Skip to content

Commit 14c05e8

Browse files
Merge branch 'main' into patch-1
2 parents b05a784 + 7108e38 commit 14c05e8

File tree

266 files changed

+2264
-636
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

266 files changed

+2264
-636
lines changed

.github/workflows/tests.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ jobs:
3232
needs: lint
3333
runs-on: ubuntu-latest
3434
if: github.repository == 'projectdiscovery/nuclei-templates'
35+
permissions:
36+
issues: write
37+
pull-requests: write
3538
env:
3639
HONEYPOT_URL: 'http://honey.scanme.sh'
3740
steps:

.new-additions

Lines changed: 35 additions & 116 deletions
Original file line numberDiff line numberDiff line change
@@ -1,116 +1,35 @@
1-
cloud/aws/dms/dms-multi-az.yaml
2-
cloud/aws/dms/dms-public-access.yaml
3-
cloud/aws/dms/dms-version-upgrade.yaml
4-
cloud/aws/ebs/ebs-encryption-disabled.yaml
5-
cloud/aws/efs/efs-encryption-disabled.yaml
6-
cloud/aws/elasticache/cache-automatic-backups-disabled.yaml
7-
cloud/aws/elasticache/cache-event-notification-disabled.yaml
8-
cloud/aws/elasticache/cache-redis-encryption-disabled.yaml
9-
cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml
10-
cloud/aws/firehose/firehose-server-destination-encryption.yaml
11-
cloud/aws/firehose/firehose-server-side-encryption.yaml
12-
cloud/aws/guardduty/guardduty-findings.yaml
13-
cloud/aws/guardduty/guardduty-not-enabled.yaml
14-
cloud/aws/guardduty/malware-protection-disabled.yaml
15-
cloud/aws/guardduty/s3-protection-disabled.yaml
16-
cloud/aws/inspector2/inspector2-disabled.yaml
17-
cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml
18-
cloud/aws/rds/rds-automated-backup-disabled.yaml
19-
cloud/aws/rds/rds-backtrack-disabled.yaml
20-
cloud/aws/rds/rds-cluster-protection-disabled.yaml
21-
cloud/aws/rds/rds-copy-snap.yaml
22-
cloud/aws/rds/rds-insights-disabled.yaml
23-
cloud/aws/rds/rds-instance-autoscaling-disabled.yaml
24-
cloud/aws/rds/rds-log-export-disabled.yaml
25-
cloud/aws/rds/rds-multi-az.yaml
26-
cloud/aws/rds/rds-public-access.yaml
27-
cloud/aws/route53/route53-dns-query-disabled.yaml
28-
cloud/aws/route53/route53-dnssec-signing-disabled.yaml
29-
dast/cves/2024/CVE-2024-2961.yaml
30-
http/cnvd/2024/CNVD-2024-38747.yaml
31-
http/cves/2015/CVE-2015-8562.yaml
32-
http/cves/2016/CVE-2016-9299.yaml
33-
http/cves/2017/CVE-2017-5868.yaml
34-
http/cves/2018/CVE-2018-7192.yaml
35-
http/cves/2018/CVE-2018-7193.yaml
36-
http/cves/2018/CVE-2018-7196.yaml
37-
http/cves/2019/CVE-2019-8943.yaml
38-
http/cves/2021/CVE-2021-38156.yaml
39-
http/cves/2021/CVE-2021-45811.yaml
40-
http/cves/2023/CVE-2023-1315.yaml
41-
http/cves/2023/CVE-2023-1317.yaml
42-
http/cves/2023/CVE-2023-1318.yaml
43-
http/cves/2023/CVE-2023-2745.yaml
44-
http/cves/2023/CVE-2023-38040.yaml
45-
http/cves/2023/CVE-2023-39560.yaml
46-
http/cves/2023/CVE-2023-40748.yaml
47-
http/cves/2023/CVE-2023-40749.yaml
48-
http/cves/2023/CVE-2023-40750.yaml
49-
http/cves/2023/CVE-2023-40751.yaml
50-
http/cves/2023/CVE-2023-40752.yaml
51-
http/cves/2023/CVE-2023-40753.yaml
52-
http/cves/2023/CVE-2023-40755.yaml
53-
http/cves/2023/CVE-2023-40931.yaml
54-
http/cves/2023/CVE-2023-43373.yaml
55-
http/cves/2023/CVE-2023-5558.yaml
56-
http/cves/2023/CVE-2023-5561.yaml
57-
http/cves/2024/CVE-2024-22476.yaml
58-
http/cves/2024/CVE-2024-32735.yaml
59-
http/cves/2024/CVE-2024-32736.yaml
60-
http/cves/2024/CVE-2024-32737.yaml
61-
http/cves/2024/CVE-2024-32738.yaml
62-
http/cves/2024/CVE-2024-32739.yaml
