Skip to content

Commit be96c4b

Browse files
Merge pull request #13618 from projectdiscovery/CVE-2022-31711
Fix detection CVE-2022-31711.yaml
2 parents 42dc01d + cd61b03 commit be96c4b

File tree

1 file changed

+15
-8
lines changed

1 file changed

+15
-8
lines changed

http/cves/2022/CVE-2022-31711.yaml

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,27 +26,34 @@ info:
2626
shodan-query: http.title:"vrealize log insight"
2727
fofa-query: title="vrealize log insight"
2828
google-query: intitle:"vrealize log insight"
29-
tags: cve,cve2022,vmware,info-leak,passive,vkev
29+
tags: cve,cve2022,vmware,exposure,passive,vkev
3030

3131
http:
3232
- method: GET
3333
path:
34-
- "{{BaseURL}}/ui/login.action"
34+
- "{{BaseURL}}/i18n/component/JS?locale=en-US"
35+
- "{{BaseURL}}/api/v1/version"
3536

37+
stop-at-first-match: true
3638
matchers-condition: and
3739
matchers:
3840
- type: dsl
3941
dsl:
40-
- "status_code == 200"
41-
- "compare_versions(version, '< 8.10.2')"
42-
- "contains(body, 'vRealize Operations Manager')"
42+
- 'status_code == 200'
43+
- 'contains_any(body, "logInsight", "releaseName\":")'
4344
condition: and
4445

46+
- type: dsl
47+
dsl:
48+
- "compare_versions(version, '>= 8.0.0', '< 8.10.2')"
49+
- "compare_versions(version, '>= 3.0', '< 4.8')"
50+
condition: or
51+
4552
extractors:
4653
- type: regex
4754
part: body
48-
group: 1
4955
name: version
56+
group: 1
5057
regex:
51-
- "SessionProvider.js\\?version=([0-9.]+)"
52-
# digest: 4b0a00483046022100a347dcc02ed7cac45bac601c7a370fd83e83a3544fa6db42008d9f6b21daf0190221009d7abc36fb08fd5051208f4559e34788969b8b741ce1d5775ebfd7ba836d1fe9:922c64590222798bb761d5b6d8e72950
58+
- 'version"\s*:\s*"([0-9.]+)'
59+
# digest: 4b0a00483046022100a347dcc02ed7cac45bac601c7a370fd83e83a3544fa6db42008d9f6b21daf0190221009d7abc36fb08fd5051208f4559e34788969b8b741ce1d5775ebfd7ba836d1fe9:922c64590222798bb761d5b6d8e72950

0 commit comments

Comments
 (0)