mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 11:18:06 +00:00
moved parameterised_website from vulnerabilities to services
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
<?xml version="1.0"?>
|
||||
<vulnerability xmlns="http://www.github/cliffe/SecGen/vulnerability"
|
||||
<service xmlns="http://www.github/cliffe/SecGen/service"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability">
|
||||
xsi:schemaLocation="http://www.github/cliffe/SecGen/service">
|
||||
|
||||
<name>Random Parameterised Website</name>
|
||||
<author>Thomas Shaw</author>
|
||||
@@ -9,8 +9,6 @@
|
||||
<description>Parameterised website filled with SecGen generated content.</description>
|
||||
|
||||
<type>webapp</type>
|
||||
<privilege>info_leak</privilege>
|
||||
<access>remote</access>
|
||||
<platform>linux</platform>
|
||||
|
||||
<read_fact>strings_to_leak</read_fact>
|
||||
@@ -97,4 +95,4 @@
|
||||
<module_path>modules/services/unix/http/apache</module_path>
|
||||
</requires>
|
||||
|
||||
</vulnerability>
|
||||
</service>
|
||||
@@ -11,7 +11,7 @@
|
||||
|
||||
<!-- comment describes using pseudo code (C#-like methods with named optional arguments) -->
|
||||
<!-- vulnerability_nfs_share_leak(strings_to_leak: encoder_flag_generator() CONCAT encoder_ascii_reversable(strings_to_encode: encoder_flag_generator()) CONCAT ...) -->
|
||||
<vulnerability name="Random Parameterised Website">
|
||||
<service name="Random Parameterised Website">
|
||||
<input into="visible_tabs">
|
||||
<generator type="html_snippet_generator" >
|
||||
<input into="heading">
|
||||
@@ -122,7 +122,7 @@
|
||||
</input>
|
||||
</generator>
|
||||
</input>
|
||||
</vulnerability>
|
||||
</service>
|
||||
|
||||
<!-- Remote privilege escalation -->
|
||||
<vulnerability read_fact="strings_to_leak" access="remote" privilege="user_rwx">
|
||||
|
||||
@@ -120,7 +120,7 @@
|
||||
|
||||
<!-- FEED GENERATED 'BUSINESS' DATA ABOVE INTO VULNERABILITY MODULES. -->
|
||||
|
||||
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<input into="business_name">
|
||||
<datastore>business_name</datastore>
|
||||
</input>
|
||||
@@ -145,7 +145,7 @@
|
||||
<input into="product_name">
|
||||
<datastore>product_name</datastore>
|
||||
</input>
|
||||
</vulnerability>
|
||||
</service>
|
||||
|
||||
<network type="private_network" range="dhcp"/>
|
||||
</system>
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
<system_name>web_server</system_name>
|
||||
<base platform="linux"/>
|
||||
|
||||
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website"/>
|
||||
<service module_path="vulnerabilities/unix/webapp/parameterised_website"/>
|
||||
|
||||
<network type="private_network" range="dhcp"/>
|
||||
</system>
|
||||
|
||||
@@ -89,7 +89,7 @@
|
||||
</generator>
|
||||
</input>
|
||||
|
||||
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<input into="business_name">
|
||||
<datastore>business_name</datastore>
|
||||
</input>
|
||||
@@ -121,7 +121,7 @@
|
||||
<input into="product_name" into_datastore="product_name">
|
||||
<generator type="product"/>
|
||||
</input>
|
||||
</vulnerability>
|
||||
</service>
|
||||
|
||||
<vulnerability privilege="user_rwx" access="remote" type="^((?!webapp).)*$">
|
||||
<input into="business_domain">
|
||||
@@ -182,7 +182,7 @@
|
||||
</input>
|
||||
</vulnerability>
|
||||
|
||||
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
|
||||
<input into="host_acceptable_use_policy">
|
||||
<value>true</value>
|
||||
</input>
|
||||
@@ -221,7 +221,7 @@
|
||||
<input into="product_name">
|
||||
<datastore>product_name</datastore>
|
||||
</input>
|
||||
</vulnerability>
|
||||
</service>
|
||||
|
||||
<service/>
|
||||
<service/>
|
||||
|
||||
Reference in New Issue
Block a user