63-
http/cves/2024/CVE-2024-35584.yaml
64-
http/cves/2024/CVE-2024-3656.yaml
65-
http/cves/2024/CVE-2024-39713.yaml
66-
http/cves/2024/CVE-2024-43360.yaml
67-
http/cves/2024/CVE-2024-44349.yaml
68-
http/cves/2024/CVE-2024-4439.yaml
69-
http/cves/2024/CVE-2024-45216.yaml
70-
http/cves/2024/CVE-2024-45488.yaml
71-
http/cves/2024/CVE-2024-46310.yaml
72-
http/cves/2024/CVE-2024-48914.yaml
73-
http/cves/2024/CVE-2024-49757.yaml
74-
http/cves/2024/CVE-2024-5910.yaml
75-
http/cves/2024/CVE-2024-8698.yaml
76-
http/cves/2024/CVE-2024-9061.yaml
77-
http/cves/2024/CVE-2024-9234.yaml
78-
http/cves/2024/CVE-2024-9593.yaml
79-
http/cves/2024/CVE-2024-9617.yaml
80-
http/cves/2024/CVE-2024-9796.yaml
81-
http/default-logins/apache/doris-default-login.yaml
82-
http/default-logins/sato/sato-default-login.yaml
83-
http/default-logins/zebra/zebra-printer-default-login.yaml
84-
http/exposed-panels/1password-scim-panel.yaml
85-
http/exposed-panels/danswer-panel.yaml
86-
http/exposed-panels/freescout-panel.yaml
87-
http/exposed-panels/nagios/nagios-logserver-panel.yaml
88-
http/exposed-panels/olympic-panel.yaml
89-
http/exposed-panels/onedev-panel.yaml
90-
http/exposed-panels/paloalto-expedition-panel.yaml
91-
http/exposed-panels/reolink-panel.yaml
92-
http/exposed-panels/sqlpad-panel.yaml
93-
http/exposed-panels/traccar-panel.yaml
94-
http/exposed-panels/txadmin-panel.yaml
95-
http/exposed-panels/usermin-panel.yaml
96-
http/exposed-panels/veritas-netbackup-panel.yaml
97-
http/exposed-panels/vmware-aria-panel.yaml
98-
http/misconfiguration/installer/nagios-logserver-installer.yaml
99-
http/misconfiguration/redpanda-console.yaml
100-
http/misconfiguration/root-path-disclosure.yaml
101-
http/misconfiguration/unauth-cyber-power-systems.yaml
102-
http/takeovers/wasabi-bucket-takeover.yaml
103-
http/technologies/accellion-detect.yaml
104-
http/technologies/gradio-detect.yaml
105-
http/technologies/lollms-webui-detect.yaml
106-
http/technologies/mirth-connect-detect.yaml
107-
http/technologies/oracle-fusion-detect.yaml
108-
http/technologies/salesforce-b2c-commerce-webdav.yaml
109-
http/vulnerabilities/hcm/hcm-cloud-lfi.yaml
110-
http/vulnerabilities/nagios/nagios-xi-xss.yaml
111-
http/vulnerabilities/other/cyberpanel-rce.yaml
112-
http/vulnerabilities/wordpress/application-pass-xss.yaml
113-
http/vulnerabilities/wordpress/wp-footnote-xss.yaml
114-
http/vulnerabilities/yonyou/yonyou-u8-crm-sqli.yaml
115-
http/vulnerabilities/yonyou/yonyou-u8-crm-tb-sqli.yaml
116-
passive/cves/2024/CVE-2024-40711.yaml
1+
cloud/aws/cloudformation/stack-notification-disabled.yaml
2+
cloud/aws/cloudformation/stack-policy-not-inuse.yaml
3+
cloud/aws/cloudformation/stack-termination-disabled.yaml
4+
cloud/aws/cloudfront/cloudfront-compress-object.yaml
5+
cloud/aws/cloudfront/cloudfront-custom-certificates.yaml
6+
cloud/aws/cloudfront/cloudfront-geo-restriction.yaml
7+
cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml
8+
cloud/aws/cloudfront/cloudfront-integrated-waf.yaml
9+
cloud/aws/cloudfront/cloudfront-logging-disabled.yaml
10+
cloud/aws/cloudfront/cloudfront-origin-shield.yaml
11+
cloud/aws/cloudfront/cloudfront-security-policy.yaml
12+
cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml
13+
cloud/aws/cloudfront/cloudfront-viewer-policy.yaml
14+
cloud/aws/secrets-manager/secret-manager-not-inuse.yaml
15+
cloud/aws/secrets-manager/secret-rotation-interval.yaml
16+
cloud/aws/secrets-manager/secrets-rotation-disabled.yaml
