data/vulndb.rb in dap-0.0.4 vs data/vulndb.rb in dap-0.0.5
- old
+ new
@@ -78,6 +78,39 @@
['7.0', 'sp2'] => ['CVE-2003-0230', 'CVE-2003-0231', 'CVE-2003-0232', 'CVE-2004-1560'],
['7.0', 'sp3'] => ['CVE-2003-0230', 'CVE-2003-0231', 'CVE-2003-0232', 'CVE-2004-1560'],
['7.0', 'sp4'] => ['CVE-2003-0230', 'CVE-2003-0231', 'CVE-2003-0232', 'CVE-2004-1560', 'CVE-2008-0085', 'CVE-2008-0086', 'CVE-2008-0106', 'CVE-2008-0107'],
}
}],
+
+ :http => [
+ #### ELASTICSEARCH RCE
+ {
+ # direct shellcommand elastic rce
+ :match => [
+ ['http.path', '/_search'],
+ ['http.body', 'script_fields'],
+ ['http.body', 'java.lang.Runtime'],
+ ['http.body', 'getRuntime()'],
+ ],
+ :cve => ['VULN-ELASTICSEARCH-RCE', 'CVE-2014-3120']
+ },{
+ # this just adds another tag as it's most likely done with metasploit
+ :match => [
+ ['http.path', '/_search'],
+ ['http.body', 'script_fields'],
+ ['http.body', 'metasploit.Payload'],
+ ],
+ :cve => ['VULN-ELASTICSEARCH-RCE', 'METASPLOIT']
+ }] + [
+ #### PHP CGI
+ {
+ :match => [
+ ['http.path', '/cgi-bin/php'],
+ ],
+ :cve => ['VULN-PHPCGI']
+ },{
+ :match => [
+ ['http.path', '/cgi-bin/authLogin.cgi'],
+ ],
+ :cve => ['VULN-QNAP-SHELLSHOCK']
+ }],
}