Skip to content

Commit

Permalink
Merge branch 'master' into dependabot/github_actions/actions/checkout…
Browse files Browse the repository at this point in the history
…-4.1.1

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
  • Loading branch information
securestep9 authored Oct 31, 2023
2 parents faf711c + b1a4643 commit 0de31c6
Show file tree
Hide file tree
Showing 6 changed files with 158 additions and 9 deletions.
10 changes: 5 additions & 5 deletions core/load_modules.py
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,7 @@ def load_all_modules(limit=-1, full_details=False):
"""
# Search for Modules
from config import nettacker_paths
from core.utility import sort_dictonary
from core.utility import sort_dictionary
if full_details:
import yaml
module_names = {}
Expand All @@ -260,7 +260,7 @@ def load_all_modules(limit=-1, full_details=False):
if len(module_names) == limit:
module_names['...'] = {}
break
module_names = sort_dictonary(module_names)
module_names = sort_dictionary(module_names)
module_names['all'] = {}

return module_names
Expand All @@ -273,7 +273,7 @@ def load_all_profiles(limit=-1):
Returns:
an array of all profile names
"""
from core.utility import sort_dictonary
from core.utility import sort_dictionary
all_modules_with_details = load_all_modules(limit=limit, full_details=True)
profiles = {}
if '...' in all_modules_with_details:
Expand All @@ -287,11 +287,11 @@ def load_all_profiles(limit=-1):
else:
profiles[tag].append(key)
if len(profiles) == limit:
profiles = sort_dictonary(profiles)
profiles = sort_dictionary(profiles)
profiles['...'] = []
profiles['all'] = []
return profiles
profiles = sort_dictonary(profiles)
profiles = sort_dictionary(profiles)
profiles['all'] = []
return profiles

Expand Down
2 changes: 1 addition & 1 deletion core/utility.py
Original file line number Diff line number Diff line change
Expand Up @@ -563,7 +563,7 @@ def expand_step(step):
return [step]


def sort_dictonary(dictionary):
def sort_dictionary(dictionary):
etc_flag = '...' in dictionary
if etc_flag:
del dictionary['...']
Expand Down
43 changes: 43 additions & 0 deletions modules/scan/confluence_version.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
info:
name: confluence_version_scan
author: Jimmy Ly
severity: 3
description: Fetch Confluence version from target
reference:
profiles:
- scan
- http
- backup
- low_severity
- confluence
- atlassian

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/dashboard.action"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: or
conditions:
content:
regex: <span id=\'footer-build-information\'>(.+?)</span>
reverse: false
log: "response_dependent['content']"
54 changes: 54 additions & 0 deletions modules/vuln/citrix_cve_2023_4966.yaml

Large diffs are not rendered by default.

52 changes: 52 additions & 0 deletions modules/vuln/confluence_cve_2023_22515.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
info:
name: confluence_cve_2023_22515_vuln
author: Jimmy Ly
severity: 10
description: Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
reference:
- https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html
- https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis
- https://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html
- https://jira.atlassian.com/browse/CONFSERVER-92475
- https://www.cisa.gov/news-events/alerts/2023/10/05/cisa-adds-three-known-exploited-vulnerabilities-catalog
- https://nvd.nist.gov/vuln/detail/CVE-2023-22515
profiles:
- vuln
- vulnerability
- http
- critical_severity
- cve
- confluence
- atlassian

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{{user_agent}}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/dashboard.action"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
content:
regex: <span id=\'footer-build-information\'>8\.(0\.[0-4]|1\.[0-4]|2\.[0-3]|3\.[0-2]|4\.[0-2]|5\.[0-1])</span>
reverse: false
6 changes: 3 additions & 3 deletions tests/core/utility.test.py
Original file line number Diff line number Diff line change
Expand Up @@ -15,8 +15,8 @@ class UtilityTesting(unittest.TestCase):
This is the class that tests the utility module functions.
"""

def test_sort_dictonary(self):
"""Tests if the function sorts the input dictionary."""
def test_sort_dictionary(self):
"""Tests if the function sorts the input dictionary."""
input_dict = {
'a': 1,
'c': 3,
Expand All @@ -29,7 +29,7 @@ def test_sort_dictonary(self):
'c': 3,
'd': 23,
}
self.assertDictEqual(utility.sort_dictonary(input_dict), sorted_dict)
self.assertDictEqual(utility.sort_dictionary(input_dict), sorted_dict)

def test_select_maximum_cpu_core(self):
"""Tests if it selects the proper amount of cpu's"""
Expand Down

0 comments on commit 0de31c6

Please sign in to comment.