Skip to content

Commit

Permalink
Chores: wordpress plugins versions, Nuclei translations, Nuclei skipp…
Browse files Browse the repository at this point in the history
…ed templates (#1305)
  • Loading branch information
kazet authored Oct 7, 2024
1 parent 1380c7b commit 7577f0e
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 0 deletions.
1 change: 1 addition & 0 deletions artemis/config.py
Original file line number Diff line number Diff line change
Expand Up @@ -468,6 +468,7 @@ class Nuclei:
"http/cves/2023/CVE-2023-24044.yaml",
# Open Redirect in Referer, X-Forwarded-Host or another header making it hard to exploit
"http/vulnerabilities/wordpress/music-store-open-redirect.yaml",
"http/cves/2020/CVE-2020-15129.yaml",
"http/cves/2021/CVE-2021-44528.yaml",
# Minor information leaks
"http/cves/2017/CVE-2017-5487.yaml",
Expand Down
2 changes: 2 additions & 0 deletions artemis/modules/wordpress_plugins.py
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@
"wp-members",
"wordpress-popup",
"backwpup",
"social-pug",
"yith-woocommerce-catalog-mode",
"wppao-sitemap",
]
Expand All @@ -55,6 +56,7 @@
PLUGINS_BAD_VERSION_IN_README = [
"blocks-animation",
"change-admin-email-setting-without-outbound-email",
"clearfy",
"coming-soon",
"delete-all-comments-of-website",
"disable-remove-google-fonts",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -997,6 +997,8 @@
"Unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.": "Wtyczka WordPress o nazwie ThemePunch OHG Essential Grid w wersji do 3.1.0 włącznie zawiera podatność "
+ REFLECTED_XSS_DESCRIPTION
+ WORDPRESS_UPDATE_HINT,
"PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.": "PlaceOS Authentication Service w wersji poniżej 1.29.10.0 zawiera podatność Open Redirect, umożliwiającą atakującemu spreparowanie linku w Państwa domenie który przekierowuje do dowolnej innej strony, w tym np. zawierającej szkodliwe oprogramowanie."
+ UPDATE_HINT,
"GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. GeoServer includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore *encode functions* setting to mitigate ``strEndsWith``, ``strStartsWith`` and ``PropertyIsLike `` misuse and enable the PostGIS DataStore *preparedStatements* setting to mitigate the ``FeatureId`` misuse.": "GeoServer w wersji poniżej 2.21.4 umożliwia atakującemu wykonywanie dowolnych kwerend."
+ UPDATE_HINT,
"Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, and earlier unsupported versions contain a cross-site scripting vulnerability via the redirect_uri parameter.": "System Moodle w wersji od 3.10 do 3.10.3, 3.9 do 3.9.6, 3.8 do 3.8.8 i wcześniejszych niewspieranych wersjach zawiera podatność "
Expand Down Expand Up @@ -1486,4 +1488,5 @@
"kiali panel was detected.": "wykryto panel kiali.",
"[no description] http/exposed-panels/qBittorrent-panel.yaml": "wykryto panel qBittorrent.",
"RabbitMQ Management panel was detected.": "Wykryto panel RabbitMQ Management.",
"Nexus login panel was detected.": "Wykryto panel logowania systemu Nexus.",
}

0 comments on commit 7577f0e

Please sign in to comment.