This gist gather a list of log4shell payloads seen on my twitter feeds.
💨 I will update it every time I see new payloads.
The goal is to allows testing detection regexes defined in protection systems.
id: CVE-2002-0561 | |
info: | |
name: Oracle 9iAS PL/SQL Gateway Web Admin Interface Null Authentication | |
author: Segfolt | |
severity: High | |
requests: | |
- method: GET | |
path: |
id: CVE-2023-36845 | |
info: | |
name: Juniper Networks Junos OS PHP External Variable Modification Vulnerability | |
author: hxlxmj | |
severity: medium | |
description: | | |
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain environments variables. | |
reference: | |
- https://nvd.nist.gov/vuln/detail/CVE-2023-36845 |
id: CVE-2017-12542 | |
info: | |
name: iLO 4 < 2.53 - Add New Administrator User | |
author: segfolt | |
severity: High | |
# Exploit Source: https://www.exploit-db.com/exploits/44005 | |
# Reference: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf03769en_us | |
requests: | |
- raw: |
id: nacos-bypass-authentication | |
variables: | |
#token: eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6OTk5OTk5OTk5OTl9.vqhkMLKmquQ6R5AD6VWrTOqgClC599nnAQgQLHhPcLc | |
# token is signed with a very long time expire. | |
# token exp -1 | |
token: eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJuYWNvcyIsImV4cCI6LTF9.ybUomrBRXZhbUMWVgXRz3Q6zndbF-Zdk4RGpCnV-Ofs | |
info: | |
name: Nacos Bypass Auth with default jwt secret |
id: CVE-2022-21449 | |
info: | |
name: CVE-2022-21449 test exposure | |
description: The JDK 15-18 have a vulnerability in validation of ECDSA signature so this template detect exposure to CVE-2022-21449 by the JWT validation API in place. | |
author: righettod | |
severity: info | |
tags: cve,2022,java | |
reference: https://neilmadden.blog/2022/04/19/psychic-signatures-in-java |
id: ssrf-via-oauth-misconfig | |
info: | |
name: SSRF due to misconfiguration in OAuth | |
author: KabirSuda | |
severity: medium | |
description: Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters. | |
tags: misconfig,oob,oauth | |
reference: https://portswigger.net/research/hidden-oauth-attack-vectors |
id: maltrail-os-command-injection | |
info: | |
author: Esonhugh | |
name: Unauthenticated OS Command Injection in stamparm/maltrail | |
severity: critical | |
description: | | |
Maltrail <= v0.54 is vulnerable to unauthenticated OS command injection during the login process. | |
reference: | |
- "https://huntr.dev/bounties/be3c5204-fbd9-448d-b97c-96a8d2941e87/" |
id: header-injection | |
info: | |
name: Header SSRF Injection | |
author: nullrabbit | |
severity: high | |
description: Fuzzing headers for OOB SSRF | |
tags: fuzz,ssrf | |
requests: |
id: nuclei-rce | |
info: | |
name: Nuclei Template RCE by Chromium | |
author: c3l3si4n | |
severity: critical | |
tags: rce,hackback | |
headless: | |
- steps: |
This gist gather a list of log4shell payloads seen on my twitter feeds.
💨 I will update it every time I see new payloads.
The goal is to allows testing detection regexes defined in protection systems.