Nuclei Templates Monthly - Jan 2024
2024-2-1 15:56:27 Author: blog.projectdiscovery.io(查看原文) 阅读量:24 收藏

Summary of Releases v9.7.3, v9.7.4, and v9.7.5

This month, we've released multiple versions of Nuclei Templates that bring numerous enhancements to Nuclei users.

Here are some highlighted stats from the combined releases:

🎉 157 new Templates added
🚀 20 first-time contributions
🔥 36 new CVEs added

Introduction

Welcome to the January 2024 edition of our Nuclei Templates Monthly Release. Kicking off the new year, the releases are packed with significant updates, including the addition of over 75 new local privilege escalation templates by our community member @daffainfo.

This month, we've added some templates for critical vulnerabilities. Among them, the critical vulnerabilities in Atlassian Confluence and Apache OFBiz have garnered significant attention. The Atlassian Confluence vulnerability (CVE-2023-22527) allows for remote code execution, posing a severe risk to numerous enterprises relying on this popular collaboration tool. Similarly, Apache OFBiz has been under the spotlight with multiple vulnerabilities, notably CVE-2023-51467 and CVE-2023-50968, leading to remote code execution and server-side request forgery, respectively.

Additionally, Adobe ColdFusion's deserialization issue (CVE-2023-44353) and GitLab's account takeover exploit (CVE-2023-7028) have raised serious concerns due to their widespread usage and the critical nature of these vulnerabilities.

New Templates Added

We are excited to announce the addition of 157 new templates to the Nuclei Templates project. These templates cover a wide range of security checks, from trending CVEs to local privilege escalation, empowering you to identify potential vulnerabilities efficiently. The contributions from our dedicated community have been immeasurably valuable in expanding the breadth of Nuclei's capabilities, and we extend our gratitude to all those involved.

New CVEs Added

This release incorporates 36 🔥 new CVEs, ensuring you remain current with the latest security vulnerabilities. By including these CVEs in the Nuclei Templates, we aim to provide you with the necessary tools to detect and mitigate potential risks proactively.

Bug Fixes and Enhancements

This month we have done several bug fixes and implemented enhancements to improve the overall functionality of Nuclei Templates. The following contributions from our community members have been instrumental in making these improvements:

  • Added 75+ Local Privilege escalation templates #8818
  • Added SMB misconfiguration templates
  • Made enhancements in template tagging based on the template directories #8938
  • Created Nuclei config profiles for different use cases, such as Bug Bounty, OSINT, compliance, etc #8859
  • Added "local" tag in nuclei ignore file. For security reasons, these templates are not executed as part of the default Nuclei scan. To run these templates, users need to provide the -code flag along with -itags local
  • Added and updated impact fields in the CVE Templates #8278
  • Fixed a few templates producing false positive and false negative results

Highlighted CVE Templates

Here are some notable CVEs included in this release:

CVE-2023-22527: Atlassian Confluence - Remote Code Execution

This critical vulnerability in Atlassian Confluence enables remote attackers to execute code on the affected systems.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-44353: Adobe ColdFusion WDDX Deserialization Gadgets

Adobe ColdFusion is impacted by a critical deserialization issue, allowing attackers to execute arbitrary code remotely.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-51467: Apache OFBiz < 18.12.11 - Remote Code Execution

A critical remote code execution vulnerability in Apache OFBiz versions prior to 18.12.11, posing significant security risks.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-7028: GitLab - Account Takeover via Password Reset

This critical vulnerability in GitLab allows attackers to take over accounts via a password reset mechanism.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2024-0204: Fortra GoAnywhere MFT - Authentication Bypass

A critical authentication bypass vulnerability in Fortra GoAnywhere MFT, potentially compromising system security.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2024-23897: Jenkins < 2.441 - Arbitrary File Read

Jenkins versions prior to 2.441 are affected by a critical vulnerability that allows unauthorized arbitrary file reading.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-50917: MajorDoMo thumb.php - OS Command Injection

A critical vulnerability in MajorDoMo's thumb.php, enabling attackers to perform OS command injection.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-46805: Ivanti ICS - Authentication Bypass

A high severity vulnerability in Ivanti ICS that allows attackers to bypass authentication controls.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-47211: ManageEngine OpManager - Directory Traversal

ManageEngine OpManager is susceptible to a high severity directory traversal vulnerability.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

CVE-2023-6063: WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection

This high severity vulnerability in WP Fastest Cache 1.2.2 allows unauthenticated SQL injection attacks.

ProjectDiscovery Cloud Platform

Create, edit, generate, and scan templates using AI in one seamless experience with Nuclei.

We express our sincere appreciation to the community members, including our first-time contributors for their contributions to the Nuclei Templates project.

Join the Nuclei Templates community on Discord, where you can actively participate, collaborate, and share valuable insights.

By leveraging Nuclei and actively engaging with the open-source community, or by becoming a part of the ProjectDiscovery Cloud Platform, companies can enhance their security measures, proactively address emerging threats, and establish a more secure digital landscape. Security represents a shared endeavor, and by collaborating, we can consistently adapt and confront the ever-evolving challenges posed by cyber threats


文章来源: https://blog.projectdiscovery.io/nuclei-templates-monthly-jan-2024-local-privilege-escalation/
如有侵权请联系:admin#unsafe.sh