mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-03 17:23:30 +08:00
49 lines
1.0 KiB
YAML
49 lines
1.0 KiB
YAML
|
|
id: python-scanner
|
||
|
|
|
||
|
|
info:
|
||
|
|
name: Python Scanner
|
||
|
|
author: majidmc2
|
||
|
|
severity: info
|
||
|
|
description: Scan for dangerous Python functions.
|
||
|
|
reference: https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html, https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html
|
||
|
|
tags: python,file
|
||
|
|
|
||
|
|
|
||
|
|
file:
|
||
|
|
- extensions:
|
||
|
|
- py
|
||
|
|
|
||
|
|
extractors:
|
||
|
|
- type: regex
|
||
|
|
name: Possibility of SQLi vulnerability Code Injection
|
||
|
|
regex:
|
||
|
|
- 'exec'
|
||
|
|
- 'eval'
|
||
|
|
- '__import__'
|
||
|
|
|
||
|
|
|
||
|
|
- type: regex
|
||
|
|
name: The Command Injection Series
|
||
|
|
regex:
|
||
|
|
- 'subprocess.call\(.*shell=True.*\)'
|
||
|
|
- 'os.system'
|
||
|
|
- 'os.popen'
|
||
|
|
|
||
|
|
|
||
|
|
- type: regex
|
||
|
|
name: The pickle module is not secure
|
||
|
|
regex:
|
||
|
|
- 'pickle.loads'
|
||
|
|
- 'cPickle.loads'
|
||
|
|
|
||
|
|
|
||
|
|
- type: regex
|
||
|
|
name: Loading dangerous YAMLs
|
||
|
|
regex:
|
||
|
|
- 'yaml.load'
|
||
|
|
|
||
|
|
|
||
|
|
- type: regex
|
||
|
|
name: Possibility of SQLi vulnerability
|
||
|
|
regex:
|
||
|
|
- 'cursor.execute'
|