mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 11:18:06 +00:00
webapps conflict with eachother since they accept any virtualhost name
This commit is contained in:
@@ -49,6 +49,11 @@
|
||||
<msf_module>exploit/linux/http/gitlist_exec</msf_module>
|
||||
<hint>Visit the webapp in a browser at: ip:80/gitlist </hint>
|
||||
|
||||
<!-- can't live alongside other web sites, since they it accepts any virtual host name -->
|
||||
<conflict>
|
||||
<type>webapp</type>
|
||||
</conflict>
|
||||
|
||||
<requires>
|
||||
<module_path>.*apache.*compatible.*</module_path>
|
||||
</requires>
|
||||
|
||||
@@ -33,6 +33,7 @@
|
||||
<value>80</value>
|
||||
</default_input>
|
||||
|
||||
<!-- TODO: should strings_to_leak be hidden away on the server, so the exploit needs exploiting before getting to the files, at the moment browsing to the website reveals the files -->
|
||||
<default_input into="strings_to_leak">
|
||||
<value>This is some leaked data.</value>
|
||||
<generator type="message_generator"/>
|
||||
@@ -69,6 +70,11 @@
|
||||
Path traversal found in AttachFile module.
|
||||
</solution>
|
||||
|
||||
<!-- can't live alongside other web sites, since they it accepts any virtual host name -->
|
||||
<conflict>
|
||||
<type>webapp</type>
|
||||
</conflict>
|
||||
|
||||
<conflict>
|
||||
<name>.*Stretch.*</name>
|
||||
</conflict>
|
||||
@@ -79,4 +85,4 @@
|
||||
</requires>
|
||||
|
||||
|
||||
</vulnerability>
|
||||
</vulnerability>
|
||||
|
||||
@@ -143,6 +143,11 @@
|
||||
<module_path>modules/bases/kali.*</module_path>
|
||||
</conflict>
|
||||
|
||||
<!-- can't live alongside other web sites, since they it accepts any virtual host name -->
|
||||
<conflict>
|
||||
<type>webapp</type>
|
||||
</conflict>
|
||||
|
||||
<requires>
|
||||
<module_path>.*apache.*compatible.*</module_path>
|
||||
</requires>
|
||||
|
||||
Reference in New Issue
Block a user