forked from PortSwigger/BChecks
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'PortSwigger:main' into main
- Loading branch information
Showing
8 changed files
with
88 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
metadata: | ||
language: v1-beta | ||
name: "Simple SAML php Admin Interface" | ||
description: "Tests for exposed admin interface of Simple SAML php" | ||
author: "Patrick Schmid" | ||
|
||
run for each: | ||
potential_path = | ||
"/saml/module.php/core/login-admin.php?ReturnTo=", | ||
"/sso/module.php/core/login-admin.php?ReturnTo=" | ||
|
||
given host then | ||
send request called check: | ||
method: "GET" | ||
path: {potential_path} | ||
|
||
if "loginuserpass.php" in {check.response.body} then | ||
report issue: | ||
severity: info | ||
confidence: certain | ||
detail: `Simple SAML php admin interface found at {potential_path}.` | ||
remediation: "Ensure your Simple SAML php admin interface is not exposed." | ||
end if |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
metadata: | ||
language: v1-beta | ||
name: "Missing security.txt" | ||
description: "Checks for a missing security.txt according to RFC 9116" | ||
author: "Patrick Schmid" | ||
|
||
define: | ||
potential_path = | ||
"/.well-known/security.txt" | ||
|
||
given host then | ||
send request called check: | ||
method: "GET" | ||
path: {potential_path} | ||
|
||
if not("Contact:" in {check.response.body}) then | ||
report issue: | ||
severity: info | ||
confidence: certain | ||
detail: `No security.txt could be found at {potential_path}.` | ||
remediation: "Consider describing your security vulnerability disclosure process in a security.txt file according to RFC 9116 (https://www.rfc-editor.org/rfc/rfc9116)." | ||
end if |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
metadata: | ||
language: v1-beta | ||
name: "[CVE-2023-24488] Vulnerable Citrix Gateway Detected." | ||
description: "This rule checks if the remote host is vulnerable to CVE-2023-24488 - Citrix CRLF Injection / Reflected Xss" | ||
author: "TheButcher" | ||
tags: "CVE-2023-24488","citrix","crlf","xss","openredirection" | ||
|
||
define: | ||
potential_path = | ||
"/oauth/idp/logout?post_logout_redirect_uri=%0d%0a%0d%0a%3Cscript%3Ealert(document.cookie)%3C/script%3E" | ||
|
||
given host then | ||
send request called check: | ||
method: "GET" | ||
path: {potential_path} | ||
|
||
if "document.cookie" in {check.response.body} then | ||
report issue: | ||
severity: medium | ||
confidence: certain | ||
detail: "The post_logout_redirect_uri GET Parameter is susceptible to Open Redirection, which can be exploited for CRLF injection leading to XSS through HTTP Response Splitting. There is also a potential risk of cache poisoning if Citrix Gateway is deployed in such a configuration." | ||
remediation: "Affected customers of Citrix ADC and Citrix Gateway are recommended to install the relevant updated versions of Citrix ADC or Citrix Gateway as soon as possible - https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488" | ||
|
||
end if |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters