Skip to content
Open
Show file tree
Hide file tree
Changes from 19 commits
Commits
Show all changes
23 commits
Select commit Hold shift + click to select a range
0cc045d
Merge pull request #4 from OWASP/master
Aarush289 Jan 20, 2026
2a32fe2
Merge pull request #8 from OWASP/master
Aarush289 Feb 5, 2026
4090ae3
Merge pull request #9 from OWASP/master
Aarush289 Feb 8, 2026
2a0b83e
Add FortiWeb authentication bypass vulnerability check
Aarush289 Feb 10, 2026
b1ffe4e
Remove FortiWeb auth bypass vulnerability entry
Aarush289 Feb 10, 2026
6db5ee7
Fix vulnerability name in wp_plugin_cve_2021_38314.yaml
Aarush289 Feb 10, 2026
6fd226a
Rename CVE identifier from 39314 to 39320
Aarush289 Feb 10, 2026
03675d5
Merge pull request #10 from OWASP/master
Aarush289 Feb 12, 2026
0d3399e
Merge pull request #13 from OWASP/master
Aarush289 Feb 18, 2026
ace2db9
Merge pull request #14 from OWASP/master
Aarush289 Feb 23, 2026
0711d39
Merge pull request #16 from OWASP/master
Aarush289 Mar 3, 2026
0857127
Merge pull request #18 from OWASP/master
Aarush289 Mar 8, 2026
44a9ae6
Merge pull request #19 from OWASP/master
Aarush289 Mar 20, 2026
95ac772
Merge pull request #20 from OWASP/master
Aarush289 Apr 9, 2026
dd080aa
new module added
Aarush289 Apr 9, 2026
8ba9258
remove the debug comments
Aarush289 Apr 9, 2026
102cdbe
changes of http removed
Aarush289 Apr 9, 2026
faf7a59
Merge branch 'master' into cve_2025_40536
Aarush289 Apr 9, 2026
b7be1d3
fixed the version regex
Aarush289 Apr 9, 2026
daf9bc3
updated the desciption
Aarush289 Apr 9, 2026
344e21b
version scan added
Aarush289 Apr 10, 2026
d46e258
Merge branch 'master' into cve_2025_40536
Aarush289 Apr 14, 2026
8f4f315
Merge branch 'master' into cve_2025_40536
Aarush289 Apr 20, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions docs/Modules.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,6 +163,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
- '**ProFTPd_restriction_bypass_vuln**' - check ProFTPd for CVE-2009-3639
- '**server_version_vuln**' - check if the web server is leaking server banner in 'Server' response header
- '**smartermail_cve_2026_24423_vuln**' - check the target for SmarterMail CVE-2026-24423 vulnerability
- '**solarwinds_whd_cve_2025_40536_vuln**' - check SolarWinds Web Help Desk vulnerable version via build token
- '**sonicwall_sslvpn_cve_2024_53704_vuln**' - check the target for SonicWALL SSLVPN CVE-2024-53704 vulnerability
- '**ssl_signed_certificate_vuln**' - check for self-signed & other signing issues(weak signing algorithm) in SSL certificate
- '**ssl_expired_certificate_vuln**' - check if SSL certificate has expired or is close to expiring
Expand Down
58 changes: 58 additions & 0 deletions nettacker/modules/vuln/solarwinds_whd_cve_2025_40536.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
info:
name: solarwinds_whd_cve_2025_40536_vuln
author: Nettacker Team
severity: 8.1
description: |
Identifies SolarWinds Web Help Desk instances
by analyzing response content and extracting
the embedded build version token from resource URLs.
The detected version is evaluated against the patched
threshold (12.8.8 HF1) to determine potential exposure.
This enables passive and safe identification of systems affected by the security control bypass vulnerability.
reference:
- https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536
- https://nvd.nist.gov/vuln/detail/CVE-2025-40536
profiles:
- vuln
- http
- high_severity
- cve2025
- cve
- cisa kev
- solarwinds
- webhelpdesk
- passive

payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
Host: "{target}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/helpdesk/WebObjects/Helpdesk.woa"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443

response:
condition_type: and
conditions:
status_code:
regex: "200"
reverse: false
content:
regex: "(?s)(?=.*(Web Help Desk Software|SolarWinds WorldWide|/WebObjects/Helpdesk\\.woa))(?=.*\\?v=12_(?:[0-7]_[0-9]+|8_(?:[0-8])_[0-9]+)_[0-9]+)"
reverse: false
Loading