Files
nuclei-templates/workflows/jira-exploitation-workflow.yaml

42 lines
1.4 KiB
YAML
Raw Normal View History

id: jira-exploitation-workflow
2020-07-08 20:46:44 +05:30
info:
name: Jira Exploitation workflow
2020-07-08 20:46:44 +05:30
author: micha3lb3n
variables:
jira_detect: technologies/jira-detect.yaml
jira_signup: security-misconfiguration/jira-service-desk-signup.yaml
jira_projects: security-misconfiguration/jira-unauthenticated-projects.yaml
jira_dashboard: security-misconfiguration/jira-unauthenticated-dashboards.yaml
jira_filters: security-misconfiguration/jira-unauthenticated-popular-filters.yaml
jira_user_picker: security-misconfiguration/jira-unauthenticated-user-picker.yaml
jira_cve_1: cves/CVE-2019-8449.yaml
jira_cve_2: cves/CVE-2019-8451.yaml
jira_cve_3: cves/CVE-2017-9506.yaml
jira_cve_4: cves/CVE-2018-20824.yaml
2020-07-08 23:13:06 +05:30
jira_cve_5: cves/CVE-2019-3396.yaml
2020-09-26 17:53:22 +03:00
jira_cve_6: cves/CVE-2020-14179.yaml
jira_cve_7: cves/CVE-2020-14181.yaml
2020-10-03 11:27:10 +05:30
jira_cve_8: cves/CVE-2019-8442.yaml
2020-11-06 15:59:10 +05:30
jira_cve_9: cves/CVE-2019-3402.yaml
2020-07-08 20:46:44 +05:30
logic:
|
if jira_detect(){
jira_signup()
jira_projects()
jira_dashboard()
jira_filters()
jira_user_picker()
jira_cve_1()
jira_cve_2()
jira_cve_3()
jira_cve_4()
2020-07-08 23:13:06 +05:30
jira_cve_5()
2020-09-26 17:53:22 +03:00
jira_cve_6()
jira_cve_7()
2020-10-03 11:27:10 +05:30
jira_cve_8()
2020-11-06 15:59:10 +05:30
jira_cve_9()
2020-07-08 20:46:44 +05:30
}