17+
code/cves/2014/CVE-2014-0160.yaml
18+
file/logs/aspnet-framework-exceptions.yaml
19+
file/logs/nodejs-framework-exceptions.yaml
20+
http/cves/2019/CVE-2019-1003000.yaml
21+
http/cves/2024/CVE-2024-48360.yaml
22+
http/cves/2024/CVE-2024-4841.yaml
23+
http/cves/2024/CVE-2024-6049.yaml
24+
http/cves/2024/CVE-2024-6420.yaml
25+
http/exposed-panels/cyberpanel-panel.yaml
26+
http/exposed-panels/nexpose-panel.yaml
27+
http/exposed-panels/quivr-panel.yaml
28+
http/iot/ip-webcam.yaml
29+
http/miscellaneous/azure-blob-core-detect.yaml
30+
http/technologies/hubble-detect.yaml
31+
http/technologies/localai-detect.yaml
32+
http/technologies/pghero-detect.yaml
33+
http/technologies/wordpress/plugins/burst-statistics.yaml
34+
http/technologies/wordpress/plugins/flexmls-detect.yaml
35+
http/vulnerabilities/backdoor/lottie-backdoor.yaml
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
id: stack-notification-disabled
2+
3+
info:
4+
name: CloudFormation Stack Notification - Disabled
5+
author: DhiyaneshDK
6+
severity: medium
7+
description: |
8+
Ensure that your Amazon CloudFormation stacks are using SNS topics to send notifications when important events occur.
9+
impact: |
10+
Disabling CloudFormation Stack Notifications can lead to reduced visibility into stack events and errors, delaying the detection of issues and hindering effective monitoring of changes and deployments in the cloud environment.
11+
remediation: |
12+
Enable CloudFormation Stack Notifications by configuring SNS (Simple Notification Service) topics for your CloudFormation stack. This will ensure real-time alerts on stack events, including updates, errors, and resource creation, providing better monitoring and visibility.
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-notification.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-stack.html
16+
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
17+
18+
variables:
19+
region: "us-west-2"
20+
21+
flow: |
22+
code(1)
23+
for(let StackSummaries of iterate(template.stacksummaries)){
24+
set("stacksummary", StackSummaries)
25+
code(2)
26+
}
27+
28+
self-contained: true
29+
30+
code:
31+
- engine:
32+
- sh
33+
- bash
34+
source: |
35+
aws cloudformation list-stacks --region $region --stack-status-filter CREATE_COMPLETE --output json --query 'StackSummaries[*].StackName'
36+
37+
extractors:
38+
- type: json
39+
name: stacksummaries
40+
internal: true
41+
json:
42+
- '.[]'
43+
44+
- engine:
45+
- sh
46+
- bash
47+
source: |
48+
aws cloudformation describe-stacks --region $region --stack-name $stacksummary --query 'Stacks[*].NotificationARNs[]'
49+
50+
matchers:
51+
- type: word
52+
words:
53+
- '[]'
54+
55+
extractors:
56+
- type: dsl
57+
dsl:
58+
- '"CloudFormation Stack Notification " + stacksummary + " is Disabled"'
59+
# digest: 4a0a0047304502207f53d34d64636fe7e6541bb58cbdcbbb1974db08099320070c23cf817bb50dc0022100ecc19fcf7cc0b0855d0f2be8e07d54d771245bbb69fcea3db558e41e94b200f1:922c64590222798bb761d5b6d8e72950
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
id: stack-policy-not-inuse
2+
3+
info:
4+
name: CloudFormation Stack Policy - Not In Use
5+
author: DhiyaneshDK
6+
severity: medium
7+
description: |
8+
Ensure your AWS CloudFormation stacks are using policies as a fail-safe mechanism in order to prevent accidental updates to stack resources.
9+
impact: |
10+
Lack of a CloudFormation Stack Policy allows unrestricted modifications to stack resources, increasing the risk of unintended or harmful changes.
