the input dictionary."""
2020
input_dict = {
2121
'a': 1,
2222
'c': 3,
@@ -29,7 +29,7 @@ def test_sort_dictonary(self):
2929
'c': 3,
3030
'd': 23,
3131
}
32-
self.assertDictEqual(utility.sort_dictonary(input_dict), sorted_dict)
32+
self.assertDictEqual(utility.sort_dictionary(input_dict), sorted_dict)
3333

3434
def test_select_maximum_cpu_core(self):
3535
"""Tests if it selects the proper amount of cpu's"""

0 commit comments

Comments
 (0)