Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update template url #4110

Merged
merged 1 commit into from
Sep 1, 2023
Merged

update template url #4110

merged 1 commit into from
Sep 1, 2023

Conversation

dogancanbakir
Copy link
Member

Proposal:

- "template-url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/technologies/tech-detect.yaml",
+ "template-url": "https://templates.nuclei.sh/public/tech-detect",

https://templates.nuclei.sh/public/ is static, and tech-detect is a unique public template id.

$ go run main.go -u scanme.sh -jsonl | jq .

                     __     _
   ____  __  _______/ /__  (_)
  / __ \/ / / / ___/ / _ \/ /
 / / / / /_/ / /__/ /  __/ /
/_/ /_/\__,_/\___/_/\___/_/   v2.9.13

                projectdiscovery.io

[INF] Current nuclei version: v2.9.13 (latest)
[INF] Current nuclei-templates version: v9.6.2 (latest)
[INF] New templates added in latest release: 61
[INF] Templates loaded for current scan: 6721
[INF] Targets loaded for current scan: 1
[INF] Running httpx on input host
[INF] Found 1 URL from httpx
[INF] Templates clustered: 1192 (Reduced 1132 Requests)
[INF] Using Interactsh Server: oast.online
{
  "template": "ssl/mismatched-ssl-certificate.yaml",
  "template-url": "https://templates.nuclei.sh/public/mismatched-ssl-certificate",
  "template-id": "mismatched-ssl-certificate",
  "template-path": "/home/vscode/nuclei-templates/ssl/mismatched-ssl-certificate.yaml",
  "info": {
    "name": "Mismatched SSL Certificate",
    "author": [
      "pdteam"
    ],
    "tags": [
      "ssl",
      "mismatched",
      "tls"
    ],
    "description": "Mismatched certificates occur when there is inconsistency between the common name to which the certificate was issued and the domain name in the URL. This issue impacts the trust value of the affected website.\n",
    "reference": [
      "https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/ssl-certificate-name-hostname-mismatch/"
    ],
    "severity": "low",
    "metadata": {
      "max-request": 1
    }
  },
  "type": "ssl",
  "host": "scanme.sh",
  "matched-at": "scanme.sh:443",
  "extracted-results": [
    "CN: scanme"
  ],
  "ip": "128.199.158.128",
  "timestamp": "2023-09-01T11:57:27.879278667Z",
  "matcher-status": true
}
{
  "template": "ssl/self-signed-ssl.yaml",
  "template-url": "https://templates.nuclei.sh/public/self-signed-ssl",
  "template-id": "self-signed-ssl",
  "template-path": "/home/vscode/nuclei-templates/ssl/self-signed-ssl.yaml",
  "info": {
    "name": "Self Signed SSL Certificate",
    "author": [
      "righettod",
      "pdteam"
    ],
    "tags": [
      "ssl"
    ],
    "description": "self-signed certificates are public key certificates that are not issued by a certificate authority. These self-signed\ncertificates are easy to make and do not cost money. However, they do not provide any trust value.\n",
    "reference": [
      "https://www.rapid7.com/db/vulnerabilities/ssl-self-signed-certificate/"
    ],
    "severity": "low",
    "metadata": {
      "max-request": 1
    },
    "remediation": "Purchase or generate a proper SSL certificate for this service.\n"
  },
  "type": "ssl",
  "host": "scanme.sh",
  "matched-at": "scanme.sh:443",
  "ip": "128.199.158.128",
  "timestamp": "2023-09-01T11:57:27.881173042Z",
  "matcher-status": true
}
{
  "template": "ssl/detect-ssl-issuer.yaml",
  "template-url": "https://templates.nuclei.sh/public/ssl-issuer",
  "template-id": "ssl-issuer",
  "template-path": "/home/vscode/nuclei-templates/ssl/detect-ssl-issuer.yaml",
  "info": {
    "name": "Detect SSL Certificate Issuer",
    "author": [
      "lingtren"
    ],
    "tags": [
      "ssl"
    ],
    "description": "Extract the issuer's organization from the target's certificate. Issuers are entities which sign and distribute certificates.\n",
    "severity": "info",
    "metadata": {
      "max-request": 1
    }
  },
  "type": "ssl",
  "host": "scanme.sh",
  "matched-at": "scanme.sh:443",
  "extracted-results": [
    "pd"
  ],
  "ip": "128.199.158.128",
  "timestamp": "2023-09-01T11:57:27.881423959Z",
  "matcher-status": true
}
^C[INF] CTRL+C pressed: Exiting
[INF] Creating resume file: /home/vscode/.config/nuclei/resume-cjot30a1n4a1ig8u6k1g.cfg
exit status 1

Closes #4108.

@dogancanbakir dogancanbakir self-assigned this Sep 1, 2023
@dogancanbakir dogancanbakir linked an issue Sep 1, 2023 that may be closed by this pull request
@ehsandeep ehsandeep merged commit 680fc55 into dev Sep 1, 2023
12 checks passed
@ehsandeep ehsandeep deleted the update_template_url branch October 18, 2023 10:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update Template URL in JSON/L output
2 participants