11+
remediation: |
12+
Implement a CloudFormation Stack Policy to restrict updates to critical resources, defining explicit rules for which resources can be modified during stack updates.
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-policy.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/protect-stack-resources.html
16+
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
17+
18+
variables:
19+
region: "us-west-2"
20+
21+
flow: |
22+
code(1)
23+
for(let StackSummaries of iterate(template.stacksummaries)){
24+
set("stacksummary", StackSummaries)
25+
code(2)
26+
}
27+
28+
self-contained: true
29+
30+
code:
31+
- engine:
32+
- sh
33+
- bash
34+
source: |
35+
aws cloudformation list-stacks --region $region --output json --query 'StackSummaries[*].StackName'
36+
37+
extractors:
38+
- type: json
39+
name: stacksummaries
40+
internal: true
41+
json:
42+
- '.[]'
43+
44+
- engine:
45+
- sh
46+
- bash
47+
source: |
48+
aws cloudformation get-stack-policy --region $region --stack-name $stacksummary --output json
49+
50+
matchers:
51+
- type: word
52+
words:
53+
- 'StackPolicyBody'
54+
- 'Effect'
55+
negative: true
56+
57+
extractors:
58+
- type: dsl
59+
dsl:
60+
- 'stacksummary + " No Stack Policy In Use"'
61+
# digest: 4a0a00473045022100da187a67fe3eec97faa4155c6a575443b2fa3165741d9433ace3f33d5ca2547702206a349dfd6bcf0d2b2e60afe4094a6d6fe934c902794479de1b600aeb54f3dcb5:922c64590222798bb761d5b6d8e72950
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
id: stack-termination-disabled
2+
3+
info:
4+
name: CloudFormation Termination Protection - Disabled
5+
author: DhiyaneshDK
6+
severity: medium
7+
description: |
8+
Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted.
9+
impact: |
10+
Disabled termination protection increases the risk of accidental deletion of critical CloudFormation stacks.
11+
remediation: |
12+
Enable termination protection for critical CloudFormation stacks by setting TerminationProtection to true in the stack settings, preventing accidental deletions.
13+
reference:
14+
- https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/stack-termination-protection.html
15+
- http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html
16+
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
17+
18+
variables:
19+
region: "us-west-2"
20+
21+
flow: |
22+
code(1)
23+
for(let StackSummaries of iterate(template.stacksummaries)){
24+
set("stacksummary", StackSummaries)
25+
code(2)
26+
}
27+
28+
self-contained: true
29+
30+
code:
31+
- engine:
32+
- sh
33+
- bash
34+
source: |
35+
aws cloudformation list-stacks --region $region --stack-status-filter CREATE_COMPLETE --output json --query 'StackSummaries[*].StackName'
36+
37+
extractors:
38+
- type: json
39+
name: stacksummaries
40+
internal: true
41+
json:
42+
- '.[]'
43+
44+
- engine:
45+
- sh
46+
- bash
47+
source: |
48+
aws cloudformation describe-stacks --region $region --stack-name $stacksummary --query 'Stacks[*].EnableTerminationProtection' --output json
49+
50+
matchers:
51+
- type: word
52+
words:
53+
- 'false'
54+
55+
extractors:
56+
- type: dsl
57+
dsl:
58+
- '"CloudFormation Termination Protection " + stacksummary + " is Disabled"'
59+
# digest: 4b0a0048304602210088c7b52b7d5406c581b5ea4a344cf8418c1d1f90f0f0a5025a52ad1a9e6139d2022100c985ed046c7bda40aabed7ff5e453c5a2c74f4cc0d1905f411a56d2b095b4fa1:922c64590222798bb761d5b6d8e72950

0 commit comments

Comments
 (0)