From 9ec9277d131e673fc06c651973708a6b7b0ffb78 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Thu, 20 Apr 2023 11:01:08 +0100 Subject: [PATCH] metadata and tidy for #250 glpi --- .../glpi_php_injection/secgen_metadata.xml | 25 +++++++++++++------ 1 file changed, 18 insertions(+), 7 deletions(-) diff --git a/modules/vulnerabilities/unix/http/glpi_php_injection/secgen_metadata.xml b/modules/vulnerabilities/unix/http/glpi_php_injection/secgen_metadata.xml index cc2152704..514a4cce5 100644 --- a/modules/vulnerabilities/unix/http/glpi_php_injection/secgen_metadata.xml +++ b/modules/vulnerabilities/unix/http/glpi_php_injection/secgen_metadata.xml @@ -3,7 +3,7 @@ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability"> - GLPI htmLawed php command injection - GLPI versions 10.0.2 and below + GLPI htmLawed php command injection - GLPI versions 10.0.2 and below - Unauthenticated James Davis MIT This @@ -13,19 +13,15 @@ http bruteforceable in_the_wild + user_rwx remote linux low port - organisation strings_to_leak leaked_filenames - known_username - known_password - strings_to_pre_leak - web_pre_leak_filename @@ -60,4 +56,19 @@ .*mysql.*compatible.* - \ No newline at end of file + + server-side misconfiguration and vulnerable components + Command injection + + + EXPLOITATION + EXPLOITATION FRAMEWORKS + + + CVEs and CWEs + + + PENETRATION TESTING - SOFTWARE TOOLS + PENETRATION TESTING - ACTIVE PENETRATION + +